• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      Computing Tech Marketing & Innovation Awards
      • Date: 12 Jun 2020
      • TBC, London
      event logo
      AI & Machine Learning Awards 2020

      The Computing AI & Machine Learning Awards recognise the best companies, individuals, and projects in the AI space today. The awards cover every corner of the industry: security, ethics, data analysis, innovation and more, as well as showcasing the movers and shakers: the technology heroes and projects that deserve industry-wide praise. The winners will be announced in London on 1 July 2020. Entries are now open!

      • Date: 01 Jul 2020
      • TBC, London
      Digital Technology Leader Awards

      For too long the limelight has shone exclusively on marketing staff. The Computing Digital Technology Leaders Awards exist to recognise the achievements of the individuals and companies who are really making it happen at the coal face of the digital technology stack: from website design and coding to UX and project management, from scrum masters and product managers, all the way up to the CDO.

      • Date: 08 Jul 2020
      • London TBC, London
      event logo
      Computing DevOps Live 2020
      • Date: 14 Jul 2020
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    •  

       

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Security

More ransomware groups threaten to publish data stolen data from non-payers

More and more ransomware groups are starting to steal data before encryption in order to blackmail their victims into paying up

Keeping systems patched as a matter of priority is the first line of defence against ransomware
Keeping systems patched as a matter of priority is the first line of defence against ransomware
  • Computing News
  • 25 March 2020
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

Three new ransomware groups have established websites where the sensitive data of non-payers will be published, adopting the strategy established last year by the Maze ransomware group. That approach was subsequently copied by the Sodinokibi/REevil group, Nemty and DoppelPaymer and now looks to be going mainstream among cyber-crime groups.

The new groups include the Nefilim ransomware group, which has set-up a site called ‘Corporate Leaks'; the CLOP ransomware group, responsible for an attack on Maastricht University in February; and, the Sekhmet ransomware group, a relatively new group, according to Bleeping Computing, which has set up a site called "Leaks leaks and leaks".

The Sodinokibi/REevil group was responsible for the attack on Travelex on New Year's Eve. This took the company's systems down for a month. Travelex's parent company, Finablr, is now on the verge of calling administrators.

It's not known whether the Sodinokibi ransomware group exfiltrated data from Travelex prior to encrypting the company's systems, and it hasn't publicly threatened to publish any Travelex data - yet. The company is also believed to have negotiated with the gang regarding payment, although Travelex has refused to confirm or deny whether it paid up.

The group is believed to have taken advantage of an unpatched Pulse Secure VPN server to gain entry, and could had access to Travelex's systems for months before it launched the attack.

Information about the Travelex ransomware is sketchy as the company has refused to release any comprehensive information.

Travelex had claimed that , strictly speaking, it had not suffered a data breach as there was no evidence of data exfiltration having occurred. As a result, it argued that it did not need to report the attack to the Information Commissioner's Office (ICO) within the 72 hours required under GDPR.

The ICO, however, will almost certainly have a different interpretation, with ransomware widely believed to constitute a data breach under GPDR.

 

  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Security
  • Threats and Risks
  • Cloud Computing
  • Security
  • ransomware
  • Nemty
  • DoppelPaymer
  • Travelex
  • ICO
  • Sodinokibi
  • REevil
  • Nefilim
  • CLOP
  • Sekhmet
  • Corporate Leaks

More on Security

This is, literally, what a hacker looks like. No, really...
Half of all UK businesses hit by security breaches in the past 12 months, according to government Cyber Security Breaches Survey 2020

More businesses and charities than ever are being hit by cyber attacks, according to the latest survey – but organisation are also becoming more resilient

  • Security
  • 25 March 2020
It's not known how much information was compromised in one of the largest China-sourced cyber attacks to date
Surge in attacks from China-linked APT41 targeting unpatched Citrix servers and Cisco routers

APT41 attacks carried out between January and March targeted unsecured Citrix NetScaler servers and Cisco routers

  • Security
  • 25 March 2020
Easy availability of ICS hacking tools poses big threat to industrial sector, researchers warn
Easy availability of ICS hacking tools poses major threat to industrial sector, researchers warn

Most tools are 'vendor agnostic' and can target products from some of the largest ICS original equipment manufacturers, warns FireEye

  • Threats and Risks
  • 24 March 2020
Spanish hospitals have been targeted with coronavirus-themed ransomware
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks

Groups behind Netwalker switched phishing baits to coronavirus last week - as other ransomware groups pledged to avoid medical facilities

  • Security
  • 24 March 2020
Hackers are exploiting two zero-day vulnerabilities in Windows Adobe Type Manager Library
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited

All supported versions of Windows operating system are affected

  • Threats and Risks
  • 24 March 2020
blog comments powered by Disqus
Back to Top

Most read

NASA forgot about the egress costs for its 247 petabyte data store on AWS
NASA forgot about the egress costs for its 247 petabyte data store on AWS
Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
BT: Working from home? We can handle it
BT: Working from home? We can handle it
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading