Share this article on:
A threat actor has posted what they claim to be the data of Kadac Australia after the company suffered a ransomware attack earlier this month.
Kadac Australia suffered a ransomware attack just under two weeks ago, which was claimed by the Medusa ransomware gang. Medusa gave Kadac 10 days to pay a ransom of $100,000 to prevent its data from being leaked.
Around five days later, a hacker has taken to the infamous BreachForums to share a “review” of the data leak, revealing what data was included in the leak.
“The data leak includes a lot of personal data of employees, suppliers, partners and clients of the company, payment invoices, import and export data, risk analysis, audit and balance sheet of the company, access to documentation, email addresses with passwords, employee documents and mail correspondence, financial reports, contracts and agreements of the company over the past few years, sales strategy and plans for the current year,” wrote Osint_Proff, who claimed to represent an organisation called Osintcorp.
“I am sure that this data leak will find its consumer. Watch my video review, and if you are interested, download the leaked data to study for yourself.
“As always, you can download data in any way convenient for you from my website or telegram channel. Traditional thanks to Kadac management for the data provided. Don’t skimp on information security. Always yours. Robert.”
A temporary download link, as well as a link to a video review of the leak, was posted.
Upon further investigation on Osintcorp, Cyber Daily observed an X account belonging to a Robert Vroofdown, which covers leaks and shares the tools he uses.
Kadac is still yet to issue a public statement on its website. Additionally, calls from Cyber Daily to Kadac time out and email accounts seem unreachable, with Gmail postmaster saying it cannot be delivered. This may not be an issue with Kadac, and Cyber Daily is not suggesting that the company has cut communication.
The organisation’s website still appears to be operational.