The Maze Team attackers uphold to announce more of their ransomware victims that have not complied with their ransom demands, and they continue to dump data from those who do not pay them. When I checked their site again today, I noticed that they had announced that they have dumped all their files on the City of Pensacola, and they have also dumped all their files on Salumificio Fratelli Beretta, a cured meat provider. But i also regard other sites that get been added or updated, including Stockdale Radiology in California. Stockdale Radiology is 1 of the medical entities Maze Team had informed me about previously and had sent me a sample of patient files from. According to Maze Team’s site, the radiology center’s data were locked on january 17 of this year. The site lists two zipped archives of files as proof — but both links yield 404 as of today’s date. There is no mark up on Stockdale Radiology’s site at this time about any assail or disruption in their services. Medical Diagnostic Laboratories, LLC (MDL or MDLab) had already had some of their data dumped by maze Team. They now appear to have had more of their files dumped. There is no announcement or note on their website that might inform patients of any problem or data theft and there is no note from the listed on HHS’s public breach cock at this time. When i had asked Maze team about their success rate in terms of victims paying them, they indicated that it was more than 50%, although of course, i experience no way to verify that particular claim. But there are other medical entities that they claim they have attacked that have not appeared on their website yet, so I fear we are in for a lot of announcements and updates from them. Lakeland Community College in Ohio also became a victim, it seems. Their data were reportedly locked on january 12 and 19 gigabyte of data were allegedly downloaded. There is no notice on the college’s site as of today, and the proof file is not linked to a working file. And while my focussing tends to live on medical and educational facilities, let’s not forget that maze Team is attacking all kinds of enterprises, including, it seems, Anheuser-Busch (ST. LOUIS, MO). Maze team does not provide a interlock date, but they added them to their site three weeks ago and they do provide sample files from the well-known beer brewery. The samples include some certified mail, a number of lease-related files, sales projections, and other files that include their 2019 incident response project for any PCI-DSS incidents. They experience also attacked a law firm in Oregon: Hamilton and Naumes, LLC. That onset took station on January 16, and there are no proof files uploaded as of today’s date, but if they were able to receive everything, then there may well be a draw of sensitive files as the firm’s areas of practice include family law, juvenile law, and criminal defense. And as I did with covering thedarkoverlord, i will note that i realize why some journalists will not underwrite these attackers or other attackers using the same poser for veneration of encouraging them or for awe of portion to put coerce on the victim entities. i respect that decision by others spell continuing to believe that i serve the public best by retention it informed as to what is going on so that they canful gauge peril for themselves and perhaps take more steps to keep themselves from becoming victims.