Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Ransomware Gang Threatens to Publish Medibank Customer Information

On Monday, shortly after Australian health insurer Medibank said it will not pay a ransom following a recent cyberattack, the BlogXX/REvil ransomware gang threatened to make stolen Medibank customer information public.

On Monday, shortly after Australian health insurer Medibank said it will not pay a ransom following a recent cyberattack, the BlogXX/REvil ransomware gang threatened to make stolen Medibank customer information public.

Medibank disclosed the cyber incident on October 12, saying that no ransomware was deployed on its systems, albeit admitting days later that customer data might have been exfiltrated.

The health insurer confirmed on Monday that the attackers compromised the personal information of roughly 9.7 million customers, including names, addresses, birth dates, and email addresses. For hundreds of thousands of customers, health-related data was also accessed.

Medibank said it believed that the attackers likely exfiltrated all the data they were able to access, but added that no ransom would be paid, as it would not guarantee the return of the stolen data or the fact that it would not be made public.

Shortly after the company’s announcement, however, the BlogXX ransomware gang wrote on its leaks website that it would publish the stolen data within 24 hours.

Medibank ransomware

BlogXX emerged in April 2022, when the REvil ransomware gang’s leaks website started redirecting visitors to a new site, claiming to be a reborn operation. REvil made an exit in October 2021, after law enforcement reportedly seized its servers.

Based on multiple similarities with REvil, including the use of the Sodinokibi name (the initial name of REvil) and the reuse of REvil code, BlogXX is at least connected to REvil, if not a relaunch of the infamous ransomware operation.

In a Tuesday post, Medibank announced that it was aware of the ransomware gang’s claims, saying that it took into consideration the possible publication of the data and warning customers that the threat actor might attempt to contact them directly.

“We are working with the Australian Government, including the Australian Cyber Security Centre and the Australian Federal Police. The Australian Federal Police is investigating this cybercrime and trying to prevent the sharing and sale of our customers’ data,” the company said.

Medibank reiterated that it would not pay a ransom, saying that this “decision is consistent with the position of the Australian Government.”

Related: Medibank Confirms Data Breach Impacts 9.7 Million Customers

Related: New Malware Samples Indicate Return of REvil Ransomware

Related: Australia Flags New Corporate Penalties for Privacy Breaches

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.