therecord.media Open in urlscan Pro
2606:4700:4400::ac40:91e2  Public Scan

URL: https://therecord.media/namibia-state-telecom-provider-data-leaked-after-ransom-refusal
Submission: On December 17 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form data-hs-cf-bound="true"><span class="text-black text-sm icon-search"></span><input name="s" placeholder="Search…" type="text" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept


 * Leadership

 * Cybercrime

 * Nation-state

 * Elections

 * Technology

 * Cyber Daily®

 * Click Here Podcast

Go
Subscribe to The Record

✉️ Free Newsletter


Image: Unsplash+/Telecom Namibia
Daryna Antoniuk
December 16th, 2024
 * Cybercrime
 * Government
 * News
 * Technology

 * 
 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


NAMIBIA’S STATE TELECOM PROVIDER SAYS HACKERS LEAKED DATA AFTER IT REFUSED TO
PAY RANSOM

Namibia’s state-owned telecom provider confirmed Monday that some of its
customers’ data was leaked on the dark web following a ransomware attack.

Telecom Namibia attributed the attack to a threat actor known as Hunters
International. According to the company’s chief executive, Stanley Shanapinda,
the hackers made the stolen data public after Telecom Namibia had refused to
negotiate with them about the potential ransom.



“We don’t negotiate with cyber terrorists,” Shanapinda said in an interview with
local media. “We know the sums they’re asking for are exorbitant and
unaffordable, so there’s no reason to even consider discussing it. And even if
you do pay a ransom, there’s no guarantee the information won’t still be
leaked.”

The company didn’t specify what kind of data was stolen by the cybercriminals,
but according to local media reports, the hackers accessed over 400,000 files,
including personal and financial data belonging to some high-ranking government
officials and Telecom Namibia’s clients.

The company said in a statement that it is currently analyzing the leaked data
and working with local law enforcement to minimize any further exposure and risk
to all its customers.

Some of the leaked data has reportedly already been circulating on social media,
but Telecom Namibia warned individuals that it would be a criminal offense to
share or use it for malicious purposes.

The Hunters International group emerged last October. It operates
ransomware-as-a-service and was once believed to be a rebrand of the notorious
Hive ransomware operation, which was dismantled by the FBI in January 2023. The
group has denied the allegations about this connection, stating that they are a
new service in the ransomware scene that purchased the encryptor source code
from the Hive developers.

The gang is known for its attacks on companies in the health, automotive,
manufacturing, logistics, financial, education and food industries.



The group’s attack on Telecom Namibia attracted the attention of the country’s
authorities. Namibia’s  President, Nangolo Mbumba, said he considers
cybersecurity a crucial part of national security, according to his spokesperson
Alfredo Hengari.

“In that vein, any threat to our security architecture, including cyberattacks,
is dealt with the urgency it deserves,” Hengari said.

Confidential information from the Office of the President was reportedly leaked
by Hunters International, although Recorded Future News couldn’t verify this
claim.

The country’s security experts said that the customers affected by the Telecom
Namibia breach can’t do much, as Namibia’s Data Protection Act, which could
impose significant fines and penalties for such data breaches, has not yet been
enforced. However, in some cases, they could be allowed to make claims for
damages due to negligence in safeguarding data.

Amid the Telecom Namibia incident, another threat actor claimed to have gained
access to the country’s Ministry of Health and Social Services and targeted the
Ministry’s pharmaceutical data. These reports weren’t officially verified.

 * 
 * 
 * 
 * 
 * 
 * 

Tags
 * telecom
 * Namibia
 * Critical Infrastructure
 * Ransomware
 * Hive ransomware
 * Hunters International

Previous articleNext article
Rhode Island governor warns residents of cyberattack on state benefits system
American private equity firm buys Israeli spyware company Paragon

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about
cybersecurity startups, cyberattacks in Eastern Europe and the state of the
cyberwar between Ukraine and Russia. She previously was a tech reporter for
Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent
and The Kyiv Post.




BRIEFS

 * American private equity firm buys Israeli spyware company ParagonDecember
   16th, 2024
 * BlackBerry offloads Cylance for a fraction of what it paid in 2019December
   16th, 2024
 * Russia bans Viber, claiming app facilitates terrorism and drug
   traffickingDecember 16th, 2024
 * South Carolina credit union says 240,000 impacted by recent
   cyberattackDecember 13th, 2024
 * Three arrested in Kosovo for operating Rydox cybercriminal
   marketplaceDecember 13th, 2024
 * Texas AG launches investigation into 15 tech companies for violating child
   privacy lawDecember 13th, 2024
 * North Korean hackers behind $50 million crypto heist of Radiant
   CapitalDecember 12th, 2024
 * Online ordering at Krispy Kreme disrupted by cyberattackDecember 11th, 2024
 * French internet operator fined $53 million for unsolicited ads and tracking
   users without consentDecember 10th, 2024


BREAKING THE CIRCLE: CHINESE COMMUNIST PARTY PROPAGANDA INFRASTRUCTURE RAPIDLY
EXPANDS


Breaking the Circle: Chinese Communist Party Propaganda Infrastructure Rapidly
Expands


BLUEALPHA ABUSES CLOUDFLARE TUNNELING SERVICE FOR GAMMADROP STAGING
INFRASTRUCTURE


BlueAlpha Abuses Cloudflare Tunneling Service for GammaDrop Staging
Infrastructure


SCAM WEBSITES TAKE ADVANTAGE OF SEASONAL OPENINGS AND ESTABLISHED METHODS TO
MAXIMIZE IMPACT


Scam Websites Take Advantage of Seasonal Openings and Established Methods to
Maximize Impact


"OPERATION UNDERCUT" SHOWS MULTIFACETED NATURE OF SDA’S INFLUENCE OPERATIONS


"Operation Undercut" Shows Multifaceted Nature of SDA’s Influence Operations


RUSSIA-ALIGNED TAG-110 TARGETS ASIA AND EUROPE WITH HATVIBE AND CHERRYSPY


Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY
 * 
 * 
 * 
 * 
 * 
 * 

 * Privacy

 * About

 * Contact Us

© Copyright 2024 | The Record from Recorded Future News