New York Racing Association confirms hack by Hive ransomware group
The hacker group previously targeted Costa Rican healthcare service, French Telco Altice, and Bell Canada subsidiary BTS
The Hive ransomware group has claimed an attack on the New York Racing Association (NYRA), the latest in a series of cyber attacks.
NYRA first disclosed the hack on June 30, after learning its IT operations, website availability, and member data were compromised.
RELATED RESOURCE
Escape the ransomware maze
Conventional endpoint protection tools just aren’t the best defence anymore
In its security breach notification sent to impacted individuals, the company confirmed that the threat actors gained access to personally identifiable information of a group of NYRA employees and their beneficiaries. However, customer data was unaffected, the company affirmed.
Social security numbers, driver's license identification numbers, health records, and health insurance information are among the exposed details.
As part of the attack, the Hive hacker group also posted a free link to download a ZIP file containing stolen data from the firm’s internal systems.
Acknowledging the scope of the attack, an NYRA spokesperson revealed: “On June 30, 2022, NYRA discovered suspicious network activity that had the markings of a potential cyber-attack.”
“In response, NYRA immediately suspended the connectivity of all affected systems, notified the relevant law enforcement and regulatory authorities, and mobilized cyber-security professionals to investigate the nature and scope of the attack.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
NYRA is also set to cover the cost of an identity protection service offered by Experian to help mitigate risks of identity theft for affected employees.
“Vermont residents can also consider placing a security freeze on their credit reports. A security freeze prevents most potential creditors from viewing your credit reports and therefore, further restricts the opening of unauthorized accounts,” the company added.
-
2026 in IoT attacks: the biggest threats so far and what businesses can doIn-depth Internet of Things devices are more useful than ever – but security is still playing catch-up
-
Anthropic is increasing Claude Code usage limits — here’s everything you need to knowNews The new deal will help Anthropic increase Claude Code usage limits, and API rate limits for Claude Opus models
-
Ransomware negotiator sentenced for role in major cyber crime groupNews Deniss Zolotarjovs was a key player in a group associated with Conti
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites