The Kiss FM data breach has been claimed by the Rhysida ransomware group, a well-known cybercrime gang that targets public and private organizations worldwide. The attackers allege that they gained access to internal systems belonging to Kiss FM Spain, one of the country’s most popular radio networks, and are now auctioning stolen data for 3 BTC (approximately $313,000 USD).
The breach listing, posted on Rhysida’s dark web leak site, offers potential buyers an “exclusive opportunity” to acquire the stolen data within a seven-day window. The group promises that only one buyer will receive access, warning that there will be “no reselling” of the dataset. Screenshots included in the post show samples of allegedly stolen internal documents, employee files, and administrative data belonging to the network.
Background on the Kiss FM Breach
Kiss FM is a Spanish radio station owned by Mediaset España, one of the nation’s largest media groups. The broadcaster is known for its mix of popular music and entertainment programming and operates both online and on traditional FM radio frequencies across Spain. Its digital presence includes web streaming and advertising platforms, all of which make it an attractive target for cybercriminals seeking valuable personal or commercial data.
The listing, observed on November 5, 2025, includes a live countdown timer of “6 days and 20 hours,” implying that the attackers intend to sell or release the data within a week if no payment is made. Rhysida’s announcement describes the stolen files as “unique and impressive,” and encourages potential buyers to “open your wallets and be ready to buy exclusive data.”
What the Attackers Claim to Have Leaked
The Rhysida group has not yet published the full dataset but claims it contains a significant volume of sensitive internal data. Based on screenshots and previous patterns in Rhysida’s campaigns, the Kiss FM data breach likely includes:
- Employee and staff information (names, emails, phone numbers, ID documents)
- Administrative documents, internal correspondence, and contracts
- Accounting records and financial documents
- Partnership or advertising agreements
- Technical configurations related to media servers or digital systems
If verified, this data could expose not only Kiss FM employees and management but also third-party partners, advertisers, and affiliate networks. Leaked employee data could also enable further spear-phishing attacks and impersonation campaigns targeting Spain’s broader media industry.
Key Cybersecurity Insights
1. Rhysida’s Expanding Attack Campaigns
The Rhysida ransomware operation has become increasingly active through 2025, targeting hospitals, universities, and now media organizations. Rhysida uses a combination of data exfiltration and encryption to pressure victims into paying. The group often threatens public data leaks if ransom demands are ignored, leveraging reputational damage as an additional weapon.
The listing’s professional tone and “exclusive buyer” approach are consistent with Rhysida’s tactics. Unlike some ransomware groups that leak data immediately, Rhysida frequently auctions stolen information to limit exposure and maximize profits.
2. Media and Broadcasting Under Fire
This breach reinforces a worrying trend in which ransomware operators are increasingly targeting media companies. Such organizations often maintain extensive digital infrastructure and sensitive partnerships with advertisers, celebrities, and content distributors. Downtime can disrupt national broadcasts and cause immediate financial losses, making these entities more likely to pay.
High-profile media breaches, like those affecting the BBC, Sony, and TV5Monde, have shown that attackers often exploit outdated systems, remote access vulnerabilities, or poorly secured shared drives. The Kiss FM case adds to this growing list of media-sector incidents with potentially far-reaching consequences.
3. Regulatory Ramifications in Spain
Under Spain’s adaptation of the General Data Protection Regulation (GDPR), any data breach involving personal or employee information must be reported within 72 hours to the Agencia Española de Protección de Datos (AEPD). If the Kiss FM data breach is verified and includes personal identifiers or internal documentation, the company may face significant penalties for failing to protect sensitive data adequately.
4. Ransom Demand and the 3 BTC Price Tag
The demand of 3 BTC (roughly $313,000 USD) is relatively modest for an attack of this nature, suggesting that Rhysida’s primary goal may be visibility and credibility rather than profit. The listing’s language implies that the attackers want to sell the data “to one hand only,” which mirrors a black-market exclusivity tactic used to attract wealthy or state-linked buyers seeking intelligence or leverage.
Potential Impacts of the Kiss FM Data Breach
If genuine, the data leak could expose:
- Personal identifiable information (PII) of current and former employees
- Internal communications revealing private business or editorial information
- Advertising client details and revenue reports
- Technical documentation tied to streaming servers and online broadcast systems
Such a leak would not only damage Kiss FM’s reputation but could also create cascading risks for other Spanish broadcasters connected through Mediaset España’s shared infrastructure. Cybercriminals often reuse stolen data from one company to target others within the same corporate group.
Mitigation and Response Strategies
For Kiss FM and Mediaset España
- Immediate Isolation and Investigation: Take affected systems offline and engage a certified Digital Forensics and Incident Response (DFIR) firm to determine the attack vector and assess the extent of data exfiltration.
- Report to AEPD and Law Enforcement: File official breach notifications with Spanish data protection authorities and cooperate with cybersecurity law enforcement agencies to track the attackers.
- Implement Network Segmentation: Prevent future lateral movement by isolating administrative servers and enforcing strict access controls.
- Strengthen Authentication: Enforce Multi-Factor Authentication (MFA) for all employees and partners, particularly for remote access accounts used for content uploads or digital broadcasting.
For Employees and Partners
- Beware of Phishing Attacks: Attackers may use stolen data to impersonate Kiss FM officials or media partners. Do not open suspicious attachments or provide personal information.
- Monitor for Identity Theft: Employees should review their financial accounts and consider enrolling in identity monitoring services.
- Change Passwords: Update all passwords linked to Kiss FM systems or shared media tools, especially if reused elsewhere.
Conclusion
The Kiss FM data breach marks a major escalation in ransomware operations targeting Spain’s media landscape. Rhysida’s public listing and ransom offer demonstrate how cybercriminals are commercializing stolen data and using “exclusive sales” to attract private buyers rather than public leaks. As with previous attacks on broadcasting networks, this incident highlights the urgent need for robust cybersecurity frameworks across Europe’s entertainment industry.
For verified updates on active data breaches and recent cybersecurity threats, visit Botcrawl.
- ClickUp Data Leak Shows $4B Came Before Customer Security for Over a Year
- Rheem Manufacturing Data Breach Claim Follows Reported INC Ransom Listing
- Polycorp Data Breach Exposes 400GB of Internal Manufacturing Data
- Uniview Technologies Data Breach Claimed by The Gentlemen Ransomware Group
- Archdiocese of St. John’s Data Breach Claim Follows Reported Qilin Listing
Sean Doyle
Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.





