Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Breaches

Ransomware Group Takes Credit for Lee Enterprises Attack

The Qilin ransomware gang claims to have stolen 350 Gb of files from Lee Enterprises in the attack that caused newspaper disruptions.

Lee Enterprises cyberattack

A ransomware gang has taken credit for the recent attack on Lee Enterprises, which caused disruptions at dozens of local newspapers.

The cyberattack came to light in early February, when the American media company, which owns roughly 350 weekly and specialty publications across 25 states, revealed that the incident had impacted business applications and resulted in operational disruptions. 

The attack reportedly impacted at least 75 newspapers across the US, including the distribution of print publications and online operations. 

The company later clarified that the attackers encrypted files and exfiltrated information from its systems, which indicated that it had been targeted in a ransomware attack.

On February 27, the Qilin ransomware group announced that it was behind the attack on Lee Enterprises in a post on its Tor-based leak website. This indicates that Lee Enterprises has refused to pay a ransom or negotiations have stalled. 

The hackers claimed to have obtained 350 Gb of files from Lee Enterprises systems, including “investor records, financial arrangements that raise questions, payments to journalists and publishers, funding for tailored news stories, and approaches to obtaining insider information”.

The cybercriminals are threatening to leak the stolen data on March 5 unless a ransom is paid. To demonstrate their claims, they have published samples of the stolen data, including screenshots of passport and driver’s license scans, corporate documents, and spreadsheets. 

Qilin is a Russia-linked ransomware-as-a-service that appears to have been around since October 2022. It has targeted a wide range of organizations, including London hospitals, which were forced to cancel operations and appointments due to the attack. 

Advertisement. Scroll to continue reading.

Qilin has to date published the names of roughly 300 victims on its leak website. The actual number of targeted organizations is likely significantly higher considering that many victims decide to pay a ransom — only those that refuse to pay up are named on leak sites. 

Related: Philadelphia Inquirer Hit by Cyberattack Causing Newspaper’s Largest Disruption in Decades

Related: Media Giant News Corp Discloses New Details of Data Breach

Related: New York Times Responds to Source Code Leak

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this in-depth briefing on how to protect executives and the enterprises they lead from the growing convergence of digital, narrative, and physical attacks.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Cybersecurity firm Absolute Security announced Harold Rivas as its new CISO.

Simon Forster has been named the new General Manager of DNS security firm Quad9.

Cybersecurity training company Immersive has named Mark Schmitz as its new CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.