Dish Network reported a data breach subsequent to the ransomware attack in February and started the process of notifying the affected parties.

The broadcast company went offline on February 24, 2023, affecting, Dish Anywhere, and many other Dish Network services. The company acknowledged that the cause of the outage was a ransomware attack.

Black Basta Ransomware, Behind the Attack

The company was a victim of the Black Basta ransomware operation, according to BleepingComputer. Threat actors first infiltrated the company’s Windows domain controllers before encrypting the VMware ESXi servers and backups.

The satellite television giant has begun sending out notifications to the 296,851 affected customers.

The company stated that there are no indications of misuse of stolen information and confirmed that its customer databases were not accessed. It seems that only certain employee records and personal information had been accessed by threat actors.

We have since determined that the extracted data includes some of your personal information. We are not aware of any misuse of your information, and we have received confirmation that the extracted data has been deleted.

Nevertheless, we are writing to notify you of this incident and to provide you with the information and resources contained in this letter, including the details of an offer for free credit monitoring through our vendor TransUnion.

Data Breach Notification Letter


This statement above implies that the company paid a ransom to prevent their data from being leaked online. It also emphasizes that it has received confirmation that the extracted data has been deleted, explains Security Affairs.

We have since determined that our customer databases were not accessed in this incident. However, we have confirmed that certain employee-related records and personal information (along with information of some former employees, family members and a limited number of other individuals) were among the data extracted.


The company advises those affected to review their account statements and credit history on a regular basis for any suspicious activity and to remain vigilant against threats of identity theft or fraud. Individuals who believe they have been a victim of fraudulent activity are encouraged to contact their local police.

Check out the following articles if you want to learn more about: how ransomware spreads, how to mitigate and how to prevent ransomware attacks.

If you liked this article, follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.

Double Extortion Ransomware: The New Normal

Locking Out Cybercriminals: Here’s How to Prevent Ransomware Attacks

Dish Network Goes Offline: A Cyberattack Might Be the Cause

Five Ways Heimdal® Can Help You Protect Against Ransomware Attacks

How to Protect Your ESXi Servers From the Nevada Ransomware Attacks

Most Dangerous Ransomware Groups in 2022 You Should Know About

How to Create a Successful Cybersecurity Strategy

How to Mitigate Ransomware?

Ransomware Explained. What It Is and How It Works

Leave a Reply

Your email address will not be published. Required fields are marked *