We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Lee Enterprises Ransomware Attack Halts Freelance Payments

Lee Enterprises Ransomware Attack Halts Freelance Payments
Husain Parvez First published on 7th March 2025 Cybersecurity Researcher

A ransomware attack targeting newspaper giant Lee Enterprises has disrupted its ability to process payments for its hired freelancers and contractors, leaving many without compensation. The cyberattack, which began on February 3, 2025, has caused ongoing operational issues, affecting print production, billing, and vendor payments.

According to a TechCrunch report, Lee Enterprises confirmed on February 18 that hackers had encrypted critical applications, directly impacting financial transactions. A contractor speaking to TechCrunch anonymously said they had not received payment for their work and had not heard any updates from the company since mid-February.

The cybercriminal group Qilin has claimed responsibility for the attack, posting on its dark web leak site that it had stolen 350GB of data, including financial records, payments to journalists, and insider business information. The group has threatened to leak the stolen files on March 5. Qilin’s leaked samples include government ID scans, corporate documents, and confidential agreements.

The group stated, "The documents we hold about Lee Enterprises reveal details worth noting," implying that the stolen data contains sensitive financial and operational insights. Despite these claims, Lee Enterprises has not confirmed the authenticity of the stolen files, telling BleepingComputer, "We are aware of the claims and are currently investigating them."

The attack has not affected salaried employees, but internal operations remain hampered. Cloud storage and corporate VPN access were also disrupted. A regulatory filing with the US Securities and Exchange Commission (SEC) indicated that the attack is "reasonably likely to have a material impact" on the company’s financial condition.

Qilin, a Russian-speaking ransomware gang, has been active since 2022, operating under a ransomware-as-a-service (RaaS) model. The group has targeted a range of industries, including automotive manufacturers, healthcare services, and government agencies.

While many ransomware gangs demand payment in exchange for decryption keys, Dark Reading noted that Qilin has not explicitly stated whether it’s demanding a ransom from Lee Enterprises. Instead, its dark web post warns, "Watch this space — Lee Enterprises is aware of what’s in play."

About the Author

Husain Parvez is a Cybersecurity Researcher and News Writer at vpnMentor, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the vpnMentor Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address