DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

If the ransomware doesn’t get you, the DDoS might (UPDATE4)

Posted on November 9, 2015 by Dissent

Extortionists are busier than ever. This past week saw more reports on ransomware that corrupts files even if you pay the ransom, and DDoS attacks so powerful that usual defenses may be inadequate.

Brian Krebs reports:

One of the more common and destructive computer crimes to emerge over the past few years involves ransomware — malicious code that quietly scrambles all of the infected user’s documents and files with very strong encryption.  A ransom, to be paid in Bitcon, is demanded in exchange for a key to unlock the files. Well, now it appears fraudsters are developing ransomware that does the same but for Web sites — essentially holding the site’s files, pages and images for ransom.

Read more on KrebsOnSecurity.com, where Brian also includes some info on backing up your system. One of the things he reports – and I’ve seen this elsewhere as well – is that there’s something about the new ransomware that even when you are eventually able to decrypt your files (assuming you pay the ransom), some of the files seem to be corrupted by the ransomware’s decryption. TheHackerNews also has more on the Linux ransomware Brian discusses.

Besides the ransomware threat this week, I am also seeing more about companies paying extortion demands to avoid massive DDoS attacks that are taking down web sites. A few days after ProtonMail announced that it had paid the extortion demands at the urging of its web host and other companies affected by the massive attack, a tweet from @CocaineSecurity suggested that Swedbank had  paid an extortion demand to stop a DDoS attack. In a tweet on November 7, @CocaineSecurity wrote:

Thanks for the bitcoins! @Swedbank Nobody will now touch your website.

— CocaineSecurity (@CocaineSecurity) November 7, 2015

“Thanks for the bitcoins! @Swedbank Nobody will now touch your website.”

As of the time of this posting, there’s been no statement from Swedbank either confirming or denying the claim that they paid the extortion demand.

Update: Swedbank just responded to my tweeted inquiry about this by replying that they have not paid any ransom demand and have reported the individual to the police:

@PogoWasRight We haven’t paid anyone. We have reported the person behind this to the police. — Swedbank Sverige (@Swedbank) November 9, 2015

@CocaineSecurity quickly responded with its own tweet:

@PogoWasRight @Swedbank Wanna go down again? We do bite — CocaineSecurity (@CocaineSecurity) November 9, 2015

“@PogoWasRight @Swedbank Wanna go down again? We do bite”

Update2: Not all are DDoS attacks, it seems.

Update3: Paying ransom didn’t work. See ProtonMail DDoS wipeout: Day 6. Yes, we’re still under attack

Update4: Hushmail is also under DDoS attack. Runbox was hit over the weekend, but reports they are now functioning normally. VFEMail was also attacked.


Related:

  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • Uncovering Qilin attack methods exposed through multiple cases
  • Predatory Sparrow Strikes: Coordinated Cyberattacks Seek to Cripple Iran's Critical Infrastructure
  • Ex-CISA head thinks AI might fix code so fast we won't need security teams
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
Category: Commentaries and Analyses

Post navigation

← IE: 317 civil servants hit by payroll system data breach due to brain fade at PeoplePoint
We’ve Never Seen a Stolen Credit Card Market as Slick as This →

5 thoughts on “If the ransomware doesn’t get you, the DDoS might (UPDATE4)”

  1. Anonymous says:
    November 9, 2015 at 9:43 am

    I get the feeling that there will be more than this one update, laff. 😉

    Is this the same group responsible for all the email hosts/providers going up and down like yo-yo’s?

    1. Dissent says:
      November 9, 2015 at 9:57 am

      I share your guess that there will be more updates. Not sure whether it’s the same group that hit ProtonMail. Can’t believe everything I read. 🙂

      1. Anonymous says:
        November 9, 2015 at 12:22 pm

        a provider called Zoho is also hit. Never heard of them before, but they claim to have 15M users. See, https://twitter.com/zoho

        Makes me wonder if there is one main provider that resells their services (re-branded reselling) and if all these providers are interrelated?

        Zoho states they are “facing a criminal cyber-attack”.
        https://blogs.zoho.com/service-updates

        They all seem to have started around the same time, which leads me to question if they are rebranded from one main company type thing…

        1. Dissent says:
          November 9, 2015 at 1:07 pm

          Thanks for sharing the info. Since some of those being hits are Swedish sites/businesses uninvolved in email, it seems likely that there really are two different groups of attackers.

          1. Anonymous says:
            November 9, 2015 at 1:32 pm

            Likely. So just coincidence then.
            Secure email providers are having a bad week.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.