Ransomware gang tries new tactic to squeeze victim firm

Share post:

A ransomware gang has found a new way to publicly embarrass corporate victims who think they can quietly refuse to pay for the return of their data.

Often gangs create data leak sites on the dark web that list organizations they’ve hit, first listing the firm with a few teaser files as proof the gang actually copied data, then with a larger list of files that are being made available for other criminal groups to have or buy. Dark web sites may be found by reporters and security researchers, but not the general public.

But according to the Bleeping Computer news site, the ALPHV/BlackCat gang recently created a publicly-available site leak site for an unnamed financial company it hit that refused to pay. The website mimics rather than faithfully copies the victim’s site design and domain, but it can be easily found and doesn’t hide its message: This company was hacked and here’s all of its data.

This came after ALPHV/BlackCat said on its dark website that the company had been hacked. The publicly-available copycat site with over 3GB of documents was put up shortly after.

The tactic not only squeezes this firm, it also sends a message to other organizations that not paying up could severely damage the firm’s reputation.

Meanwhile, the LockBit ransomware gang has apologized for hitting Toronto’s Hospital for Sick Children.

The post Ransomware gang tries new tactic to squeeze victim firm first appeared on IT World Canada.

Howard Solomon
Howard Solomonhttps://www.itworldcanada.com
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Google Chrome update essential for Windows users

The latest Chrome update has just been rolled out, bringing the version up to 124.0.6367.78/.79. This update is...

Cyber Security Today, Week in Review for week ending Friday, April 26, 2024

This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future

Cyber Security Today, April 26, 2024 – Patch warnings for Cisco ASA gateways and a WordPress plugin

This episode reports on the malicious plugin worm that refuses to die

Cyber Security Today, April 24, 2024 – Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more

This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and passw

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways