DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Casinos and mining operations targeted by hackers attempting extortion – Mandiant

Posted on June 16, 2017 by Dissent

While a number of U.S. casinos have reported payment card breaches over the past four years,  a new report from Mandiant indicates that some casinos in Canada appear to have been under attack from hackers who, after acquiring customer and corporate data, attempt to extort the casinos.  Whether all of the Canadian casinos that have disclosed hacks have also received extortion demands is not clear, but over the past few years, this site has reported hacks involving Casino Rama, Grey Eagle, Cowboys Casino, and River Cree.  Not one of them has publicly stated that they received an extortion demand, and Mandiant is not revealing nor confirming the identity of any victims.

In addition to casinos, some Canadian mining companies have also been hacked and may also have received extortion demands. Although DataBreaches.net cannot be sure in all instances, this site has reported on hacks of Detour Gold, and GoldCorp that fit the pattern seen with the casinos. In GoldCorp’s case, the firm publicly acknowledged the hack and informed media that there had been an extortion demand.

In at least one of the mining hacks and at least one of the casino hacks, DataBreaches.net was contacted via email by people to alert this site to the breach and pastes on sites such as Pastebin and JustPaste.it.  In a short email interview, the hacker claimed that the motivation for the hack of the mining company was political and retaliatory, but as Mandiant’s report notes, the Russian-English in the paste was not particularly convincing, and their responses to me – just sending links to some news stories, did not seem particulary compelling.

In a new report released today, Mandiant calls the threat actors “FIN10,” and notes that their activities are not confined just to Canada. Of note, their report states:

Fireeye has observed multiple targeted intrusions occurring in North America — predominately in Canada — dating back to at least 2013 and continuing through at least 2016, in which the attacker(s) have compromised organizations’ networks and sought to monetize this illicit access by exfiltrating sensitive data and extorting victim organizations. In some cases, when the extortion demand was not met, the attacker(s) destroyed production Windows systems by deleting critical operating system files and then shutting down the impacted systems. Based on near parallel TTPs used by the attacker(s) across these targeted intrusions, we believe these clusters of activity are linked to a single, previously unobserved actor or group that we have dubbed FIN10.

OK, “FIN10” doesn’t have a particularly sexy sound to it, and these threat actors do not seem to have settled upon one name that they are using/advertising as their “brand,” sometimes calling themselves “Angels_of_Truth” and at other times, “Tesla Team,” but their potential to do damage appears severe. The report outlines what appears to be their tactics, techniques and procedures.

And like TheDarkOverlord, FIN10 uses the media and blogs like DataBreaches.net to increase public pressure on their victims, although they are more reticent in their use of media and response to media inquiries. As but one difference, TheDarkOverlord is very public about demanding extortion from named victims. I have yet to see FIN10 issue any public statement where they specifically acknowledged demanding extortion.

FIN10 also allegedly gives their victims a much shorter deadline to comply with the extortion demands: 10 days until the first data dump, and then a second data dump after another 72 hours.

Their attacks are a good reminder why corporations should either already have bitcoin on hand or at least know how to acquire it if they decide they need to pay an extortion demand at some point.

You can read Mandiant’s full report on FIN10: Anatomy of a Cyber Extortion Operation.

 

 

Related posts:

  • Forbes Breach Email Statistics
  • TeamGhostShell posts “master list” of 548 leaks (so far)
Category: Breach IncidentsBusiness SectorHackNon-U.S.

Post navigation

← NYS settles with CoPilot Provider Services over delayed breach notification to 220,000 patients
University of East Anglia leaks the names of students who have been sexually assaulted, suicidal and had abortions to the whole department →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mississippi Law Firm Sues Cyber Insurer Over Coverage for Scam
  • Ukrainian Hackers Wipe 47TB of Data from Top Russian Military Drone Supplier
  • Computer Whiz Gets Suspended Sentence over 2019 Revenue Agency Data Breach
  • Ministry of Defence data breach timeline
  • Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years
  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The patient data appear fake. (2)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The EU’s Plan To Ban Private Messaging Could Have a Global Impact (Plus: What To Do About It)
  • A Balancing Act: Privacy Issues And Responding to A Federal Subpoena Investigating Transgender Care
  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.