Ransomware gang tries new tactic to squeeze victim firm

Share post:

A ransomware gang has found a new way to publicly embarrass corporate victims who think they can quietly refuse to pay for the return of their data.

Often gangs create data leak sites on the dark web that list organizations they’ve hit, first listing the firm with a few teaser files as proof the gang actually copied data, then with a larger list of files that are being made available for other criminal groups to have or buy. Dark web sites may be found by reporters and security researchers, but not the general public.

But according to the Bleeping Computer news site, the ALPHV/BlackCat gang recently created a publicly-available site leak site for an unnamed financial company it hit that refused to pay. The website mimics rather than faithfully copies the victim’s site design and domain, but it can be easily found and doesn’t hide its message: This company was hacked and here’s all of its data.

This came after ALPHV/BlackCat said on its dark website that the company had been hacked. The publicly-available copycat site with over 3GB of documents was put up shortly after.

The tactic not only squeezes this firm, it also sends a message to other organizations that not paying up could severely damage the firm’s reputation.

Meanwhile, the LockBit ransomware gang has apologized for hitting Toronto’s Hospital for Sick Children.

The post Ransomware gang tries new tactic to squeeze victim firm first appeared on IT World Canada.

Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, March 29, 2024 – PyPI repository shuts to stop malicious uploads, a plea to developers to stop creating apps with SQL...

This episode reports on a US$10 million reward for a ransomware gang, a new Linux version of a backdoor

Cyber Security Today, March 27, 2024 – A botnet exploits old routers, a new malware loader discovered, and more warnings about downloading code from...

This episode reports on a new network of 40,000 infected small and home office routers and other devices that are part of a criminal botnet

Cyber Security Today, March 25, 2024 – A suspected China threat actor going after unpatched F5 and ScreenConnet installations

This episode reports on a new campaign stealing email passwords ,the latest data breaches

A hacker’s view of the civic infrastructure: Hashtag Trending, the Weekend Edition for March 23rd, 2024

What does the civic infrastructure look like through the eyes of a hacker? The legendary general Sun Tzu in the Art of War said that in order to defeat your enemy, you must first understand your enemy. How do you do this? He said, “to know your enemy, you must become your enemy.” If we

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways