Namibia’s state telecom provider says hackers leaked data after it refused to pay ransom

Avatar

Namibia’s state-owned telecom provider confirmed Monday that some of its customers’ data was leaked on the dark web following a ransomware attack.

Telecom Namibia attributed the attack to a threat actor known as Hunters International. According to the company’s chief executive, Stanley Shanapinda, the hackers made the stolen data public after Telecom Namibia had refused to negotiate with them about the potential ransom.

“We don’t negotiate with cyber terrorists,” Shanapinda said in an interview with local media. “We know the sums they’re asking for are exorbitant and unaffordable, so there’s no reason to even consider discussing it. And even if you do pay a ransom, there’s no guarantee the information won’t still be leaked.”

The company didn’t specify what kind of data was stolen by the cybercriminals, but according to local media reports, the hackers accessed over 400,000 files, including personal and financial data belonging to some high-ranking government officials and Telecom Namibia’s clients.

The company said in a statement that it is currently analyzing the leaked data and working with local law enforcement to minimize any further exposure and risk to all its customers.

Some of the leaked data has reportedly already been circulating on social media, but Telecom Namibia warned individuals that it would be a criminal offense to share or use it for malicious purposes.

The Hunters International group emerged last October. It operates ransomware-as-a-service and was once believed to be a rebrand of the notorious Hive ransomware operation, which was dismantled by the FBI in January 2023. The group has denied the allegations about this connection, stating that they are a new service in the ransomware scene that purchased the encryptor source code from the Hive developers.

The gang is known for its attacks on companies in the health, automotive, manufacturing, logistics, financial, education and food industries.

The group’s attack on Telecom Namibia attracted the attention of the country’s authorities. Namibia’s  President, Nangolo Mbumba, said he considers cybersecurity a crucial part of national security, according to his spokesperson Alfredo Hengari.

“In that vein, any threat to our security architecture, including cyberattacks, is dealt with the urgency it deserves,” Hengari said.

Confidential information from the Office of the President was reportedly leaked by Hunters International, although Recorded Future News couldn’t verify this claim.

The country’s security experts said that the customers affected by the Telecom Namibia breach can’t do much, as Namibia’s Data Protection Act, which could impose significant fines and penalties for such data breaches, has not yet been enforced. However, in some cases, they could be allowed to make claims for damages due to negligence in safeguarding data.

Amid the Telecom Namibia incident, another threat actor claimed to have gained access to the country’s Ministry of Health and Social Services and targeted the Ministry’s pharmaceutical data. These reports weren’t officially verified.

CybercrimeGovernmentNewsTechnology
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

Next Post

Rhode Island governor warns residents of cyberattack on state benefits system

Related Posts

5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage

Since its emergence, Generative AI has revolutionized enterprise productivity. GenAI tools enable faster and more effective software development, financial analysis, business planning, and customer engagement. However, this business agility comes with significant risks, particularly the potential for sensitive data leakage. As organizations attempt to balance productivity gains with security
Avatar
Read More

New Case Study: The Evil Twin Checkout Page

Is your store at risk? Discover how an innovative web security solution saved one global online retailer and its unsuspecting customers from an “evil twin” disaster. Read the full real-life case study here. The Invisible Threat in Online Shopping When is a checkout page, not a checkout page? When it's an “evil twin”! Malicious redirects can send unsuspecting shoppers to these perfect-looking
Avatar
Read More