Security

Cyber-crime

London celebrity talent agency reports itself to ICO following Rhysida attack claims

Showbiz members' passport scans already plastered online


A London talent agency has reported itself to the UK's data protection watchdog after the Rhysida ransomware crew last week claimed it had attacked the business, which represents luminaries of stage and screen.

The Agency was established in 1995 and clients include Louis De Bernieres, Sam Mendes, Emma Thompson, and many more across the Film, TV, and Theatre industries.

The Register asked The Agency for comment on the claims but it refused to give a statement. We understand, however, that the Information Commissioner's Office (ICO) has been informed of an incident. 

An ICO spokesperson said: "We have received a report from The Agency and we are making enquiries."

It should be said that self-referring to the ICO doesn't necessarily mean a given organization has suffered data security exposure that may be punishable under data protection law. 

The watchdog's official line is that if an incident is reasonably likely to impact data subjects' rights and freedoms, then a report may be necessary, although not every breach is so severe it must be reported.

The same group that hit the British Library with ransomware in 2023, Rhysida, claims it is now holding The Agency's data to ransom. Its data leak site suggests it is willing to sell the data for 7 Bitcoins ($678,035) and the gang already published a montage of documents it alleges to have stolen from The Agency.

That montage includes passport scans of what appear to be company's clients, spreadsheets, and other internal documents. 

Rhysida's auction for the data is set to end on Thursday morning, suggesting the same deadline applies to The Agency itself to pay the gang's extortion demands.

Rhysida is a relatively inconsistent ransomware group. Unlike RansomHub and Akira, its affiliates don't tend to register the greatest number of attacks. The group didn't even reach the top ten in Huntress' analysis of the top ransomware groups from the past year. However, the attacks it pulls off are often high profile in nature.

The strike against the British Library is one of the most disruptive ransomware incidents in the UK in recent memory, albeit not quite as damaging as Qilin's attack on Synnovis last year.

The British Library didn't pay the gang's ransom demands, which amounted to roughly the same as The Agency's auction price, and early reports suggested the cost of recovery could run up to £7 million ($8.8 million). Five months after the attack, it told Civil Society that recovery costs had already reached £1.6 million ($2 million). 

Other high profile attacks include those on luxury yacht dealer MarineMax, which confirmed unauthorized access via a Securities and Exchange Commission (SEC) filing in March 2024, and the Port of Seattle a few months later.

The Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory [PDF] following the British Library break-in that was laden with details about Rhysida's tradecraft. Defenders would do well to follow the guidance laid out in the document but to summarize: Patch vulnerabilities (especially in VPNs) and enable multi-factor authentication (MFA) to prevent the gang's routine credential abuse. Basic, sensible but sometimes overlooked stuff. ®

Send us news
2 Comments

Ransomware isn't always about the money: Government spies have objectives, too

Analysts tell El Reg why Russia's operators aren't that careful, and why North Korea wants money AND data

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Chinese spies suspected of 'moonlighting' as tawdry ransomware crooks

Some employees steal sticky notes, others 'borrow' malicious code

Triplestrength hits victims with triple trouble: Ransomware, cloud hijacks, crypto-mining

These crooks have no chill

Southern Water takes the fifth over alleged $750K Black Basta ransom offer

Leaked chats and spilled secrets as AI helps decode circa 200K private talks

US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware

Called it an 'incident' in SEC filing, but encrypted apps and data exfiltration suggest Lee just can’t say the R word

UK, US, Oz blast holes in LockBit's bulletproof hosting provider Zservers

Huge if true: Brit Foreign Sec says Putin running a 'corrupt mafia state'

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Experts race to extract intel from Black Basta internal chat leaks

Researchers say there's dissent in the ranks. Plus: An AI tool lets you have a go yourself at analysing the data

Crimelords and spies for rogue states are working together, says Google

Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?

Medusa ransomware gang demands $2M from UK private health services provider

2.3 TB held to ransom as biz formerly known as Virgin Care tells us it's probing IT 'security incident'

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more