Breaking

Cuba Ransomware Gang Claims Responsibility for Cyberattack on The Philadelphia Inquirer

The Cuba ransomware gang has taken credit for the recent cyberattack on The Philadelphia Inquirer, causing disruptions in newspaper distribution and business operations.

This article explores the details of the attack, the impact on the newspaper, and the activities of the Cuba ransomware gang.

The Cyberattack on The Philadelphia Inquirer

  • Cuba ransomware gang claims responsibility for the cyberattack
  • The attack led to temporary disruptions in newspaper distribution and business operations
  • An investigation by Kroll, forensics experts, was initiated to examine the incident

Impact on The Philadelphia Inquirer

  • Sunday print newspaper publication was disrupted due to the attack
  • Home-delivery subscribers received an early edition and were directed to the newspaper’s website
  • Considered the most significant disruption since the blizzard of Jan. 7-8, 1996
Source: BleepingComputer

Cuba Ransomware Gang’s Claims and Data Theft

  • Cuba ransomware gang publicly claims to have stolen files from The Philadelphia Inquirer
  • Stolen data, including financial documents and source code, made available on Cuba’s extortion portal
  • The newspaper’s refusal to pay ransom resulted in the release of all stolen files

Response and Ongoing Investigation

  • The Philadelphia Inquirer has yet to comment on the status of its systems and potential data theft
  • Investigation into the cyberattack and its implications is still underway
  • Cuba ransomware gang remains active and was previously linked to attacks on Ukrainian government agencies

The cyberattack on The Philadelphia Inquirer, claimed by the Cuba ransomware gang, has caused disruptions and data theft. The investigation into the incident continues as the newspaper assesses the impact and takes measures to secure its systems.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago