{"id":77489,"date":"2024-09-30T03:19:46","date_gmt":"2024-09-30T07:19:46","guid":{"rendered":"https:\/\/blog.cyberconservices.com\/?p=77489"},"modified":"2024-09-28T17:31:11","modified_gmt":"2024-09-28T21:31:11","slug":"warnings-after-new-valencia-ransomware-group-strikes-businesses-and-leaks-data","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2024\/09\/30\/warnings-after-new-valencia-ransomware-group-strikes-businesses-and-leaks-data\/","title":{"rendered":"Warnings After New Valencia Ransomware Group Strikes Businesses and Leaks Data"},"content":{"rendered":"<p>By Graham Cluley &#8211; A new ransomware operation has started to leak information it claims has been stolen from organisations it has compromised around the world.<\/p>\n<p>In recent days Valencia Ransomware has posted on its dark web leak site&#8217;s so-called &#8220;Wall of shame&#8221; links to gigabytes of downloadable information that has seemingly been exfiltrated from a Californian municipality, a pharmaceutical firm, and a paper manufacturer.<\/p>\n<p>The alleged victims include the City of Pleasanton in California (where the attacker claims to have stolen 283GB of sensitive information), Malaysian pharmaceutical firm Duopharma Biotech (25.7GB), Indian paper manufacturer Satia (7.1GB), and Bangladeshi drugs maker Globe Pharmaceuticals (200MB).<\/p>\n<p>There are additionally claims that Spanish fashion giant Tendam has also been hit by the Valencia group. If that is accurate, it is particularly unfortunate, as the firm was also reportedly hit by the Medusa ransomware earlier this month.<\/p>\n<p>There has been speculation online that some of the Valencia group&#8217;s attacks may be linked to the\u00a0<a title=\"Link to Bleeping Computer article\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-targeting-whatsup-gold-with-public-exploit-since-august\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">exploitation of critical vulnerabilities<\/a>\u00a0in the WhatsUp Gold networking monitoring software from Progress.<\/p>\n<p>Vulnerabilities that made it possible to takeover WhatsUp Gold admin accounts were discovered and responsibly disclosed in May, and proof-of-concept exploit code was published at the end of August.<\/p>\n<p>Within hours of the proof-of-concept code being published, security firms were\u00a0<a title=\"Link to Trend Micro blog post\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/24\/i\/whatsup-gold-rce.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">reporting evidence<\/a> that the flaw was being actively exploited by cybercriminals.\u00a0\u00a0<a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.tripwire.com\/state-of-security\/warnings-after-new-valencia-ransomware-group-strikes-businesses-and-leaks-data&amp;ct=ga&amp;cd=CAEYACoUMTY3MjU5NDA1MzcyMTczMTcyNzAyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AOvVaw38eMa3tMmAY-tykz2erEyc\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new ransomware operation has started to leak information it claims has been stolen from organisations it has compromised around the world.<\/p>\n <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2024\/09\/30\/warnings-after-new-valencia-ransomware-group-strikes-businesses-and-leaks-data\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a>","protected":false},"author":1,"featured_media":77490,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-77489","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.cyberconservices.com\/wp-content\/uploads\/2024\/09\/valencia.jpg","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=77489"}],"version-history":[{"count":1,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77489\/revisions"}],"predecessor-version":[{"id":77491,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/77489\/revisions\/77491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media\/77490"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=77489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=77489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=77489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}