Groups Similar Look up By Text Browse About

Similar articles
Article Id Title Prob Score Similar Compare
206520 ARSTECHNICA 2021-4-28:
Ransomware crooks threaten to ID informants if cops don’t pay up
1.000 Find similar Compare side-by-side
206466 TECHREPUBLIC 2021-4-28:
Ransomware attack hits Washington, D.C. police department
0.947 0.570 Find similar Compare side-by-side
206969 ARSTECHNICA 2021-5-1:
An ambitious plan to tackle ransomware faces long odds
0.451 Find similar Compare side-by-side
206726 ZDNET 2021-4-30:
Ransomware is now a national security risk. This group thinks it knows how to defeat it
0.014 0.388 Find similar Compare side-by-side
206638 ZDNET 2021-4-27:
Ransomware extortion demands are growing, and so is the downtime caused by attacks
0.380 Find similar Compare side-by-side
206682 VENTUREBEAT 2021-4-30:
Ransomware task force unveils broad manifesto for fighting back
0.004 0.378 Find similar Compare side-by-side
206422 ZDNET 2021-4-28:
Emotet botnet harvested 4.3 million email addresses. Now the FBI is using Have I Been Pwned to alert the victims
0.377 Find similar Compare side-by-side
206702 VENTUREBEAT 2021-4-29:
Government and industry to combat ransomware with Bitcoin regulation
0.363 Find similar Compare side-by-side
206778 VENTUREBEAT 2021-4-29:
It’s now or never: Society must respond to the ransomware crisis
0.358 Find similar Compare side-by-side
206799 ZDNET 2021-4-29:
Paleohacks data leak exposes customer records, password reset tokens
0.357 Find similar Compare side-by-side
206410 VENTUREBEAT 2021-4-26:
HashiCorp revoked private key exposed in Codecov security breach
0.339 Find similar Compare side-by-side
206660 ZDNET 2021-4-28:
Ombudsman finds unlawful metadata access by ACT cops on 1,704 occasions
0.338 Find similar Compare side-by-side
206597 ZDNET 2021-4-26:
Thodex cryptocurrency exchange chief allegedly goes on the run with $2bn in client funds
0.334 Find similar Compare side-by-side
206474 VENTUREBEAT 2021-4-27:
Cigent Technology melds security and storage to protect sensitive data
0.334 Find similar Compare side-by-side
206648 ZDNET 2021-4-27:
FBI: Russian hackers are still trying to break into networks, here's how to protect yours from attack
0.311 Find similar Compare side-by-side
206569 ZDNET 2021-4-27:
UnitingCare Queensland security incident takes some systems offline
0.308 Find similar Compare side-by-side
206614 ZDNET 2021-4-26:
Australian man sentenced for running stolen subscription credential service
0.307 Find similar Compare side-by-side
206396 ARSTECHNICA 2021-4-26:
It took Facebook two months to realize “Stop the Steal” might turn violent
0.303 Find similar Compare side-by-side
206662 ZDNET 2021-4-28:
Microsoft mulls over tweaks to threat data, code-sharing scheme following Exchange Server debacle
0.294 Find similar Compare side-by-side
206955 ARSTECHNICA 2021-4-30:
More US agencies potentially hacked, this time with Pulse Secure exploits
0.293 Find similar Compare side-by-side
206543 VENTUREBEAT 2021-4-25:
CISA warns of credential theft via SolarWinds and PulseSecure VPN
0.278 Find similar Compare side-by-side
206666 THEVERGE 2021-4-29:
Volkswagen is being investigated for its ‘Voltswagen’ stunt
0.275 Find similar Compare side-by-side
206745 ARSTECHNICA 2021-4-29:
Conspiracy theorist said death threats were “jokes”—but jury didn’t buy it
0.270 Find similar Compare side-by-side
206362 ZDNET 2021-4-26:
This password-stealing Android malware is spreading quickly: Here's what to watch out for
0.268 Find similar Compare side-by-side
206513 TECHREPUBLIC 2021-4-26:
How to improve performance when opening a file from a remote shared folder in Windows 10
0.265 Find similar Compare side-by-side


ID: 206520


Date: 2021-04-28

Ransomware crooks threaten to ID informants if cops don’t pay up

The FBI is investigating claim hackers obtained 250GB of police department data. Ransomware operators have delivered a stunning ultimatum to Washington, DCs Metropolitan Police Department: pay them $50 million or theyll leak the identities of confidential informants to street gangs. Babuk, as the group calls itself, said on Monday that it had obtained 250GB of sensitive data after hacking the MPD network. The groups site on the darkweb has posted dozens of images of what appear to be sensitive MPD documents. One screenshot shows a Windows directory titled Disciplinary Files. Each of the 28 files shown lists a name. A check of four of the names shows they all belong to MPD officers. Other images appeared to show persons-of-interest names and photos, a screenshot of a folder named Gang Database, chiefs reports, lists of arrests, and a document listing the name and address of a confidential informant. We advise [sic] you to contact us as soon as possible, to prevent leakage, a post on the site says. If no response is received within 3 days, we will start to contact gangs in order to drain the informants. In an email, MPD Public Information Officer Hugh Carew wrote: We are aware of unauthorized access on our server. While we determine the full impact and continue to review activity, we have engaged the FBI to fully investigate this matter. Carew didnt answer questions seeking additional details about the breach. In a videotaped message published on Tuesday night, Metropolitan Police Chief Robert J. Contee III said that with the assistance of local and federal partners, MPD has identified and blocked the mechanism that allowed the intrusion. He provided no new details about the breach or the ongoing investigation into it. Our partners are currently fully engaged in assessing the scope and impact, he said. In the course of the review, if it is discovered that personal information of our members or others was compromised, we will follow up with that information. The chief then went on to encourage people to maintain good cyber hygiene. The incident underscores the growing brazenness of ransomware operators. Once content with merely locking up victims data and demanding a ransom in exchange for the key, they eventually introduced a dual-revenue model that charged for the key but also promised to publish sensitive documents online unless the ransom was paid. In recent weeks, at least one gang has started contacting customers and suppliers of victims to warn them their data may be spilled if the victims dont pay up. Threatening to identify confidential informants to organized criminal gangs—as Babuk appears to be doing now—hits a new low, said Brett Callow, a threat analyst who follows ransomware at security firm Emsisoft. That's as bad as it gets, he told Ars. Can you imagine the potential for lawsuits if an informant were to be harmed as a direct result of the breach?Babuk is a relatively new ransomware enterprise that appeared in January. Not much is known about the group other than it has Russian-speaking team members, and Emsisoft researchers found a severe bug in the groups decryptor software that caused data loss. The groups darkweb site claims to have breached almost a dozen other companies. Last week, a US Justice Department memo showed the agency convening a new task force to respond to the recent surge in ransomware attacks, particularly on hospitals and other critical US organizations. Acting Deputy Attorney General John Carlin will lead the task force, which is made up of agents and prosecutors from the FBI and Justice Department. The leak might pose a threat not just to confidential informants but also to ongoing investigations. Federal prosecutors last year dropped narcotics charges against six suspects after crucial evidence was destroyed in a ransomware infection.