Anubis Ransomware Group Targets Storage King UK

Published:

spot_img

Anubis Ransomware Gang Targets Storage King UK: A Data Breach Breakdown

What Happened?

In a concerning turn of events for Storage King UK, the Anubis ransomware gang has identified the company as one of its latest victims. The hackers have taken to their darknet leak site, showcasing a trove of sensitive information, including passport scans purportedly belonging to customers of the popular self-storage chain.

Disturbing Claims

In a post dated September 30, the Anubis group made a somewhat unsettling declaration. “Do you like it when people air your dirty laundry in public? I don’t think so,” they stated, embedding a note of intimidation in their message. They revealed that Storage King customers might now be at risk due to the leaked data.

According to the hackers, they have not only disclosed images of customers’ personal belongings stored in various units but also shared specific passport details belonging to individuals renting those units. This data includes not just the names of the affected customers, but also residential addresses and personal email accounts—a clear breach of privacy.

The Nature of the Leak

The hackers posted a disturbing collection of photos showing the interior of a storage unit. This included various personal items ranging from boxes to furniture. Anubis went further, pointing out that they have access to multiple identity documents, which they claim belong to a significant number of Storage King customers.

Anubis characterized this leak as an unpleasant situation for customers but downplayed the potential implications, stating, “Photos of your stuff posted online can certainly be very unpleasant, but overall, they don’t pose a real threat.” However, they underscored a more serious concern: the exposure of sensitive personal data. “What there really is a lot of is customers’ personal data, and this is definitely a serious threat to their security,” they added.

The Full Exposure

The hackers have seemingly released an extensive dataset that goes beyond just passport scans. This data reportedly includes insurance documents, employee information, and various other identity documents. Such a compromise could have severe repercussions for both the company and its customers.

In their message, Anubis made clear that Storage King must now confront the repercussions of failing to secure this sensitive data. “They will have to make every effort to regain customer trust,” the group noted, suggesting that the fallout from this incident could be significant for the brand’s reputation. Customers are left to hope the impact on their security and privacy will not be excessive.

Anubis’s History

This incident is not the first time Anubis has targeted a company. In late 2024, the ransomware group made headlines by targeting the Pound Road Medical Centre, leaking patient information, and even security footage. This aggressive approach establishes a pattern of behavior for Anubis, as they have claimed responsibility for 15 cyberattacks, including the one on Storage King UK.

Despite their notoriety, Anubis is not the most active ransomware group in the current landscape. However, they have gained a reputation for their aggressive tactics. They describe themselves as specialists in “disseminating company data leaks supplied to us by our anonymous sources,” indicating a focused strategy on exposing sensitive information.

Clarifying Misidentifications

Interestingly, it is important to note that Storage King UK is not synonymous with its Australian counterpart, despite the similar branding. This confusion has led to several open-source threat intelligence platforms mistakenly attributing the attack to Storage King Australia. For clarity, Storage King UK operates self-storage facilities across 48 locations in the UK.

Seeking Responses

As the situation continues to unfold, Cyber Daily has reached out to Storage King UK for a statement. The company’s response will be pivotal in addressing customer concerns and outlining the steps it plans to take in the aftermath of this incident. The priority now lies in restoring trust while managing the fallout from this significant data breach.

spot_img

Related articles

Recent articles

Understanding Hacktivism, DDoS Attacks, and Ransomware

Insights from the 2025 ENISA Threat Landscape Report The 2025 Threat Landscape report from the European Union Agency for Cybersecurity (ENISA) has provided an in-depth...

Afreximbank Marks Milestone with Fifth Edition of Afreximbank TV

Afreximbank TV: Elevating Africa's Trade Narrative Through Digital Broadcasting Image credit: Afreximbank Afreximbank TV, the digital channel owned and operated by the African Export-Import Bank (Afreximbank),...

New WireTap Attack Exposes Intel SGX ECDSA Key through DDR4 Memory-Bus Interposer

Recent Research Exposes Vulnerabilities in Intel SGX Security Introduction to Intel SGX Recent findings from researchers at Georgia Institute of Technology and Purdue University have raised...

Commvault Unveils Clumio for Apache Iceberg on AWS

Revolutionizing Data Protection: Commvault's Clumio for Apache Iceberg A New Era of Cyber Resilience In an age where data is king, Commvault has introduced an innovative...