Security News > 2022 > February > NFL's San Francisco 49ers hit by Blackbyte ransomware attack
![NFL's San Francisco 49ers hit by Blackbyte ransomware attack](/static/build/img/news/alt/ransomware-statistics-medium.jpg)
The NFL's San Francisco 49ers team is recovering from a cyberattack by the BlackByte ransomware gang who claims to have stolen data from the American football organization.
The 49ers confirmed the attack in a statement to BleepingComputer and said it caused a temporary disruption to portions of their IT network.
"The San Francisco 49ers recently became aware of a network security incident that resulted in temporary disruption to certain systems on our corporate IT network. Upon learning of the incident, we immediately initiated an investigation and took steps to contain the incident."
The BlackByte gang claimed responsibility for the 49er's attack yesterday, right as the NFL gets ready for Super Bowl 2022, by beginning to leak files that they claim are stolen files.
While it is not known how much data has been stolen during the attack on the 49ers, BlackByte has stolen gigabytes of data from previous victims.
The BlackByte ransomware operation launched in July 2021 when it began targeting corporate victims worldwide.
News URL
Related news
- City of Wichita shuts down IT network after ransomware attack (source)
- Ransomware attacks impact 20% of sensitive data in healthcare orgs (source)
- Ohio Lottery ransomware attack impacts over 538,000 individuals (source)
- Ascension redirects ambulances after suspected ransomware attack (source)
- Singing River Health System: Data of 895,000 stolen in ransomware attack (source)
- Windows Quick Assist abused in Black Basta ransomware attacks (source)
- Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks (source)
- OmniVision discloses data breach after 2023 ransomware attack (source)
- LockBit says they stole data in London Drugs ransomware attack (source)
- Canada's London Drugs confirms ransomware attack after LockBit demands $25M (source)