Kiss FM Data Breach
Data Breaches

Kiss FM Data Breach Exposes Spanish Radio Station in Rhysida Ransomware Attack

The Kiss FM data breach has been claimed by the Rhysida ransomware group, a well-known cybercrime gang that targets public and private organizations worldwide. The attackers allege that they gained access to internal systems belonging to Kiss FM Spain, one of the country’s most popular radio networks, and are now auctioning stolen data for 3 BTC (approximately $313,000 USD).

The breach listing, posted on Rhysida’s dark web leak site, offers potential buyers an “exclusive opportunity” to acquire the stolen data within a seven-day window. The group promises that only one buyer will receive access, warning that there will be “no reselling” of the dataset. Screenshots included in the post show samples of allegedly stolen internal documents, employee files, and administrative data belonging to the network.

Background on the Kiss FM Breach

Kiss FM is a Spanish radio station owned by Mediaset España, one of the nation’s largest media groups. The broadcaster is known for its mix of popular music and entertainment programming and operates both online and on traditional FM radio frequencies across Spain. Its digital presence includes web streaming and advertising platforms, all of which make it an attractive target for cybercriminals seeking valuable personal or commercial data.

The listing, observed on November 5, 2025, includes a live countdown timer of “6 days and 20 hours,” implying that the attackers intend to sell or release the data within a week if no payment is made. Rhysida’s announcement describes the stolen files as “unique and impressive,” and encourages potential buyers to “open your wallets and be ready to buy exclusive data.”

What the Attackers Claim to Have Leaked

The Rhysida group has not yet published the full dataset but claims it contains a significant volume of sensitive internal data. Based on screenshots and previous patterns in Rhysida’s campaigns, the Kiss FM data breach likely includes:

  • Employee and staff information (names, emails, phone numbers, ID documents)
  • Administrative documents, internal correspondence, and contracts
  • Accounting records and financial documents
  • Partnership or advertising agreements
  • Technical configurations related to media servers or digital systems

If verified, this data could expose not only Kiss FM employees and management but also third-party partners, advertisers, and affiliate networks. Leaked employee data could also enable further spear-phishing attacks and impersonation campaigns targeting Spain’s broader media industry.

Key Cybersecurity Insights

1. Rhysida’s Expanding Attack Campaigns

The Rhysida ransomware operation has become increasingly active through 2025, targeting hospitals, universities, and now media organizations. Rhysida uses a combination of data exfiltration and encryption to pressure victims into paying. The group often threatens public data leaks if ransom demands are ignored, leveraging reputational damage as an additional weapon.

The listing’s professional tone and “exclusive buyer” approach are consistent with Rhysida’s tactics. Unlike some ransomware groups that leak data immediately, Rhysida frequently auctions stolen information to limit exposure and maximize profits.

2. Media and Broadcasting Under Fire

This breach reinforces a worrying trend in which ransomware operators are increasingly targeting media companies. Such organizations often maintain extensive digital infrastructure and sensitive partnerships with advertisers, celebrities, and content distributors. Downtime can disrupt national broadcasts and cause immediate financial losses, making these entities more likely to pay.

High-profile media breaches, like those affecting the BBC, Sony, and TV5Monde, have shown that attackers often exploit outdated systems, remote access vulnerabilities, or poorly secured shared drives. The Kiss FM case adds to this growing list of media-sector incidents with potentially far-reaching consequences.

3. Regulatory Ramifications in Spain

Under Spain’s adaptation of the General Data Protection Regulation (GDPR), any data breach involving personal or employee information must be reported within 72 hours to the Agencia Española de Protección de Datos (AEPD). If the Kiss FM data breach is verified and includes personal identifiers or internal documentation, the company may face significant penalties for failing to protect sensitive data adequately.

4. Ransom Demand and the 3 BTC Price Tag

The demand of 3 BTC (roughly $313,000 USD) is relatively modest for an attack of this nature, suggesting that Rhysida’s primary goal may be visibility and credibility rather than profit. The listing’s language implies that the attackers want to sell the data “to one hand only,” which mirrors a black-market exclusivity tactic used to attract wealthy or state-linked buyers seeking intelligence or leverage.

Potential Impacts of the Kiss FM Data Breach

If genuine, the data leak could expose:

  • Personal identifiable information (PII) of current and former employees
  • Internal communications revealing private business or editorial information
  • Advertising client details and revenue reports
  • Technical documentation tied to streaming servers and online broadcast systems

Such a leak would not only damage Kiss FM’s reputation but could also create cascading risks for other Spanish broadcasters connected through Mediaset España’s shared infrastructure. Cybercriminals often reuse stolen data from one company to target others within the same corporate group.

Mitigation and Response Strategies

For Kiss FM and Mediaset España

  • Immediate Isolation and Investigation: Take affected systems offline and engage a certified Digital Forensics and Incident Response (DFIR) firm to determine the attack vector and assess the extent of data exfiltration.
  • Report to AEPD and Law Enforcement: File official breach notifications with Spanish data protection authorities and cooperate with cybersecurity law enforcement agencies to track the attackers.
  • Implement Network Segmentation: Prevent future lateral movement by isolating administrative servers and enforcing strict access controls.
  • Strengthen Authentication: Enforce Multi-Factor Authentication (MFA) for all employees and partners, particularly for remote access accounts used for content uploads or digital broadcasting.

For Employees and Partners

  • Beware of Phishing Attacks: Attackers may use stolen data to impersonate Kiss FM officials or media partners. Do not open suspicious attachments or provide personal information.
  • Monitor for Identity Theft: Employees should review their financial accounts and consider enrolling in identity monitoring services.
  • Change Passwords: Update all passwords linked to Kiss FM systems or shared media tools, especially if reused elsewhere.

Conclusion

The Kiss FM data breach marks a major escalation in ransomware operations targeting Spain’s media landscape. Rhysida’s public listing and ransom offer demonstrate how cybercriminals are commercializing stolen data and using “exclusive sales” to attract private buyers rather than public leaks. As with previous attacks on broadcasting networks, this incident highlights the urgent need for robust cybersecurity frameworks across Europe’s entertainment industry.

For verified updates on active data breaches and recent cybersecurity threats, visit Botcrawl.

Sean Doyle

Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.

View all posts →

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.