Ransomware Groups Now Threatening to Release Stolen Data If Businesses Don’t Pay

Getting hit with ransomware can be devastating to a company, but malware operators are trying to make it even worse. Not only are they holding potentially vital data hostage, but they’re also threatening to shame companies that don’t quietly pay the ransom. The cybercriminals behind the Maze Ransomware have set up a website where they have pledged to reveal which companies don’t “work with [them]” to recover data.
We all benefit from encryption when it keeps our files and communications private, but the same technology makes ransomware possible. Ransomware can target individuals, but the criminals behind these operations have increasingly targeted companies with deeper pockets than your average computer user. Upon infecting a computer, ransomware encrypts important files and deletes the originals. To retrieve the files, the victim has to pay a ransom (usually in Bitcoin) in exchange for the decryption key.
The Maze site, which is hosted on the open internet (and we won’t be linking), lists eight companies that have refused to pay the company’s ransom. The group lists the date of the attack, a selection of stolen files, and the total volume of data collected. Yes, Maze has gone to the added effort of stealing data from infected systems as extra leverage.

This is something ransomware authors have threatened in the past, but Maze is the first known to have done it. The makers of the Sodinokibi/rEvil ransomware have posted recently on dark web forums that they are finalizing plans to do something very similar. They hope that threatening companies with those stolen files with increase the number willing to pay up. Of course, you’d have to trust these groups to delete the stolen data after being paid, which seems far from certain.
Maze frames this as a public service that will reveal companies that are attempting to hide the unauthorized attack on their systems. However, it’s a rather transparent threat that could cause more companies to pay for fear of having private data released. The end result is that companies need to start treating malware attacks like data breaches. If customer data is included in encrypted volumes after the attack, it’s entirely possible that data is in the hands of criminals. Companies will need to do all the usual data breach things: notify customers, reset passwords, and issue carefully crafted but ultimately hollow apologies.
Continue reading

$340K Worth of MSI RTX 3090 GPUs Stolen in Factory Heist
MSI has been hit by a factory theft the company believes was an inside job. Roughly $340,000 worth of RTX 3090 GPUs were stolen.

Source Code Stolen from Cyberpunk 2077 Developer Reportedly Sold
Polish game developer CD Projekt Red (CDPR) announced earlier this week that it had been the victim of a ransomware hack. As part of the operation, the attackers stole internal documents and source code, which they threatened to sell if CDPR declined to pay the ransom. Cybersecurity experts now say that the hacking group has followed through and sold the stolen data for an undisclosed sum.

OnePlus Says 40,000 Credit Card Numbers Were Stolen From Its Site
It turns out a malicious script has been hiding on its website for about two months.

Someone Stole My Entire Book (and My Job) and Is Selling It On Amazon
I admit that in the grand scheme of things that could go wrong in tech these days, I wasn't quite expecting this one.