wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/05\/22\/dish-says-ransomware-gang-stole-almost-300000-employee-records\/<\/a><\/br> U.S. satellite television giant Dish has confirmed that hackers stole the personal information of almost 300,000 individuals during a February ransomware attack<\/a>.<\/p>\n In a data breach notification<\/a> filed with Maine\u2019s attorney general last week, Dish said that while customer databases were unaffected by the incident, hackers accessed hundreds of thousands of employee-related records during the cyberattack. Dish, which currently employs around 16,000 people, said that former employees, employees\u2019 family members and a \u201climited number of other individuals\u201d were affected by the breach.<\/p>\n This long-awaited data breach notice comes months after Dish confirmed that hackers had exfiltrated data from its systems during the cybersecurity incident without revealing<\/a> whether customers or employees were affected.<\/p>\n Dish\u2019s data breach notification confirms that hackers also accessed driver\u2019s license numbers and other forms of identification. When reached by TechCrunch, Dish spokesperson Edward Wietecha declined to comment or confirm what types of data were accessed.<\/p>\n In its letter sent to those affected, Dish notes that it has \u201creceived confirmation that the extracted data has been deleted.\u201d It\u2019s not uncommon for affected organizations to pay a ransom\u00a0to limit the spread of stolen data, particularly in double-extortion schemes, whereby hackers threaten to publish stolen data if a payment isn\u2019t made. Researchers have long noted that ransomware gangs do not always delete the stolen data as claimed.<\/p>\n Dish has also not yet been added to the dark web leak site of the Russia-linked Black Basta ransomware gang \u2014 allegedly behind the cyberattack \u2014 another sign that the company may have negotiated with the attackers. Black Basta is also said to be behind the recent attack on British outsourcing giant Capita<\/a>.<\/p>\n When asked, Dish\u2019s spokesperson would not say if the company had paid a ransom but did not dispute the claim.<\/p>\n Dish\u2019s ransomware incident first came to light in late February after customers complained about a prolonged outage that prevented them from accessing streams, services or their accounts. While Dish confirmed that ransomware was the cause of the multi-day outage days later, TechCrunch learned that the company had kept both customers and employees in the dark about the incident<\/a> and the safety of their data.<\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nDish says ransomware gang stole almost 300,000 employee records<\/br>
\n2023-05-22 21:43:17<\/br><\/p>\n