Firewall Daily

Hive Ransomware Responsible for New York Racing Association Breach

Ransomware group Hive claimed responsibility for the cyberattack on horse racing track operator New York Racing Association that took place earlier this June. Following the attack, the hacker group obtained access to confidential data including the personal identifying information (PII) of the association’s employees and beneficiaries.

Twitter bot account @RansomwareNews posted the hacking collective’s claim on the microblogging and social networking platform. The tweet included the name of the group, the time, and the target of the attack.

What happened at NYRA

The New York Racing Association staff discovered the data breach on June 30. The Vice President of Communications at NYRA, Patrick McKenna, told intelligence company The Record that their staff found suspicious network activity that pointed towards the likeliness of a cyberattack.

After detecting the breach, the company immediately stopped connectivity to all impacted systems, and the relevant law enforcement and regulatory authorities took over the case. A cybersecurity team was also hired to investigate the attack.

The investigations went on for weeks, wherein a team of experts conducted a forensic analysis of the network and systems. This was also done to verify if any customer information was impacted.

As per the report, the hackers accessed files that contained the PII of a group of NYRA employees. PII usually contains sensitive information like social security number (SSN), address, email address, phone number, driver’s license, passport number, taxpayer identification number, bank account details, etc.

The company informed the impacted individuals of the data breach. However, they denied disclosing the specific number of people whose data was compromised in the breach.

The organization also offered Experian’s complimentary 24-month membership to help victims of the breach detect any suspicious activity, including identity theft.

Other systems are safe

Since the hacker accessed employee information alone, other data related to racing operations, customer wagering activity, NYRA Bets, or NYRA television were unaffected. “As a result, there was no interruption to NYRA’s core operations,” McKenna told The Record.

NYRA showed revenue of over $226 million in 2021 and had a staff base of nearly 800 employees. It operates the three largest racing tracks in the state of New York, the Saratoga Racecourse and Belmont Park.

Editorial

The Cyber Express brings you all the latest cybersecurity news, Hacker news and updates to help you stay ahead of the curve. Keep reading to stay safe online!

Recent Posts

The Cyber Express Weekly Roundup: AI Disruption, Regulatory Pressure, and the Evolving Cyber Threat Landscape

AI fraud, deepfake probes, SME cyber warnings, and ransomware cases highlight rising global risks in this week’s Cyber Express roundup.

2 days ago

French National Bank Authority Breach Exposed 1.2 Million Accounts

French national bank authority confirmed a major data breach affecting 1.2 million bank accounts after a malicious actor stole credentials…

2 days ago

What Big Tech Leaders Said On AI’s Future at India AI Impact Summit 2026

The real success of AI will not only depend on how powerful the technology becomes, but on how safely, fairly,…

2 days ago

Two Petabytes Worth Data of Israeli’s Siphoned, Says Cyber Head

Israel data breach totals two petabytes, with phishing up 35% and cyber influence attacks rising 170%, says Yossi Karadi.

2 days ago

Cyberattack Forces Clinic Closures, Surgery Cancellations at University of Mississippi Medical Center

The UMMC cyberattack halted surgeries, closed clinics statewide and triggered a federal probe into potential patient data exposure.

2 days ago

First Android Malware Weaponizes Gemini AI to Evade Detection, Maintain Persistence

ESET researchers discovered PromptSpy, the first known Android malware to integrate generative AI directly into its execution flow, marking a…

3 days ago

This website uses cookies. By continuing to use this website you are giving consent to cookies being used.

Read More