home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,586 of 2,445   
   Mike Powell to All   
   Ransomware gangs are now   
   02 Aug 25 18:29:39   
   
   TZUTC: -0500   
   MSGID: 1320.consprcy@1:2320/105 2cf3da8b   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Ransomware gangs are now expanding to physical threats in the real world   
      
   Date:   
   Fri, 01 Aug 2025 12:04:00 +0000   
      
   Description:   
   More than half of CEOs threatened with physical violence unless their company   
   paid a ransom demand.   
      
   FULL STORY   
      
   Ransomware gangs seem to be getting desperate when it comes to getting   
   results, as besides encrypting and leaking data on the web, theyve also   
   started threatening CEOs with physical violence.    
      
   Cybersecurity researchers Semperis claim over the past 12 months, in 40% of   
   ransomware incidents, the CEOs of the affected company were also physically   
   threatened - which rises to 46% among US-based organizations.    
      
   But even paying up may not be enough, as the research found more than half   
   (55%) of organizations who paid a demand did so multiple times, with nearly a   
   third (29%) of those firms paying three or more times, and 15% were not even   
   sent decryption keys, or received corrupted keys.   
      
   Physical violence    
      
   Threatening to file a regulatory complaint also seems to be a popular tactic,   
   Semperis found. It was observed in 47% of attacks, rising to 58% in the US.    
      
   In 2023, the infamous BlackCat ransomware group reported one of its victims    
   to the SEC to get them to pay, with this tactic due to growing regulatory   
   requirements around cyber incident reporting, including the SECs four-day   
   disclosure rule for publicly traded companies.    
      
   Ransomware has been around for more than a decade, and during this time it    
   has evolved multiple times. It started with just encryption, which companies   
   quickly mitigated by keeping offline backups of all the key data.    
      
   Criminals then responded by stealing the data first, and threatening to   
   release it on the dark web unless a payments made. This strategy, known as   
   double extortion works rather well, so well in fact that some criminals   
   abandoned the encryption part altogether and are just focused on stealing   
   files.    
      
   However, many companies refuse to budge, forcing the criminals into even   
   bigger extremes.    
      
   In some cases, they pair the encryption of the back-end with a Distributed   
   Denial of Service (DDoS) on the front-end, bringing the entire business to a   
   screeching halt. Phone calls to victim organizations were also observed in a   
   couple of cases, and now, we can add physical threats to the mix, as well.    
      
   While some circumstances might leave the company in a non-choice situation,    
   we should acknowledge that it's a downpayment on the next attack," noted   
   Mickey Bresman, CEO of Semperis.    
      
   "Every dollar handed to ransomware gangs fuels their criminal economy,   
   incentivizing them to strike again. The only real way to break the ransomware   
   scourge is to invest in resilience, creating an option to not pay ransom," he   
   commented.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/ransomware-gangs-are-now-expanding-to-p   
   hysical-threats-in-the-real-world   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca