RICHMOND, ÎÚÑ»´«Ã½ — Retailer London Drugs says cybercriminals who stole files from its corporate head office last month have released some of the data after it refused to pay a ransom.
The Richmond, ÎÚÑ»´«Ã½-based company says in a statement the files may contain "some employee information," calling it a "deeply distressing" situation.
London Drugs was responding to a social media post by Brett Callow, a ÎÚÑ»´«Ã½-based threat analyst with anti-virus software company Emsisoft, which said the hacking group LockBit had released what it claimed was the company's data.
Lockbit has been described by British authorities as "the world's most harmful cybercrime group."
Callow said LockBit released more than 300 gigabytes of data on Thursday, describing it as an "absolutely huge amount" of information that could represent hundreds of thousands or possibly even millions of individual records.
He said that if the data proved to be from London Drugs, the move suggested LockBit had "given up" on being able to monetize the attack. The release also showed the hackers' future victims what could happen if they refused to pay up, Callow said.
The statement from London Drugs said it was "unwilling and unable" to pay a ransom to hackers it described as "a sophisticated group of global cybercriminals."
It said London Drugs was notifying employees whose personal information may have been affected and offering them credit monitoring and identity theft protection services.
The company said there was no indication any patient or customer databases were compromised in the breach that forced London Drugs to shut down its stores across Western ÎÚÑ»´«Ã½ after it was discovered on April 28.
It said it was reviewing the files that may have been stolen and it would contact affected employees to tell them what personal information had been compromised.
Callow said London Drugs employees who were worried about the potential release of their personal information should be "very skeptical" of any communications they receive and avoid clicking on links in any unfamiliar text messages or emails.
He said it was possible that leaked data could be downloaded and used for identity-related fraud, but there was no evidence this was happening routinely with such releases.
"For the most part, the data simply seems to sit there and generally not be misused. So this isn't a no-risk situation by any means for the individuals whose information has been compromised, but the good news is that it is fairly low risk."
Callow said the National Crime Agency of the United Kingdom led a consortium of law enforcement agencies in disrupting LockBit's activities in February.
At the time, a statement from the agency said it had infiltrated LockBit's network and taken control of its services, "compromising their entire criminal enterprise."
It described LockBit as "the world's most harmful cybercrime group," providing a global network of hackers with the tools they need to carry out attacks.
A subsequent statement issued earlier this month identified a man from Russia as the "administrator and developer of the LockBit ransomware group."
It said the man would be subject to a series of asset freezes and travel bans, and U.S. authorities were offering a reward of up to US$10 million for information leading to his arrest and conviction.
The agency said LockBit had "attempted to rebuild," but the group was running at limited capacity and the global threat it poses was "significantly reduced."
Still, it said the group had created a "new leak site."
The statement said data obtained from LockBit systems showed hackers conducted more than 7,000 attacks using their services between June 2022 and last February.
The Canadian RCMP is listed among law enforcement agencies around the world that have participated in the taskforce targeting LockBit.
It's very difficult for police in ÎÚÑ»´«Ã½ to pursue cybercriminals, such as those behind LockBit, who are based outside the country, Callow said in an interview.
Russia doesn't extradite its citizens, he noted.
The hardest-hit countries in the attacks were the United Kingdom, United States, France, Germany and China, the U.K. agency said.
London Drugs closed all 79 of its stores in ÎÚÑ»´«Ã½, Alberta, Saskatchewan, and Manitoba when it became aware of the cyberattack.
All of the stores weren't open again until May 7.
The attack was part of a series of hacking incidents that included what the ÎÚÑ»´«Ã½ government called a "sophisticated" attempt by criminals to breach its systems.
-- By Brenna Owen in Vancouver
This report by The Canadian Press was first published May 23, 2024.
The Canadian Press