Ransomware Group Claims To Have Hit Operator Of Eden Park Stadium
A ransomware gang claims to have hacked trans-Tasman hospitality company O’Brien Group, which operates Auckland’s Eden Park stadium and several major stadiums in Australia.
A posting by the gang indicated that Melbourne-based O’Brien Group had been targeted by Lock bit 3.0 ransomware and that its computer files had been dumped online.
Nondisclosure From The Company
Stuff has not accessed the files but their records indicated they encompassed operational and financial data including payroll data.
O’Brien Group declined an invitation to comment.
A spokesperson for the Office of the Privacy Commissioner said it had no record of O’Brien Group reporting a data breach.
Lock bit ransomware was used in a spate of attacks on New Zealand businesses last year.
Brett Callow, a Canadian-based threat analyst at New Zealand cyber-security company Emsisoft, said Lock bit was one of the most active ransomware operations.
He said It’s a RaaS, or ‘ransomware-as-a-service’ operation which means that the people who created the ransomware ‘rent’ it to the people who carry out the attacks.
Moreover, their identity is unknown and those people could be based anywhere – perhaps even in New Zealand or Australia.
Assertion Of Stolen Data Released
In this case, LockBit is professing to have released all the data which was allegedly stolen.
When data is released, it usually means the company refused to pay the ransom demand.”
The facilities O’Brien Group operates in Australia include AAMI Stadium Melbourne, Brisbane’s Suncorp and Gabba stadiums, and the Adelaide Showground.
It also owns a portfolio of boutique hotels.