<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ransomware &#8211; News Journos</title>
	<atom:link href="https://newsjournos.com/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://newsjournos.com</link>
	<description>Independent News and Headlines</description>
	<lastBuildDate>Sat, 21 Jun 2025 14:23:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://newsjournos.com/wp-content/uploads/2025/02/cropped-The_News_Journos_Fav-1-32x32.png</url>
	<title>ransomware &#8211; News Journos</title>
	<link>https://newsjournos.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ransomware Attack on Tax Relief Service Exposes Customer Data</title>
		<link>https://newsjournos.com/ransomware-attack-on-tax-relief-service-exposes-customer-data/</link>
					<comments>https://newsjournos.com/ransomware-attack-on-tax-relief-service-exposes-customer-data/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[News Editor]]></dc:creator>
		<pubDate>Sat, 21 Jun 2025 14:22:51 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Consumer Electronics]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Data Science]]></category>
		<category><![CDATA[E-Commerce]]></category>
		<category><![CDATA[exposes]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Gadgets]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Relief]]></category>
		<category><![CDATA[Robotics]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[Software Updates]]></category>
		<category><![CDATA[Startups]]></category>
		<category><![CDATA[tax]]></category>
		<category><![CDATA[Tech Reviews]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Virtual Reality]]></category>
		<guid isPermaLink="false">https://newsjournos.com/ransomware-attack-on-tax-relief-service-exposes-customer-data/</guid>

					<description><![CDATA[<p>This article is published by News Journos</p>
<p>In a significant cybersecurity incident, Optima Tax Relief, a leading tax resolution firm in the United States, has fallen victim to a ransomware attack carried out by a group known as Chaos. The intrusion has resulted in the theft of sensitive data totaling 69 GB, which includes valuable personal information that can facilitate identity theft [...]</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is published by News Journos</p>
<p style="text-align:left;">In a significant cybersecurity incident, Optima Tax Relief, a leading tax resolution firm in the United States, has fallen victim to a ransomware attack carried out by a group known as Chaos. The intrusion has resulted in the theft of sensitive data totaling 69 GB, which includes valuable personal information that can facilitate identity theft and fraud. This attack is part of a growing trend where financial service providers face increasing threats from cybercriminals, raising questions about the industry&#8217;s preparedness in safeguarding sensitive client data.</p>
<table style="width:100%; text-align:left; border-collapse:collapse;">
<thead>
<tr>
<th style="text-align:left; padding:5px;">
        <strong>Article Subheadings</strong>
      </th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>1)</strong> Overview of the Ransomware Attack
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>2)</strong> Nature and Consequences of the Data Breach
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>3)</strong> About Chaos: The New Ransomware Threat
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>4)</strong> Steps for Consumers Post-Breach
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>5)</strong> Implications for Financial Institutions
      </td>
</tr>
</tbody>
</table>
<h3 style="text-align:left;">Overview of the Ransomware Attack</h3>
<p style="text-align:left;">In the early hours of a Tuesday morning, a coordinated cyberattack was executed against Optima Tax Relief, marking a substantial breach of data security within the financial sector. Chaos, the group behind this breach, reportedly infiltrated the firm&#8217;s systems and proceeded to extract an enormous volume of data totaling 69 gigabytes. Optima&#8217;s internal servers were subsequently encrypted, denying access to the firm unless a ransom is paid. The date of the attack has not been publicly disclosed, but reports indicate that it is part of a troubling pattern of ransomware incidents affecting financial service providers.</p>
<p style="text-align:left;">This ransomware attack is indicative of a larger trend where financial service providers are becoming prime targets for cybercriminals. The increased frequency and sophistication of these attacks not only disrupt daily operations but can have long-term consequences for the organizations involved. As financial institutions are entrusted with sensitive personal information, the ongoing threat necessitates more rigorous cybersecurity measures and urgent awareness from consumers.</p>
<h3 style="text-align:left;">Nature and Consequences of the Data Breach</h3>
<p style="text-align:left;">The data compromised in this attack likely consists of crucial customer case files, including tax documents that are immensely valuable to cybercriminals. Such documents typically contain sensitive information such as Social Security numbers, home addresses, and other personally identifiable information (PII) that can be exploited for identity theft or financial fraud. According to sources within the cybersecurity community, this incident qualifies as a double-extortion attack, where the thieves not only steal data but also demand ransom for its safe return and non-disclosure.</p>
<p style="text-align:left;">The dissemination of this sensitive information exposes former and current clients to risks associated with identity theft, including financial fraud. In the wake of such breaches, there are often legal and regulatory repercussions for the companies involved, alongside increased scrutiny from various regulatory bodies, which can jeopardize consumer trust in their operations. Recent reports indicate that Optima Tax Relief has yet to publicly address whether they plan to comply with the ransom demands set forth by Chaos or take other actions to mitigate the impact on affected individuals.</p>
<h3 style="text-align:left;">About Chaos: The New Ransomware Threat</h3>
<p style="text-align:left;">Emerging in March 2025, the Chaos ransomware group has positioned itself as a significant threat in the cybercriminal landscape, claiming responsibility for numerous high-profile breaches since its inception. Unlike previous iterations of ransomware groups, this one operates as a coordinated team with a targeted approach, focusing on organizations that hold vast amounts of personally identifiable information. Their distinct operational tactics distinguish them from previous ransomware builders, which were more accessible to amateur cybercriminals.</p>
<p style="text-align:left;">The alarming trend of targeting institutions with financial data is underscored by Chaos&#8217;s previous attack on the Salvation Army, which highlights their capacity to inflict damage on organizations that play a critical role in society. As financial institutions adapt their security measures in response to this evolving threat, it is crucial for them to address vulnerabilities that could be exploited in future attacks.</p>
<h3 style="text-align:left;">Steps for Consumers Post-Breach</h3>
<p style="text-align:left;">Consumers whose data may have been involved in the Optima breach are advised to take prompt action to protect themselves. A multi-faceted approach to safeguarding personal and financial information is vital in mitigating risks associated with identity theft. Here are some essential steps individuals can consider:</p>
<ul style="text-align:left;">
<li><strong>1. Enroll in Identity Theft Protection Services:</strong> These services offer continuous monitoring and alerts for any unauthorized use of personal information.</li>
<li><strong>2. Regularly Monitor Financial Accounts:</strong> Individuals should vigilantly check accounts for suspicious transactions and report any anomalies immediately.</li>
<li><strong>3. Inform Banks and Credit Card Companies:</strong> Institutions should be notified about the breach to receive guidance on protecting accounts and possibly freezing them.</li>
<li><strong>4. Consider Personal Data Removal Services:</strong> These services specialize in removing personal data from harmful online databases.</li>
<li><strong>5. Install Robust Antivirus Software:</strong> Having protective measures against phishing attempts and malware is crucial for safeguarding devices.</li>
<li><strong>6. Activate Two-Factor Authentication:</strong> This adds an additional layer of defense to personal accounts, lessening the likelihood of unauthorized access.</li>
</ul>
<h3 style="text-align:left;">Implications for Financial Institutions</h3>
<p style="text-align:left;">The Optima Tax Relief incident underscores a pressing need for financial institutions to bolster their cybersecurity infrastructure. The complexities of modern ransomware attacks and the persistent threat from organized cybercriminals necessitate a re-evaluation of the strategies employed to safeguard sensitive data. As these criminals increasingly target firms holding personal financial information, the ramifications extend beyond immediate data loss, affecting overall consumer confidence and regulatory scrutiny.</p>
<p style="text-align:left;">Financial service providers must adopt a proactive stance, implementing comprehensive cybersecurity training programs for employees and regularly assessing existing security protocols. Moreover, investing in advanced detection technologies and incident response strategies can significantly minimize risks associated with data breaches. The Optima breach reinforces that the financial sector is in a state of crisis in terms of protecting consumer information amidst rising cybersecurity threats.</p>
<table style="width:100%; text-align:left;">
<thead>
<tr>
<th style="text-align:left;"><strong>No.</strong></th>
<th style="text-align:left;"><strong>Key Points</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left;">1</td>
<td style="text-align:left;">Optima Tax Relief suffered a significant data breach due to a ransomware attack by Chaos.</td>
</tr>
<tr>
<td style="text-align:left;">2</td>
<td style="text-align:left;">69 GB of sensitive data, including personal financial information, was stolen during the attack.</td>
</tr>
<tr>
<td style="text-align:left;">3</td>
<td style="text-align:left;">The attack is categorized as a double-extortion event where thieves demand ransom after stealing data.</td>
</tr>
<tr>
<td style="text-align:left;">4</td>
<td style="text-align:left;">Chaos ransomware group has emerged as a formidable threat targeting organizations with valuable personal data.</td>
</tr>
<tr>
<td style="text-align:left;">5</td>
<td style="text-align:left;">Consumers are advised to take immediate precautions to safeguard against identity theft.</td>
</tr>
</tbody>
</table>
<h2 style="text-align:left;">Summary</h2>
<p style="text-align:left;">The recent ransomware attack on Optima Tax Relief highlights the growing vulnerabilities faced by financial service providers in safeguarding sensitive consumer information. With the incident sparking significant concerns about data security, it is imperative for both institutions and individuals to adopt comprehensive measures that address the evolving landscape of cyber threats. As the financial sector grapples with these challenges, consumer trust and regulatory scrutiny will continue to play pivotal roles in shaping future cybersecurity initiatives.</p>
<h2 style="text-align:left;">Frequently Asked Questions</h2>
<p><strong>Question: What actions should consumers take following a data breach?</strong></p>
<p style="text-align:left;">Consumers should enroll in identity theft protection services, monitor their accounts, and contact financial institutions to secure their accounts following a data breach.</p>
<p><strong>Question: What is Chaos, and why is it a concern?</strong></p>
<p style="text-align:left;">Chaos is a ransomware group that has emerged as a significant threat, targeting organizations with access to large amounts of personally identifiable information, complicating efforts to secure data.</p>
<p><strong>Question: What are the potential consequences of a data breach?</strong></p>
<p style="text-align:left;">Data breaches can lead to identity theft, financial fraud, regulatory scrutiny, and long-term reputational damage for affected organizations.</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://newsjournos.com/ransomware-attack-on-tax-relief-service-exposes-customer-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Justice Department charges 2 Russians with operating cybercrime group using ransomware</title>
		<link>https://newsjournos.com/justice-department-charges-2-russians-with-operating-cybercrime-group-using-ransomware/</link>
					<comments>https://newsjournos.com/justice-department-charges-2-russians-with-operating-cybercrime-group-using-ransomware/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[News Editor]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 02:55:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[charges]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Consumer Electronics]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Science]]></category>
		<category><![CDATA[Department]]></category>
		<category><![CDATA[E-Commerce]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Gadgets]]></category>
		<category><![CDATA[group]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[Justice]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[operating]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Robotics]]></category>
		<category><![CDATA[Russians]]></category>
		<category><![CDATA[Software Updates]]></category>
		<category><![CDATA[Startups]]></category>
		<category><![CDATA[Tech Reviews]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Virtual Reality]]></category>
		<guid isPermaLink="false">https://newsjournos.com/justice-department-charges-2-russians-with-operating-cybercrime-group-using-ransomware/</guid>

					<description><![CDATA[<p>This article is published by News Journos</p>
<p>The Department of Justice has taken significant action against cybercrime by charging two Russian nationals, Roman Berezhnoy, 33, and Egor Nikolaevich Glebov, 39, for allegedly leading a ransomware group that targeted hundreds of U.S. entities. This cybercriminal operation reportedly generated over $16 million through illicit activities involving the Phobos ransomware. The charges include severe allegations [...]</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is published by News Journos</p>
<div id="article">
<p style="text-align:left;">The Department of Justice has taken significant action against cybercrime by charging two Russian nationals, <strong>Roman Berezhnoy</strong>, 33, and <strong>Egor Nikolaevich Glebov</strong>, 39, for allegedly leading a ransomware group that targeted hundreds of U.S. entities. This cybercriminal operation reportedly generated over $16 million through illicit activities involving the Phobos ransomware. The charges include severe allegations ranging from wire fraud to extortion, with both men facing substantial prison time if convicted.</p>
<table style="width:100%; text-align:left; border-collapse:collapse;">
<thead>
<tr>
<th style="text-align:left; padding:5px;">
        <strong>Article Subheadings</strong>
      </th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>1)</strong> Overview of the Charges Against Berezhnoy and Glebov
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>2)</strong> The Operations of the Phobos Ransomware
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>3)</strong> International Cooperation in Cybercrime Enforcement
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>4)</strong> Impact on Victims and the Broader Community
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>5)</strong> Consequences of Ransomware Attacks and Future Directions
      </td>
</tr>
</tbody>
</table>
<h3 style="text-align:left;">Overview of the Charges Against Berezhnoy and Glebov</h3>
<p style="text-align:left;">On a recent Monday, U.S. authorities executed the arrest of <strong>Roman Berezhnoy</strong> and <strong>Egor Nikolaevich Glebov</strong>, which was followed by the announcement of charges on Tuesday. The two individuals are being charged with a variety of offenses related to cybercrime, including one count of wire fraud conspiracy, one count of wire fraud, and charges associated with computer damage. Specifically, the defendants face three counts of intentional damage to protected computers and three counts of extortion connected to their cyberattacks.</p>
<p style="text-align:left;">Each wire fraud-related charge carries a maximum penalty of 20 years in prison, while counts related to computer damage bear a maximum penalty of 10 years. Other charges could result in additional penalties of up to five years. The variety and seriousness of the charges reflect a comprehensive approach by federal authorities to address growing concerns about ransomware and cybercriminal activity.</p>
<h3 style="text-align:left;">The Operations of the Phobos Ransomware</h3>
<p style="text-align:left;">The core of the criminal operation allegedly involved the use of Phobos ransomware, a malicious software designed to encrypt files on compromised networks, making them inaccessible to users unless a ransom is paid. <strong>Berezhnoy</strong> and <strong>Glebov</strong> are accused of hacking into victims&#8217; systems, stealing and encrypting sensitive data, and subsequently demanding ransom payments for the decryption keys.</p>
<p style="text-align:left;">According to the Justice Department&#8217;s release, the targets of these attacks included a range of organizations, such as healthcare providers, educational institutions, and even children’s hospitals. This indicates a troubling trend in which vital services are disrupted due to cybercriminal activities focusing on profit through illegitimate means.</p>
<p style="text-align:left;">The group allegedly made threats to not only sabotage further access to the networks but also to leak stolen information should the ransom not be paid. This level of intimidation has broader implications, as it adds pressure on victims who may be forced to choose between paying the ransom or risking the exposure of sensitive data.</p>
<h3 style="text-align:left;">International Cooperation in Cybercrime Enforcement</h3>
<p style="text-align:left;">The arrest of <strong>Berezhnoy</strong> and <strong>Glebov</strong> coincides with a period of increasing international collaboration among law enforcement agencies in combating cybercrime. Notably, the recent arrest of another Russian national, <strong>Evgenii Ptitsyn</strong>, on similar charges highlights a coordinated effort to crack down on cybercriminal networks globally.</p>
<p style="text-align:left;">The Department of Justice reported that their efforts align with a broader operation involving European and German authorities, the FBI, and other partners, which disrupted over 100 servers linked to the ransomware activities of the group in question. This cooperation exemplifies a unified international stance against cyber threats, emphasizing the significance of global collaboration in cybercrime investigations.</p>
<h3 style="text-align:left;">Impact on Victims and the Broader Community</h3>
<p style="text-align:left;">Victims of the phishing and ransomware attacks described in the Justice Department&#8217;s release suffered substantial losses, both financially and in terms of access to critical data. Organizations such as children&#8217;s hospitals and educational institutions are particularly vulnerable due to their reliance on data integrity and uninterrupted service.</p>
<p style="text-align:left;">The ripple effects of these attacks extend beyond immediate financial costs. The loss of trust in data security can deter patients and students from relying on the services offered by those institutions, thus having lasting effects on their reputation and operational capabilities.</p>
<p style="text-align:left;">Further, the notion of threats against sensitive data raises critical ethical questions regarding the responsibilities of organizations to protect personal information. As ransomware attacks become more prevalent, the need for robust cybersecurity measures becomes paramount for all sectors, not only the victims directly affected.</p>
<h3 style="text-align:left;">Consequences of Ransomware Attacks and Future Directions</h3>
<p style="text-align:left;">As the frequency and severity of ransomware attacks continue to escalate, it is clear that evolving preventative measures and enforcement strategies are required. The charges levied against <strong>Berezhnoy</strong> and <strong>Glebov</strong> demonstrate the federal government&#8217;s commitment to tackling such crimes. However, there remains an urgent need for organizations to invest in cybersecurity infrastructure to defend against such breaches proactively.</p>
<p style="text-align:left;">Government officials, including <strong>Bradley T. Smith</strong>, Acting Under Secretary of the Treasury for Terrorism and Financial Intelligence, emphasized the importance of dismantling networks that support ransomware operations. The recent sanctions against <strong>Zservers</strong>, a Russian-based hosting services provider, illustrate proactive measures aimed at disrupting the ecosystem that enables such cybercriminal enterprises.</p>
<p style="text-align:left;">In conclusion, sustained cooperation among international law enforcement agencies, robust organizational cybersecurity practices, and public awareness initiatives are essential to mitigate the impact of ransomware attacks and protect critical infrastructure.</p>
<table style="width:100%; text-align:left;">
<thead>
<tr>
<th style="text-align:left;"><strong>No.</strong></th>
<th style="text-align:left;"><strong>Key Points</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left;">1</td>
<td style="text-align:left;">Two Russian nationals have been charged with operating a ransomware group that extorted over $16 million from various U.S. entities.</td>
</tr>
<tr>
<td style="text-align:left;">2</td>
<td style="text-align:left;">The cybercriminal duo allegedly used Phobos ransomware to encrypt and steal data from their victims.</td>
</tr>
<tr>
<td style="text-align:left;">3</td>
<td style="text-align:left;">International cooperation has become crucial in tackling cybercrime, highlighted by recent arrests and coordinated efforts by various law enforcement agencies.</td>
</tr>
<tr>
<td style="text-align:left;">4</td>
<td style="text-align:left;">Victims of the attacks included essential services like children&#8217;s hospitals, leading to broader concerns about data security and public trust.</td>
</tr>
<tr>
<td style="text-align:left;">5</td>
<td style="text-align:left;">A proactive approach to cybersecurity and collaboration among authorities is essential to combat the growing threat of ransomware attacks.</td>
</tr>
</tbody>
</table>
<h2 style="text-align:left;">Summary</h2>
<p style="text-align:left;">The recent charges against <strong>Roman Berezhnoy</strong> and <strong>Egor Nikolaevich Glebov</strong> illustrate a significant challenge the U.S. and international communities face in combating ransomware and cybercrime. With extensive ramifications for victims and the potential for severe penalties for the accused, the case underscores the necessity of enhanced cybersecurity measures and collaborative law enforcement efforts to address the escalating threats posed by cybercriminal networks.</p>
<h2 style="text-align:left;">Frequently Asked Questions</h2>
<p><strong>Question: What is ransomware?</strong></p>
<p style="text-align:left;">Ransomware is a type of malicious software that encrypts files on a victim&#8217;s computer system, making them inaccessible until a ransom is paid to the attackers for decryption.</p>
<p><strong>Question: How does ransomware typically operate?</strong></p>
<p style="text-align:left;">Ransomware generally infiltrates a system through phishing emails, exploiting software vulnerabilities, or unsecured networks, leading to the encryption of files and subsequent ransom demands from the affected individuals or organizations.</p>
<p><strong>Question: What can individuals and organizations do to protect themselves from ransomware attacks?</strong></p>
<p style="text-align:left;">Protection against ransomware can be strengthened by implementing regular data backups, maintaining updated cybersecurity software, educating staff about phishing attempts, and employing strong access controls for sensitive data.</p>
</div>
<p>©2025 News Journos. All rights reserved.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://newsjournos.com/justice-department-charges-2-russians-with-operating-cybercrime-group-using-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
