Getting hit with ransomware can be devastating to a company, but malware operators are trying to make it even worse. Not only are they holding potentially vital data hostage, but they’re also threatening to shame companies that don’t quietly pay the ransom. The cybercriminals behind the Maze Ransomware have set up a website where they have pledged to reveal which companies don’t “work with [them]” to recover data.
We all benefit from encryption when it keeps our files and communications private, but the same technology makes ransomware possible. Ransomware can target individuals, but the criminals behind these operations have increasingly targeted companies with deeper pockets than your average computer user. Upon infecting a computer, ransomware encrypts important files and deletes the originals. To retrieve the files, the victim has to pay a ransom (usually in Bitcoin) in exchange for the decryption key.
The Maze site, which is hosted on the open internet (and we won’t be linking), lists eight companies that have refused to pay the company’s ransom. The group lists the date of the attack, a selection of stolen files, and the total volume of data collected. Yes, Maze has gone to the added effort of stealing data from infected systems as extra leverage.
This is something ransomware authors have threatened in the past, but Maze is the first known to have done it. The makers of the Sodinokibi/rEvil ransomware have posted recently on dark web forums that they are finalizing plans to do something very similar. They hope that threatening companies with those stolen files with increase the number willing to pay up. Of course, you’d have to trust these groups to delete the stolen data after being paid, which seems far from certain.
Maze frames this as a public service that will reveal companies that are attempting to hide the unauthorized attack on their systems. However, it’s a rather transparent threat that could cause more companies to pay for fear of having private data released. The end result is that companies need to start treating malware attacks like data breaches. If customer data is included in encrypted volumes after the attack, it’s entirely possible that data is in the hands of criminals. Companies will need to do all the usual data breach things: notify customers, reset passwords, and issue carefully crafted but ultimately hollow apologies.
Apple’s M1 Positioning Mocks the Entire x86 Business Model
Apple is positioning its M1 quite differently from any CPU Intel or AMD has released. The long-term impact on the PC market could be significant.
Dell Business Warranty Service is Now a Clown Car
Small businesses are increasingly given short-shrift by large tech corporations. Dell has shown that it really doesn't have a support organization that has any clue, or the needed resources, to provide the warranty service it promises.
Report: LG Can’t Find Anyone to Buy Its Smartphone Business
LG has been trying to turn its mobile unit around for the last several years, but it has yet to pull out of the red. In early 2021, rumors suggested LG was looking to sell off its smartphone business. Now, a new South Korean report says LG has tried and failed to find a suitor, and the next step might just be to shut down the division entirely.
Report: LG Will Kill its Smartphone Business on April 5th
LG hasn't earned a profit on phones in years, and a leaked memo last month suggested the company was considering radical steps to change that. One option was to shutter the phone business entirely, and it's looking increasingly like that's what will happen.