lockbit2 attacks nowiny

Incident Date:

April 3, 2022

World map



lockbit2 attacks nowiny






Rzeszaw, Poland

Rzeszaw, Poland

First Reported

April 3, 2022

Ransomware Attack on Nowiny 24

Company Overview

Nowiny 24 is a news platform that covers local and regional news in Rzeszów and Podkarpacie, Poland. The company is known for its obituaries section, where it announces the passing of prominent individuals in the region.

Company Size and Industry Standing

Nowiny 24 is a small to medium-sized company in the media and internet sector. In the media industry, it stands out for its focus on local news and obituaries, which may attract a niche audience.


The specific vulnerabilities that led to the ransomware attack on Nowiny 24 are not publicly disclosed. However, ransomware attackers often exploit software vulnerabilities, use brute-force credential attacks, engage in social engineering, or take advantage of previously compromised credentials.

Response and Mitigation

Nowiny 24, like any other organization, should follow best practices to mitigate the risk of ransomware attacks. This includes implementing platforms for endpoint detection and response (EDR), security orchestration, automation, and response (SOAR), and active security monitoring (ASM). Additionally, the company should ensure good security practices among employees, such as phishing training and password hygiene, to reduce the likelihood of social engineering or brute-force attacks.

The ransomware attack on Nowiny 24 highlights the need for organizations, regardless of their size or industry, to remain vigilant against cyber threats. By following best practices and staying informed about the latest threats, companies can better protect themselves and their customers.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.