Wisconsin-based tools manufacturer Snap-On Tools has been impacted by the Conti ransomware gang, which has already leaked less than 1GB of data stolen from the company on its data leak site, according to Forbes.
In a data breach notice, Snap-On said that attackers were able to infiltrate its systems between March 1 and March 3, with the suspicious activity identified in some of its computer systems environment. While the affected systems were immediately taken offline, Snap-On noted that threat actors were able to access and download selected personal information from its employees, including their names, birthdates, and Social Security numbers. Employee identification numbers of both company associates and franchisees may have also been impacted by the breach, according to Snap-On. The attack on Snap-On comes amid a crisis within Conti, which had its private chats, ransomware source code and cryptocurrency wallets leaked by a former member after the group had expressed support over Russia's invasion of Ukraine.
BleepingComputer reports that South Korean industrial, pharmaceutical, and healthcare firms leveraging Windows and VMware ESXi servers have been targeted by the novel GwisinLocker ransomware family in attacks occurring during the early morning hours of Korean public holidays.
Mailing vendor OneTouchPoint informed 30 health plans their patient data was accessed during a ransomware attack; now 326,278 Aetna members have been added to the tally. The incident leads this week’s healthcare data breach roundup.