Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Rhysida Ransomware Group Claims Attack on MYC Media, Demands Bitcoins

    Rhysida Ransomware Group Claims Attack on MYC Media, Demands Bitcoins

    July 9, 2024

    The notorious Rhysida ransomware group has added MYC Media to its long list of high-profile victims. MYC Media is a leading creative agency based out of Canada and specializes in providing comprehensive marketing solutions to businesses online.

    Rhysida ransomware group allegedly carried out a cyberattack on the digital company on July 7, 2024 and has given the company six days to respond. The threat actor has also demanded a ransom of 5 bitcoins as ransom for selling the data.

    Understanding the MYC Media Ransomware Attack

    According to its LinkedIn Page, “MYC Media is your national creative agency providing full-service marketing to businesses looking to expand their brand’s reach and make an impact. Over the past decade, we have evolved into a company which excels in many areas – from online marketing and website development to all types of printing and manufacturing services. We are well positioned to service any variety or size of business, from startups to multi-national corporations.”

    Source: MYC Media website

    The company was founded in 2008 in Mississauga, Ontario and employs around 11-50 employees along with 34 associate members. It has six divisions including MYC Graphics which takes care of printing, manufacturing and installation; Market Your Car – Vehicle Wraps and Graphics; MYC Interactive – Website Design, Development and Online Marketing; Pixter Studio – Online Wall Art, Canvas and Print Studio and FoodTruckWraps.ca – Food Truck Wraps and Graphics Specialists.

    Though the threat actor did not share details of the alleged ransomware attack, the group, on its dark web post, appealed to its buyers, “With just seven days on the clock, seize the opportunity to bid on exclusive, unique and impressive data. Open your wallets and be ready to buy exclusive Data. We sell only to one hand, no reselling, you will be the only owner!”

    Source: X

    Potential Impact of MYC Media Ransomware Attack

    If proven, the potential consequences of this ransomware attack could be critical. The media organization should take appropriate measures to protect the privacy and security of the stakeholders involved. Ransomware attacks can lead to identity theft, financial fraud, and a loss of trust among clients, potentially jeopardizing the company’s standing in the industry.

    Currently, details regarding the extent of the Rhysida ransomware attack, data compromise, and the motive behind the cyber assault remain undisclosed.

    Despite the claims made by Rhysida, the official website of MYC Media remains fully functional. This discrepancy has raised doubts about the authenticity of the Rhysida group’s assertion. To ascertain the veracity of the claims, The Cyber Express has reached out to the officials of the affected organizations. As of writing this news report, no response has been received, leaving the ransomware attack claim unverified.

    Rhysida Group Targeted Big Names Previously

    Rhysida is a notorious group that encrypts data on victims’ systems and threatens to make it publicly available unless a ransom is paid. The group uses eponymous ransomware-as-a-service techniques, targets large organizations rather than making random attacks on individuals, and demands large sums of money to restore data.

    The group orchestrated the notable 2023 British Library cyberattack and Insomniac Games data breach. It has also targeted many organizations, including some in the US healthcare sector, and the Chilean army.

    In November 2023, the US agencies Cybersecurity and Infrastructure Security Agency (CISA), FBI and MS-ISAC published an alert about the Rhysida ransomware and the actors behind it, with information about the techniques the ransomware uses to infiltrate targets and its mode of operation. The US CISA report states, “Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors.”

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleEuropol Expert Platform Data Breach Claimed by Hacker IntelBroker
    Next Article Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    LLaVA-Mini: Efficient Image and Video Large Multimodal Models with One Vision Token

    Development

    My Dyson Airwrap has replaced all my styling tools, and it’s $100 off ahead of Presidents’ Day

    News & Updates

    GameSir just showed off its G7 Pro “Xbox Elite” controller, and it looksspectacular

    News & Updates

    Smashing Security podcast #371: Unmasking LockBitsupp, company extortion, and a Tinder fraudster

    Development
    Hostinger

    Highlights

    CVE-2025-40632 – Icewarp Mail Server Cross-site Scripting (XSS)

    May 16, 2025

    CVE ID : CVE-2025-40632

    Published : May 16, 2025, 11:15 a.m. | 1 hour, 7 minutes ago

    Description : Cross-site scripting (XSS) in Icewarp Mail Server affecting version 11.4.0. This vulnerability allows an attacker to modify the “lastLogin” cookie with malicious JavaScript code that will be executed when the page is rendered.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Enhanced observability for AWS Trainium and AWS Inferentia with Datadog

    November 26, 2024

    A major Gemini feature is now free for all users – no Advanced subscription required

    February 14, 2025

    ChatGPT just made it easy to find and edit all the AI images you’ve ever generated

    April 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.