Breaking

Cuba Ransomware Gang Claims Responsibility for Cyberattack on The Philadelphia Inquirer

The Cuba ransomware gang has taken credit for the recent cyberattack on The Philadelphia Inquirer, causing disruptions in newspaper distribution and business operations.

This article explores the details of the attack, the impact on the newspaper, and the activities of the Cuba ransomware gang.

The Cyberattack on The Philadelphia Inquirer

  • Cuba ransomware gang claims responsibility for the cyberattack
  • The attack led to temporary disruptions in newspaper distribution and business operations
  • An investigation by Kroll, forensics experts, was initiated to examine the incident

Impact on The Philadelphia Inquirer

  • Sunday print newspaper publication was disrupted due to the attack
  • Home-delivery subscribers received an early edition and were directed to the newspaper’s website
  • Considered the most significant disruption since the blizzard of Jan. 7-8, 1996
Source: BleepingComputer

Cuba Ransomware Gang’s Claims and Data Theft

  • Cuba ransomware gang publicly claims to have stolen files from The Philadelphia Inquirer
  • Stolen data, including financial documents and source code, made available on Cuba’s extortion portal
  • The newspaper’s refusal to pay ransom resulted in the release of all stolen files

Response and Ongoing Investigation

  • The Philadelphia Inquirer has yet to comment on the status of its systems and potential data theft
  • Investigation into the cyberattack and its implications is still underway
  • Cuba ransomware gang remains active and was previously linked to attacks on Ukrainian government agencies

The cyberattack on The Philadelphia Inquirer, claimed by the Cuba ransomware gang, has caused disruptions and data theft. The investigation into the incident continues as the newspaper assesses the impact and takes measures to secure its systems.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

1 week ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 weeks ago

IAM Software: Top 5 IAM Solutions for Enterprise Security

Find the top 5 IAM software solutions, explore their features, and find the best tools…

2 weeks ago

Top 5 MDM Tools for 2024 – Best Mobile Device Management Software

MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…

2 weeks ago

Scalefusion MDM Alternatives: Top 5 Scalefusion Alternatives for IT Decision Makers

Discover the top 5 Scalefusion alternatives for MDM, offering better features, scalability, and integration for…

2 weeks ago

Okta Vs OneLogin: A Detailed Comparison

Compare Okta and OneLogin: a detailed guide on features, pricing, customer base, security, and more…

2 months ago