Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Checkout.com Discloses Data Breach After Extortion Attempt

Checkout.com Discloses Data Breach After Extortion Attempt

Posted on November 14, 2025November 14, 2025 By CWS

International cost service supplier Checkout.com has disclosed a knowledge breach after a identified hacking group tried to extort it.

The incident, Checkout says, concerned a legacy, third-party cloud file storage system that had not been used since 2020, and didn’t have an effect on its cost processing platform.

“The system was used for inner operational paperwork and service provider onboarding supplies at the moment,” the corporate says.

“The episode occurred when risk actors gained entry to this third-party legacy system which was not decommissioned correctly. This was our mistake, and we take full accountability,” Checkout notes.

Based on the platform, the attackers didn’t entry service provider funds or card numbers.

Checkout has launched an investigation into the assault to find out its scope and establish the affected entities. It has reported the assault to regulation enforcement and the related regulators.

The assault, the corporate says, was claimed by the infamous ShinyHunters extortion group, which emerged in 2020 and joined forces with Scattered Spider earlier this 12 months. In September, Scattered Spider and ShinyHunters collectively introduced their retirement.

In October, a brand new group known as Scattered LAPSUS$ Hunters – doubtless an offshoot of Lapsus$, Scattered Spider, and ShinyHunters – emerged and claimed accountability for a Salesforce marketing campaign that impacted dozens of organizations.Commercial. Scroll to proceed studying.

The group leaked thousands and thousands of information allegedly stolen from compromised Salesforce situations and likewise tried to extort Salesforce, however the firm stated the hackers’ claims had been associated to previous or unsubstantiated incidents.

Their try and extort Checkout failed too. “We is not going to be extorted by criminals. We is not going to pay this ransom,” the corporate stated.

“As an alternative, we’re turning this assault into an funding in safety for our total trade. We might be donating the ransom quantity to Carnegie Mellon College and the College of Oxford Cyber Safety Middle to assist their analysis within the combat in opposition to cybercrime,” Checkout added.

Associated: In Different Information: RSA Encryption Assault, Meta AI Privateness, ShinyHunters Hacker Responsible Plea

Associated: CISA Confirms Exploitation of Newest Oracle EBS Vulnerability

Associated: Scattered Spider Suspect Arrested in US

Associated: Oracle Says Recognized Vulnerabilities Presumably Exploited in Current Extortion Assaults

Security Week News Tags:Attempt, Breach, Checkout.com, Data, Discloses, Extortion

Post navigation

Previous Post: Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack
Next Post: SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT

Related Posts

Fortinet, Ivanti Release August 2025 Security Patches Fortinet, Ivanti Release August 2025 Security Patches Security Week News
Global Crackdown on Aisuru and Kimwolf Botnets Global Crackdown on Aisuru and Kimwolf Botnets Security Week News
Landfall Android Spyware Targeted Samsung Phones via Zero-Day Landfall Android Spyware Targeted Samsung Phones via Zero-Day Security Week News
China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links China Issues Warrants for Alleged Taiwanese Hackers and Bans a Business for Pro-Independence Links Security Week News
Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware Chinese APT ‘Phantom Taurus’ Targeting Organizations With Net-Star Malware Security Week News
MITRE Publishes Post-Quantum Cryptography Migration Roadmap MITRE Publishes Post-Quantum Cryptography Migration Roadmap Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark