LockBit, a notorious ransomware operator, has targeted OracleCMS, an Australian call centre operator, in a recent cyber attack. The attack occurred on April 4, with LockBit posting about it on its leak site on April 12. Despite not specifying a ransom demand, LockBit threatened to publish the entire dataset if their deadline of April 16 passed.
After the deadline lapsed, LockBit made good on its threat and released over 60GB of data, including billing and financial details, on its leak site. The leaked data encompasses a wide range of documents related to OracleCMS clients, such as local councils, law firms, and the Queensland branch of the Philadelphia Church of God. This includes sensitive information like on-call mobile numbers, client contracts, and internal documents.
Following the breach, OracleCMS engaged external cyber security experts to investigate and secure its systems. The company released a statement acknowledging the incident, stating that the data exposed was primarily limited to corporate information, contracts, invoices, and triage process workflows. While personal information present in the data is believed to be basic contact information, OracleCMS is working with potentially impacted client organizations to mitigate any risks of data misuse.
This incident underscores the ongoing threat posed by ransomware attacks and the importance of robust cybersecurity measures. It highlights the need for organizations to continuously monitor and strengthen their defenses against such threats. Additionally, it emphasizes the importance of prompt response and collaboration with cybersecurity experts to mitigate the impact and protect sensitive data.