Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Ransomware Gang Threatens to Publish Medibank Customer Information

On Monday, shortly after Australian health insurer Medibank said it will not pay a ransom following a recent cyberattack, the BlogXX/REvil ransomware gang threatened to make stolen Medibank customer information public.

On Monday, shortly after Australian health insurer Medibank said it will not pay a ransom following a recent cyberattack, the BlogXX/REvil ransomware gang threatened to make stolen Medibank customer information public.

Medibank disclosed the cyber incident on October 12, saying that no ransomware was deployed on its systems, albeit admitting days later that customer data might have been exfiltrated.

The health insurer confirmed on Monday that the attackers compromised the personal information of roughly 9.7 million customers, including names, addresses, birth dates, and email addresses. For hundreds of thousands of customers, health-related data was also accessed.

Medibank said it believed that the attackers likely exfiltrated all the data they were able to access, but added that no ransom would be paid, as it would not guarantee the return of the stolen data or the fact that it would not be made public.

Shortly after the company’s announcement, however, the BlogXX ransomware gang wrote on its leaks website that it would publish the stolen data within 24 hours.

Medibank ransomware

BlogXX emerged in April 2022, when the REvil ransomware gang’s leaks website started redirecting visitors to a new site, claiming to be a reborn operation. REvil made an exit in October 2021, after law enforcement reportedly seized its servers.

Based on multiple similarities with REvil, including the use of the Sodinokibi name (the initial name of REvil) and the reuse of REvil code, BlogXX is at least connected to REvil, if not a relaunch of the infamous ransomware operation.

In a Tuesday post, Medibank announced that it was aware of the ransomware gang’s claims, saying that it took into consideration the possible publication of the data and warning customers that the threat actor might attempt to contact them directly.

Advertisement. Scroll to continue reading.

“We are working with the Australian Government, including the Australian Cyber Security Centre and the Australian Federal Police. The Australian Federal Police is investigating this cybercrime and trying to prevent the sharing and sale of our customers’ data,” the company said.

Medibank reiterated that it would not pay a ransom, saying that this “decision is consistent with the position of the Australian Government.”

Related: Medibank Confirms Data Breach Impacts 9.7 Million Customers

Related: New Malware Samples Indicate Return of REvil Ransomware

Related: Australia Flags New Corporate Penalties for Privacy Breaches

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.