We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

DISH Customers Left in the Dark Weeks After Cyberattack

DISH Customers Left in the Dark Weeks After Cyberattack
Husain Parvez Published on 19th March 2023 Cybersecurity Researcher

DISH customers continue to face issues as the American TV and satellite broadcast provider reels from the cyberattack that wreaked havoc over two weeks ago. Customers still encounter problems accessing their DISH accounts and services, and are still in the dark as to whether their personal data was compromised in the attack. However, the network service provider has yet to provide a significant response to these concerns.

Speaking to DISH customers, TechCrunch reported that it “heard from customers that still have no access to DISH, or services through its subsidiaries like Boost Mobile.” Some users also complained about being unable to contact the customer support staff, while others said “they have been affected by email and voice phishing attacks exploiting the uncertainty around the Dish incident.” Users have also been locked out of their accounts and payment services, leading to the disconnection of their DISH services.

Edward Wietecha, a DISH spokesperson, addressed the issue while speaking to TechCrunch and confirmed these issues were reported by customers ever since the cyberattack. Wietecha added, "customers who had their service temporarily suspended for nonpayment received additional time until our payment systems were restored.” However, no comment was made on whether customer data was compromised in the attack.

Worryingly, a former DISH employee has stated that the service provider indefinitely stores critical customer information such as names, email addresses, phone numbers, Social Security Numbers, and payment information, all of which could have been exposed by the ransomware attack. This includes past and present customers — even prospective customers that did not pass DISH’s initial credit check.

As confirmed through a public filing on February 28th, the cyberattack caused a network outage that affected DISH’s internal servers and systems. As reported by the BleepingComputer, the outage spread across “Dish.com, the DISH Anywhere app, Boost Mobile (a subsidiary owned by DISH Wireless), and other websites and networks operated by DISH Network”.

Sources told BleepingComputer the hackers compromised DISH’s Windows domain controllers and then encrypted its VMware ESXi servers and backups. However, at the time of writing, these sources could not be verified and no ransomware gang or individual has come forward to claim responsibility for the attack.

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.