Heimdal
article featured image

Contents:

Dish Network reported a data breach subsequent to the ransomware attack in February and started the process of notifying the affected parties.

The broadcast company went offline on February 24, 2023, affecting Dish.com, Dish Anywhere, and many other Dish Network services. The company acknowledged that the cause of the outage was a ransomware attack.

Black Basta Ransomware, Behind the Attack

The company was a victim of the Black Basta ransomware operation, according to BleepingComputer. Threat actors first infiltrated the company’s Windows domain controllers before encrypting the VMware ESXi servers and backups.

The satellite television giant has begun sending out notifications to the 296,851 affected customers.

The company stated that there are no indications of misuse of stolen information and confirmed that its customer databases were not accessed. It seems that only certain employee records and personal information had been accessed by threat actors.

We have since determined that the extracted data includes some of your personal information. We are not aware of any misuse of your information, and we have received confirmation that the extracted data has been deleted.

Nevertheless, we are writing to notify you of this incident and to provide you with the information and resources contained in this letter, including the details of an offer for free credit monitoring through our vendor TransUnion.

Data Breach Notification Letter

Source

This statement above implies that the company paid a ransom to prevent their data from being leaked online. It also emphasizes that it has received confirmation that the extracted data has been deleted, explains Security Affairs.

We have since determined that our customer databases were not accessed in this incident. However, we have confirmed that certain employee-related records and personal information (along with information of some former employees, family members and a limited number of other individuals) were among the data extracted.

Source

The company advises those affected to review their account statements and credit history on a regular basis for any suspicious activity and to remain vigilant against threats of identity theft or fraud. Individuals who believe they have been a victim of fraudulent activity are encouraged to contact their local police.

Check out the following articles if you want to learn more about: how ransomware spreads, how to mitigate and how to prevent ransomware attacks.

If you liked this article, follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.

Author Profile

Madalina Popovici

Digital PR Specialist

linkedin icon

Madalina, a seasoned digital content creator at Heimdal®, blends her passion for cybersecurity with an 8-year background in PR & CSR consultancy. Skilled in making complex cyber topics accessible, she bridges the gap between cyber experts and the wider audience with finesse.

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE