Tag Archive for: Sends

Casino giant Caesars sends breach notifications to thousands • The Register


As more details emerge from September’s Las Vegas casino cyberattacks, Caesars Entertainment – the owner of Caesars Palace – has disclosed more than 41,000 Maine residents alone had their info stolen by a ransomware gang.

In a Friday filing with the the US state’s Attorney General’s office, Caesars disclosed extortionists siphoned 41,397 Mainers’ data, and listed the total number of victims “TBD.”

The hotel, restaurant, and casino chain described the theft as follows:

The hotel chain’s loyalty program was pillaged and Caesars noted that the stolen personal data included names and driver’s license numbers and/or identification card numbers. According to the filing, the crooks didn’t access customers’ financial information nor payment details.

In an attached security breach notification letter [PDF], Caesars told customers that the entertainment conglomerate has “taken steps to ensure that the stolen data is deleted by the unauthorized actor, although we cannot guarantee this result.”

These steps, we’d assume, including paying the ransom demand – which was reportedly negotiated at $15 million after an initial demand for $30 million.

“To ease any concern you may have, we are offering you complimentary identity theft protection services for two years through IDX, a data breach and recovery services expert,” the notification letter continued. 

“This identity protection service includes two years of credit and dark web monitoring to help detect any misuse of your information, as well as a $1,000,000 insurance reimbursement policy and fully managed identity restoration in the event that you fall victim to identity theft.”

The casino giant first confirmed the data theft in an SEC filing in September, but has yet to comment on the reported ransom paid to the ransomware crew. 

Caesars has not responded to multiple inquiries from The…

Source…

Matty Healy kisses security guard during concert, sends internet into a frenzy


Matty Healy, the lead vocalist of the popular pop-rock band The 1975 made headlines when he kissed a security guard during a concert on June 2. The band performed at Denmark’s NorthSide festival on Friday, and Matty went viral after the clip of him kissing the security guard surfaced on social media.

Although some fans were not surprised by the 34-year-old British singer’s actions, others found it hard to digest.

Matty Healy kissed a security guard at The 1975 concert tonight.

Matty Healy has been in the news for the last couple of months due to his rumored relationship with the Karma hitmaker, Taylor Swift. As per Vox, their alleged romance sparked after Taylor’s supposed split from Joe Alwyn, her longtime partner, whom the 33-year-old singer is said to have dated for six years.

Pop Base tweeted a clip of The 1975 vocalist locking lips with the security guard on June 3, prompting reactions from Swifties in the comments section. Many fans urged Taylor to leave Matty and some even sarcastically asked if this is who Taylor wants.

Netizens react to Matty kissing a security guard during a concert. (Image via Twitter/@Pop Base)

“Taylor please leave him” – Internet reacts to Matty Healy kissing a security guard during concert

In a clip that has been doing the rounds online, Matty Healy grabbed a security guard who was standing near the stairs of the stage and leaned in to kiss him. The security guard did not seem to protest and reciprocated the kiss with a huge smile and was also enjoying the ongoing song Robbers.

After their initial kiss, Matty Healy pulled the security towards him a second time, and this time, the latter willingly leaned in for a peck, which landed on the singer’s cheek. Nonetheless, this moment garnered gasps and loud cheers from the audience. Several fans also took to the comments section of Pop Base’s tweet to react to the clip.

Netizens react to Matty kissing a security guard…

Source…

Whitehall sends out notification letters after cyber attack


City administrator Zach Woodruff said the city did not pay the ransom and was able to retrieve the files that were compromised.

WHITEHALL, Ohio — The city of Whitehall has sent out 37,000 notification letters to people in 11 states and one U.S. territory alerting them that their personal information may have been compromised following a ransomware attack that happened in late May.

When asked why it took city administrators until December to notify those potentially affected, a city administrator told 10 Investigates that it has taken this long to identify those who may have been impacted.

City administrator Zach Woodruff also told 10 Investigates that after learning of the breach in late May, the city hired a law firm and a cybersecurity firm to help determine what happened.

Woodruff said the city did not pay the ransom and was able to retrieve the files that were compromised. He added no one from the city would be available for an interview.

Following the ransomware attack in late May, the city tweeted out on May 31 that “City Hall is closed to the public for the remainder of the day following technology issues. Our apologies for any inconvenience.” The tweet did not specifically mention the ransomware attack that occurred days earlier.

On Tuesday, the city posted a notification of the data breach to its website and included a Frequently Asked Questions tab should those impacted need to know more information.

The city is offering credit monitoring services as well.

Among the people impacted was Gregory Hensley who told 10 Investigates he hasn’t lived in Whitehall since 2014 but received a letter in the mail saying he was impacted. was concerned because he and his late wife were the victims of identity theft in the past.

When asked what the first thing that went through his mind upon receiving the letter,…

Source…

Hackers Attack UK Water Supplier, Sends Ransom Demand to the Wrong Company


Stock image of data breach

Hackers infiltrated the corporate-side of a utility that supplies water to about 1.3 million people in the United Kingdom. However, the apparent data breach may not have been the one the cyber-criminals were aiming for.

Ransomware gang ClOP (previously responsible for one of 2021’s biggest hacks) claimed to have infiltrated Thames Water, the United Kingdom’s largest drinking water utility, on Monday, according to a report from Bleeping Computer. However, the utility denied any breach of its system. Meanwhile, another UK utility, South Staffordshire Water, confirmed it was attacked.

Thames Water services 15 million people, more than ten times the scale of South Staffordshire. So, although any attack on a public utility is clearly bad, there’s a big difference between the scale of what ClOP claimed and what utilities copped to.

Screenshot of Thames Water tweets

Hackers’ Claims Against Utilities

South Staffordshire PLC (the parent company of South Staffordshire Water) admitted its corporate IT network had been accessed by hackers, in a public statement published Monday. However, SSW didn’t indicate that they’d been contacted for ransom. “We are experiencing disruption to our corporate IT network and our teams are working to resolve this as quickly as possible. It is important to stress that our customer service teams are operating as usual,” the company wrote. The water provider further claimed that “this incident has not affected our ability to supply safe water.”

Aside from the company statements, evidence of the reported cyber-criminal confusion appeared in screenshots that Bleeping Computer published from ClOP’s Tor site. The cyber gang reportedly wrote that they had breached and “spent months in” Thames Water’s system. However, to back up their hack success, they posted email lists clearly associated with South Staffordshire Water (not Thames)…

Source…