Skip to main content

Georgia county voter information leaked by ransomware gang


The DoppelPaymer ransomware gang has released unencrypted data stolen from Hall County, Georgia, during a cyberattack earlier this month.

On October 7th, Hall County in Georgia announced that they had suffered a ransomware attack that impacted their networks and phone systems.

At the time, Hall County stated that there was no indication that the hackers stole any unencrypted data before performing the attack,



"At this time, there is no evidence to show that citizen or employee data has been compromised. However, citizens and employees are encouraged to take precautionary measures to monitor and protect their personal information," Hall County stated.
Hall County data leaked by threat actors

Today, the DoppelPaymer ransomware gang published a little over 1 GB of unencrypted files stolen from Hall County computers and claim to have encrypted 2,464 devices during the attack.
The leaked data includes 911 spreadsheets, election documents, lobby comment cards, and accounting and financial records.


The election documents reviewed by BleepingComputer contain ballot proofs, poll worker lists, administrative documents, accounting and financial records, and city bulletins. Also included are voter registration records containing resident's voter registration ID, full name, address, and assigned ballot, which is, for the most part, public information.

BleepingComputer has been told that at least one document contained a voter's social security number.

While most of the information released as part of this leak is public info, the data can be used in targeted phishing attacks or even for voter intimidation.

Last week, the US government disclosed that Iran was behind voter intimidation emails sent to Democrats in Florida and Alaska that pretended to be from the far-right Proud Boys group.

 

News Source @ Bleepingcomputer

Comments

Popular posts from this blog

WannaRen, died in past reborn in present now targeting India

Credit: Trend-micro Originally WannaRen discovered in 2020 when it is used against Chinese internet users. it is used for a very short time-span but damaged a lot in that short time than ransomware author shared the decryption keys to a security company in August 2020 and we believe that it was the end of WannaRen ransomware. October 2022 Trend Micro team discovered "Life ransomware" which they believe may be a new variant of WannaRen. New Variant targeted Indian organizations .

Prilex: The Most Advanced PoS Malware with the Ability to Block Contactless Payments

Prilex is a highly advanced malware that has evolved from ATM-focused malware into a unique modular PoS malware, known to be the most advanced PoS threat seen so far. It has a unique cryptographic scheme, performs real-time patching in target software, forces protocol downgrades, manipulates cryptograms, performs GHOST transactions and performs credit card fraud. Recently, three new versions of Prilex have been discovered with the ability to block contactless payment transactions, which have become popular due to the pandemic. These new versions block NFC-based transactions and force victims to use their physical card by inserting it into the PIN pad reader, which allows the malware to capture the data coming from the transaction.

Newcomers to the Cybersecurity Space: Opportunities Abound for Those Willing to Learn and Adapt to an Evolving Industry

There are several key roles within the cyber security field that are in high demand in the job market. Some of the top profiles in the market include: Cybersecurity Analyst: These professionals are responsible for identifying, assessing, and mitigating security threats to an organization's computer systems and networks. Penetration Tester: Also known as ethical hackers, these professionals are hired to test the security of an organization's systems and networks by simulating a cyber attack. Security Engineer: These professionals design, develop, and implement security systems and solutions to protect an organization's networks and data. Security Operations Center (SOC) Analyst: These professionals monitor and analyze security data to detect and respond to potential security threats and incidents.