TVEyes is a company that manages a popular platform for monitoring TV and radio news broadcasts, it is used worldwide by PR agencies and newsrooms.
On Thursday night, a ransomware attack hit the company network causing an outage of its multimedia messaging and data feed services (i.e. TVEyes Media Monitoring Suite (MMS)).
TVEyes reported the incident to its customers by email, one Tweet sent by the company to Medium Buying explained that the root cause of the outage was a ransomware infection.
“We are rebuilding the core system on fresh hardware, and expect to have TVEyes back online soon, but do not have an exact ETA for services to be restored,” the email says. “As you can imagine, TVEyes engineers are working nonstop and will continue to do so until we are back up and running.”
CEO David Ives confirmed that the company did not pay the ransom and that the internal staff restored from backups after sanitized the impacted systems.
“All the engineers have been working on this since early yesterday morning, and there’s no evidence that was downloaded,” said TVEyes CEO David Ives.
“Ives said in an interview. “It appears it was purely an attack to make money.”
At the time of writing, the company has not yet identified the ransomware family that infected its systems.
Another unknown aspect of the attack is that at the time it is not clear if the hackers have exfiltrated information from the company.
The company CEO added that the attack didn’t appear to be the result of a cyber espionage campaign aimed at stealing data on political candidates.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – TVEyes, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.