Qilin hackers attacked Houston Symphony and stole over 300 GB of data

4 March 2025 1 minute Author: Newsman

The cybercriminal group Kirin, known for its double-extortion techniques, announced that it had hacked the Houston Symphony Orchestra’s servers and stolen more than 300GB of confidential information. This is part of a series of attacks on American cultural institutions, including PBS Detroit and Lee Enterprises

The hackers posted an ultimatum on a darknet blog demanding contact. If negotiations fail, the data could be made public on March 5.

  1. Among the stolen documents are financial statements through 2024 and strategic plans through 2030.
  2. Documents related to cash flow and investment operations.
  3. Personal data of executives and board members.

A post about the Houston Symphony has disappeared from the Qilin blog, which may indicate the beginning of negotiations between the hackers and the organization. Founded in 1913, the organization is one of the oldest symphony orchestras in the United States. Its annual budget is 28.8 million $ and its concerts are attended by more than 400,000 listeners.

The incident with the Houston Symphony Orchestra highlights the growing threat to cultural organizations.

Other related articles
News
Read more
Zero-Day in BigAnt Server allows attackers to execute malicious code via file upload
The zero-day vulnerability CVE-2025-0364 in BigAnt Server allows unauthenticated attacks using SaaS registration and PHP file upload. The vulnerability allows attackers to gain NT AUTHORITY\SYSTEM privileges via Cloud Drive. BigAntSoft has not released a fix, so it is recommended to block SaaS registration and monitor the activity of PHP processes.
64
News
Read more
Eleven11bot botnet attacks telecom companies and gaming platforms
A large-scale botnet consisting of hacked security cameras and DVRs is attacking telecommunications companies and gaming platforms. Researchers have identified over 1,000 active IP addresses, most of which originate from Iran. The DDoS attacks are carried out using brute force via Telnet and SSH, and the main targets are devices with built-in passwords.
68
Found an error?
If you find an error, take a screenshot and send it to the bot.