Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Ecuador’s State-run CNT Telco Hit By RansomEXX Ransomware

Ecuador’s State-run CNT Telco Hit By RansomEXX Ransomware

Ecuador’s state-run Corporación Nacional de Telecomunicación (CNT) has suffered a ransomware attack that has disrupted business operations, the payment portal, and customer support.

CNT is Ecuador’s state-run telecommunication carrier that offers fixed-line phone service, mobile, satellite TV, and internet connectivity.

Starting this week, the CNT website began displaying an alert warning that they suffered an attack and that customer care and online payment are no longer accessible.

Announcement on the website about the cyberattack

“Today, July 16, 2021, the National Telecommunications Corporation, CNT EP, filed a complaint with the State Attorney General’s Office for the crime of “attack on computer systems “so that the preliminary investigation is carried out and the responsible,” read the alert translated into English.

“This attack affected the care processes in our Integrated Service Centers and Contact Center; In this regard, we indicate to our users that their services will not be suspended for non-payment.”

“We must inform our clients, massive and corporate, that their data is They are duly protected. We also inform that services such as calls, internet and television, operate normally.”

If you have first-hand information about this or other unreported cyberattacks, you can confidentially contact us on Signal at +16469613731 or on Wire at @lawrenceabrams-bc.

Also Read: The 5 Phases of Penetration Testing You Should Know

CNT suffers RansomEXX ransomware attack

While CNT has not officially stated that they suffered a ransomware attack, BleepingComputer has learned that the attack was conducted by a ransomware operation known as RansomEXX.

Security researcher Germán Fernández shared with BleepingComputer a hidden link to the group’s data leak site that warns CNT that the gang would leak data stolen during the attack if CNT did not pay a ransom.

“Your time is LIMITED!
When this time will come to end, there are two ways: we will RAISE the ransom amount or PUBLISH your files.
You will lose the opportunity to contact us after the data PUBLICATION.
If you REALLY WANT to prevent data leak, contact us RIGHT NOW.

We have downloaded 190GB+ of your files and we are ready to publish it.” – RansomEXX.

Hidden RansomEXX data leak page for CNT

This page is currently hidden from the public and can only be accessed via the direct link. These hidden pages are commonly included in ransom notes to prove that a ransomware operation stole data during an attack.

In CNT’s press statement, the company states that corporate and customer data are secure and have not been exposed.

However, the RansomEXX gang claims to have stolen 190 GB of data and shared screenshots of some of the documents on the hidden data leak page.

The screenshots seen by BleepingComputer, include contact lists, contracts, and support logs.

This ransomware operation is responsible for numerous high-profile attacks, including Brazil’s Rio Grande do Sul court systemnuclear weapons contractor Sol Oriens, and JBS, the world’s largest meat producer.

The ransomware operation originally launched under the name Defray in 2018 but became more active in June 2020 when it rebranded as RansomEXX and began to target large corporate entities.

Like other ransomware gangs, RansomEXX will compromise a network through purchased credentials, brute-forced RDP servers, or by utilizing exploits.

Once they gain access to a network, they will quietly spread throughout the network while stealing unencrypted files to be used for extortion attempts.

After gaining access to an administrator password, they deploy the ransomware on the network and encrypt all of its devices.

Also Read: Got Hacked? Here Are 5 Ways to Handle Data Breaches

As is becoming common among ransomware operations, RansomEXX created a Linux version to ensure they can target all critical servers and virtual machines.

The RansomEXX gang’s has a history of high-profile attacks, including Brazil’s government networksTexas Department of Transportation (TxDOT), Konica MinoltaIPG Photonics, and Tyler Technologies.

BleepingComputer has contacted CNT with further questions but has not received a response at this time.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us