{
	"id": "bb3df006-dd26-478b-9e2b-9f5affd82cb4",
	"created_at": "2026-04-06T00:19:20.460806Z",
	"updated_at": "2026-04-12T02:21:19.739678Z",
	"deleted_at": null,
	"sha1_hash": "2c9b6246ec30c7028f9f7929b26d3a099bfa7ca3",
	"title": "SeaChange video platform allegedly hit by Sodinokibi ransomware",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2221686,
	"plain_text": "SeaChange video platform allegedly hit by Sodinokibi ransomware\r\nBy Lawrence Abrams\r\nPublished: 2020-04-23 · Archived: 2026-04-05 18:25:10 UTC\r\nA leading supplier of video delivery software solutions is reportedly the latest victim of the Sodinokibi Ransomware, who\r\nhas posted images of data they claim to have stolen from the company during a cyberattack.\r\nSeaChange, a Waltham, Massachusets company with locations in Poland and Brazil, is an on-premise or remotely managed\r\nvideo-on-demand and streaming platform provider. SeaChange's customers include the BBC, Verizon, DISH, COX,\r\nDirecTV, and COX.\r\nSince last year, ransomware operators have been launching data leak sites that they use to publish files stolen from victims\r\nwhen performing a ransom attack.\r\nhttps://www.bleepingcomputer.com/news/security/seachange-video-platform-allegedly-hit-by-sodinokibi-ransomware/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/seachange-video-platform-allegedly-hit-by-sodinokibi-ransomware/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nRansomware operators use this tactic to scare and pressure non-paying victims into paying a ransom.\r\nSodinokibi posts images of SeaChange's data\r\nIn an update to their data leak site, Sodinokibi (REvil) has created a new victim page for SeaChange where they have\r\npublished images of some of the documents that they have stolen during an alleged attack.\r\nThese images include a screenshot of folders on a server they claim to have had access to, a bank statement, insurance\r\ncertificates, a driver's license, and a cover letter for a proposal for a Pentagon video-on-demand service.\r\nAlleged SeaChange directory listing posted by REvil\r\nWhen we asked the Sodinokibi operators how much the ransom was and the amount of data stolen, they refused to provide\r\nany further information.\r\n\"Thank you for your interest and your questions, but I really can't answer.\r\n We publish confidential information about companies if they ignore us for a long time or decide not to pay. Otherwise, we\r\nare not ready to share any information about them in their own interests, including share which companies we have\r\nencrypted, how much data we have stolen, etc.\"\r\nIt is common for ransomware operators to slowly release small amounts of stolen data to continue applying pressure on their\r\nvictims.\r\nWhen asked if the DOD was aware of this breach, we were told that the DOD will not comment on network intrusions or\r\ninvestigations.\r\n\"In accordance with policy, we will have no information to provide on possible network intrusions or investigations into\r\npossible network intrusions in either DOD or contractor networks,\" Lt Col Robert Carver, a Department of Defense\r\nspokesman, told BleepingComputer.\r\nhttps://www.bleepingcomputer.com/news/security/seachange-video-platform-allegedly-hit-by-sodinokibi-ransomware/\r\nPage 3 of 4\n\nWhen BleepingComputer reached out to SeaChange to learn if they were aware of the posting of this data, we did not\r\nreceive a response to our multiple queries.\r\nUpdate 4/24/20: Added statement from the DOD.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/seachange-video-platform-allegedly-hit-by-sodinokibi-ransomware/\r\nhttps://www.bleepingcomputer.com/news/security/seachange-video-platform-allegedly-hit-by-sodinokibi-ransomware/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/seachange-video-platform-allegedly-hit-by-sodinokibi-ransomware/"
	],
	"report_names": [
		"seachange-video-platform-allegedly-hit-by-sodinokibi-ransomware"
	],
	"threat_actors": [],
	"ts_created_at": 1775434760,
	"ts_updated_at": 1775960479,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/2c9b6246ec30c7028f9f7929b26d3a099bfa7ca3.pdf",
		"text": "https://archive.orkl.eu/2c9b6246ec30c7028f9f7929b26d3a099bfa7ca3.txt",
		"img": "https://archive.orkl.eu/2c9b6246ec30c7028f9f7929b26d3a099bfa7ca3.jpg"
	}
}