Satellite TV giant Dish Network has confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen as part of the incident.
Dish started experiencing problems last week, when its websites, applications and various other services became unavailable. People immediately started to speculate that the issues may be caused by a cyberattack, but the company initially did not confirm reports, describing it as an internal outage.
However, Dish confirmed in a filing with the US Securities and Exchange Commission (SEC) on Tuesday that it was indeed targeted in a cyberattack, specifically a ransomware attack.
The incident was first announced on February 23 and an investigation revealed on February 27 that certain types of data were exfiltrated from the company’s IT systems.
“It is possible the investigation will reveal that the extracted data includes personal information,” Dish said in the SEC filing.
A forensic investigation is ongoing. External cybersecurity experts have been called in and law enforcement has been notified.
“Dish, Sling and our wireless and data networks remain operational; however the Corporation’s internal communications, customer call centers and internet sites have been affected. The Corporation is actively engaged in restoring the affected systems and is making steady progress,” the company said.
Dish shares have been on a downward trajectory since rumors of a possible hack started circulating.
SecurityWeek has checked the websites of several major ransomware groups, but has not seen any mention of Dish.
However, Bleeping Computer reported that the ransomware group Black Basta is behind the attack.
The Black Basta operation, which has been highly active, has been linked to a well-known Russian cybercrime group called FIN7.
Related: Ransomware Attack Hits US Marshals Service
Related: Ransomware Attack Forces Produce Giant Dole to Shut Down Plants
Related: Ransomware Attack Pushes City of Oakland Into State of Emergency

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
Latest News
- 14 Million Records Stolen in Data Breach at Latitude Financial Services
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- iOS Security Update Patches Exploited Vulnerability in Older iPhones
- Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April
- US to Adopt New Restrictions on Using Commercial Spyware
- Hackers Earn Over $1 Million at Pwn2Own Exploit Contest
- GoAnywhere Zero-Day Attack Hits Major Orgs
