CEO On Ransomware Gang Is Auctioning Off Victims’ Confidential Data

Ransomware groups are joining forces to share advice, tactics, and a centralized data leak platform, so that ransomware operations can focus more on creating more sophisticated attacks and successful extortion attempts.

Experts Comments

June 03, 2020
Ilia Kolochenko
Founder and CEO
ImmuniWeb
An Interesting trend that one may observe in today's cybercrime landscape are fake threats to publish allegedly stolen data. Many organizations, whose business largely depends on its reputation, are well prepared to pay a fortune to avoid negative publicity. Another relatively new but rapidly growing scenario is exaggeration of nature or value of data stolen and encrypted by a ransomware. Organizations have limited visibility of their 'attack surface', including corporate data which is.....Read More
An Interesting trend that one may observe in today's cybercrime landscape are fake threats to publish allegedly stolen data. Many organizations, whose business largely depends on its reputation, are well prepared to pay a fortune to avoid negative publicity. Another relatively new but rapidly growing scenario is exaggeration of nature or value of data stolen and encrypted by a ransomware. Organizations have limited visibility of their 'attack surface', including corporate data which is chaotically dispersed across organization’s computers and servers. Once a machine is hacked and encrypted, victims may well believe that attackers will find a backup of their database, critical source code or other important trade secrets. However, prior to paying a ransom, you should carefully investigate, analyze and assess the situation to avoid falling victim to manipulative fraudsters.” Sadly the coronavirus pandemic has pushed many beginners in the IT field to become cybercriminals amid unemployment and lack of finding a well-paid job in their field. Thus, we will likely see a surge of fake extortion campaigns ventured by the newbies and aimed to strip organizations out of cash in a simple and swift manner.  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.