Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Lee Enterprises Says 40,000 Hit by Ransomware-Caused Data Breach

Posted on June 5, 2025June 5, 2025 By CWS

American media firm Lee Enterprises revealed this week that the disruptive cyberattack it handled earlier this yr resulted in an information breach impacting practically 40,000 people.

Lee Enterprises owns 350 weekly and specialty publications throughout 25 states, and dozens of them suffered disruptions in February on account of a ransomware assault that concerned the encryption of crucial functions and the theft of recordsdata.

The corporate knowledgeable the Maine Legal professional Common’s Workplace this week that it not too long ago accomplished its investigation into the incident and decided that non-public data was compromised.

In keeping with Lee Enterprises, the attackers might have obtained the knowledge of 39,779 individuals, together with their names and Social Safety numbers.

Affected people are being provided 12 months of free credit score monitoring and identification safety companies.

The Qilin ransomware gang took credit score for the assault on Lee Enterprises in late February, claiming to have stolen 350 Gb of recordsdata.

The cybercriminals on the time threatened to leak the stolen knowledge until a ransom was paid. They revealed samples of the info to exhibit their claims, together with screenshots of passport and driver’s license scans, in addition to company paperwork. 

It’s unclear if the Qilin group did make the stolen knowledge public. Lee Enterprises now not seems to be listed on the cybercrime gang’s Tor-based leak web site. Commercial. Scroll to proceed studying.

Lee Enterprises famous that it has “no proof of the misuse, or tried misuse, of any probably impacted data”.

Associated: Australia Enforces Ransomware Cost Reporting

Associated: MATLAB Maker MathWorks Recovering From Ransomware Assault

Associated: 364,000 Impacted by Knowledge Breach at LexisNexis Danger Options

Security Week News Tags:Breach, Data, Enterprises, Hit, Lee, RansomwareCaused

Post navigation

Previous Post: Ransomware Gang Leaks Alleged Kettering Health Data
Next Post: DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown

Related Posts

New UK Framework Pressures Vendors on SBOMs, Patching and Default MFA Security Week News
Tidal Cyber Raises $10 Million for CTI and Adversary Behavior Platform Security Week News
Fortinet, Ivanti Patch High-Severity Vulnerabilities Security Week News
Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers Security Week News
Hacker Conversations: Rachel Tobac and the Art of Social Engineering Security Week News
Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Products Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News