Medibank hackers claim to have leaked the last set of stolen files

The remainder of the stolen files were apparently published by hacking group REvil earlier this week

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

The remainder of the customer data stolen in theMedibank ransomware attackappear to have been published online.

REvil, the group behind the attack on the Australian health insurer, posted an update on its blog earlier this week, stating “Happy Cyber Security Day!!! Added folder full. Case closed”, TechCrunch reported.

Since publishing the post, the blog has been unavailable, making it impossible to independently confirm the authenticity of the files that were posted. However, Medibank said the folder hosted six raw data files, zipped to an archive. In total, six gigabytes of data were posted, making this the single biggest Medibank leak so far.

No financial data taken

No financial data taken

It said it was analyzing the data that was posted, but added that it “appears to be the data we believed the criminal stole”.

“While our investigation continues there are currently no signs that financial or banking data has been taken. And the personal data stolen, in itself, is not sufficient to enable identity and financial fraud. The raw data we have analyzed today so far is incomplete and hard to understand,” Medibank posted in an update.

The company concluded that it expects REvil to continue releasing files on the dark web, despite the group’s claims that everything has already been leaked.

IT workers believe ransomware is as serious as terrorism>Australian police and security services are working to defeat ransomware gangs>These are the best firewalls today

Medibank fell victim to the ransomware attack in late October 2022, at the hands of REvil, a group with alleged ties to the Russian government.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

After the initial investigation, it was said that information on 9.7 million customers was taken from companyendpoints, as well as health claims data relating to half a million others.

The company’s CEO, David Koczkar, later clarified via LinkedIn the type of data that was taken: “The criminal did not access credit card and banking details or health claims data for extras services,” he said.

It would later turn out that REvil got its hands on customer’s names, birth dates, passport numbers, information on medical claims and sensitive files related to abortions and alcohol-related illnesses. It also demanded $9.7 million in ransom, a dollar for each customer.

Via:TechCrunch

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

This new malware utilizes a rare programming language to evade traditional detection methods

A new form of macOS malware is being used by devious North Korean hackers

Arcane season 2 confirms the hit series isn’t just one of the best Netflix shows ever made – it’s an animated legend that’ll stand the test of time