Privacy Ninja



        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

McMenamins Breweries Hit by a Conti Ransomware Attack

McMenamins Breweries Hit by a Conti Ransomware Attack

​Portland brewery and hotel chain McMenamins suffered a Conti ransomware attack over the weekend that disrupted the company’s operations.

McMenamins is a popular chain of restaurants, pubs, breweries, and hotels located in Oregon and Washington.

The ransomware attack occurred over the weekend, on December 12th, with sources telling BleepingComputer that the Conti gang conducted it.

Servers and workstations were encrypted as part of the attack, including point-of-sale systems.

While the attack did not cause locations to close, McMenamins was forced to shut down their IT systems, credit card point-of-sale systems, and corporate email to prevent the further spread of the attack.

Also Read: Computer Misuse Act Singapore: The Truth And Its Offenses

After BleepingComputer emailed McMenamins, they issued a statement later that night confirming that they were hit by ransomware and are working with the FBI and a third-party cybersecurity firm to investigate the attack.

“McMenamins today announced it has been the victim of a ransomware attack, which was identified and blocked on Dec.12. At this time, it appears that no customer payment data was impacted when cybercriminals deployed malicious software that locked the company’s systems and prevented access to critical information. The family-owned company has reported the incident to the FBI and is also working with a cybersecurity firm to identify the source and full scope of the attack. 

It is possible that internal employee data may have been compromised, although it is not currently known whether that is the case. The following categories of employee information were potentially affected: names, addresses, email addresses, telephone numbers, dates of birth, Social Security numbers, direct deposit bank account information, and benefits records. To provide employees with peace of mind, McMenamins will be offering employees identity and credit protection services, as well as a dedicated help line through Experian. Managers will provide this information to employees directly.” – McMenamins.

As credit card scanners have been taken offline, McMenamins is being forced to change its payment processing at some locations. Unfortunately, these changes also prevent customers from purchasing or redeeming gift cards.

While our source has said that corporate data and documents appear to have been stolen during the attack, it is unknown if customer data was included. McMenamins says that their initial investigation does not indicate that any customer information was compromised as it was managed, collected, and stored by a third-party payment processing company.

However, as the hackers likely had access to the corporate network for some time, it is possible that the threat actors installed point-of-sale malware to steal credit cards, as has been done in previous ransomware attacks.

Whether this has happened will not be known until the third-party cybersecurity firm completes its investigation.

Also Read: Personal Data Websites: 3 Things That You Must Be Informed

Who is Conti?

Conti ransomware is a ransomware operation believed to be run by a Russian-based hacking group known for other notorious malware infections, such as TrickBot.

The ransomware gang usually gains access to a network through BazarLoader or TrickBot malware infections installed via phishing attacks or by the threat actors exploiting vulnerabilities in Internet-exposed devices, such as VPN or firewalls.

Once the attacks gain access to an internal system, they will spread through the network, steal data, and deploy their ransomware.

Conti is considered a top-tier ransomware operation that has previously breached high-profile organizations, such as Ireland’s Health Service Executive (HSE) and Department of Health (DoH), the City of TulsaBroward County Public SchoolsFatFaceAdvantech, and Sangoma.

Due to the increased activity by the cybercrime group, the US government recently issued a warning to corporations about an increased number of Conti ransomware attacks.



Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection


We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.


Click one of our contacts below to chat on WhatsApp

× Chat with us