A ransomware attack at Evergreen Printing Co. in Bellmawr, New Jersey, disrupted printing and subscriber-fulfillment systems for publications that use the company, including the community weekly The Retrospect, the newspaper reported.
The Retrospect, based in Collingswood, said it learned Monday, Dec. 22, that Evergreen’s systems had been locked up in an attack the paper said occurred Friday, Dec. 19. The newspaper said the disruption affected press operations, mail lists and company communications.
In an emailed statement shared by The Retrospect, an Evergreen representative said the company activated its incident response plan and is working with outside experts to investigate, contain and remediate the incident. The representative said Evergreen was not aware of evidence confirming personal data had been accessed or removed.
The Retrospect said the billing information it stored with Evergreen included subscriber names and mailing addresses, but not credit card numbers.
Evergreen is a commercial publication printer that also provides subscription fulfillment and mail list processing, according to the newspaper and the company’s materials.
The Retrospect said it expects most subscribers to receive printed copies but warned there may be delivery errors as staff rebuilds the mailing list ahead of holiday schedules. The paper directed readers to its published customer-service channels to report missing issues.
Ransomware has repeatedly disrupted newspaper production and distribution nationwide. Earlier this year, Lee Enterprises, one of the country’s largest newspaper groups, reported a cyberattack that disrupted print distribution and business operations across dozens of publications.
Evergreen has not publicly provided a restoration timeline or said whether data was taken or law enforcement notified. The Retrospect said it will continue verifying subscriber information as Evergreen works to restore affected systems. Neither Evergreen nor The Retrospect responded to requests for additional details, including whether a ransom demand was made or a threat actor identified.