Ransomware Gang Says It’s Selling Data from Cyberattack That California DMV Warned About

Illustration for article titled Ransomware Gang Says Its Selling Data from Cyberattack That California DMV Warned About

Screenshot: Lucas Ropek/Cuba Ransomware website

A ransomware gang called “Cuba” claims to be selling off data on the dark web belonging to Automatic Funds Transfer Services (AFTS), a Seattle-based financial services and data management firm that suffered a bad ransomware attack in early February.

This is quite alarming, given that the California Department of Motor Vehicles announced yesterday that it is a longtime client of AFTS and that the February attack may have compromised approximately 20 months of data it had shared with the company, including the “names, addresses, license plate numbers and vehicle identification numbers (VIN)” of millions of Californians.

Advertisement

As noted in our previous coverage, the California DMV is not the only government agency that uses AFTS. About a dozen public entities in communities across Washington state have already made similar announcements: this includes Seattle, Kirkland, and Redmond, among many others. Many of these agencies used the firm for bill pay services, meaning that, in some cases, there is a possibility financial information may have been stolen.

It is unknown how many clients AFTS actually has, or how many entities are believed to have been affected by the attack. What is known is that the firm handles sensitive financial information for many of its clients, and that “Cuba” now claims to be selling “financial documents, correspondence with bank employees, account movements, balance sheets, and tax documents” that were compromised in the attack.

All of this can be viewed on Cuba’s dark web “leak site,” where AFTS data is listed as “paid content”:

Illustration for article titled Ransomware Gang Says Its Selling Data from Cyberattack That California DMV Warned About

Screenshot: Lucas Ropek/Cuba Ransomware site

Advertisement

“Cuba” has also posted data tranches from a number of other organizations, offering them up for free. This is a common tactic used on ransomware sites. Much like a Patreon page where a gig artist or writer may offer you a few clips for free to encourage you to subscribe, dark web sites offer free content to help legitimate the paid content, proving it’s worth shelling out money for their more exclusive material.

Threat analyst Brett Callow, who works for security firm Emsisoft, said that “Cuba” only recently started publicizing its alleged hacks. The group’s leak site was likely launched “earlier this month or late January,” said Callow, in an email to Gizmodo. “Interestingly, it seems that the group may have started stealing information much sooner, as one of the leaks appears to relate to an attack that was carried out in November 2019,” he said.

Advertisement

When reached by phone Thursday, an AFTS representative said that the company had hired a digital forensics firm to investigate the attack and that state and federal law enforcement were also assisting. The company has no further updates at this time, he said.

Leave a Comment