DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Larson Studios Breaks Silence about TheDarkOverlord hack and extortion (UPDATED)

Posted on June 20, 2017 by Dissent

In an intriguing follow-up to a case I reported in April concerning a hack-extortion incident involving TheDarkOverlord, Janko Roettgers reports that Larson Studios actually paid TheDarkOverlord’s 50 BTC demand. That alone would be surprising and newsworthy (there had been no payments made to the BTC wallet address given in the extortion contract), but Roettgers also reports that according to Larson, TheDarkOverlord (“TDO”) then screwed them by going after Netflix, letting Larson’s clients know about the hack, and then leaking Orange is the New Black.

Now why would TheDarkOverlord do that? If they wanted to create a brand/reputation that they will return materials and stick to their word — that they are a “professional adversary” — why did they allegedly screw Larson Studios?

And why does Larson believe that certain other victims of TheDarkOverlord paid the ransom demands?

Roettgers reports:

Meanwhile, the security company hired by Larson was looking into the Dark Overlord’s past attacks. The hacking group had targeted a number of healthcare facilities and other businesses in the previous months. “It was Gorilla Glue before us, and a children’s charity right after,” Dondorf said. Past reports seemed to suggest that paying up actually worked. “They would return the materials, destroy the materials, and it was over. This was the way they work,” said Rick Larson.

Now what past reports would those be? Not published reports, certainly, as there was no such evidence ever published. Was the security firm told something privately by previous victims? Perhaps. DataBreaches.net is not surprised to hear that some businesses paid the ransom, but would be very surprised to hear that the children’s charity paid up if they are referring to the cancer charity in Indiana.

And this is where Larson Studio’s inexperience also bit them. Not really familiar with TDO’s methods, they seem to have misunderstood when journalists reached out to them.  Jill Larson told Variety 

the hackers even contacted some journalists to ping Larson and ask about a possible incident, just to see whether it would spill the beans. The company kept quiet, and the hackers told the Larsons they had done the right thing.

The hackers probably weren’t testing Larson to see if they’d spill the beans. They were likely gaming the media, as they’ve always done, to increase pressure on Larson Studios by letting Larson know that the press was aware of the hack and ready to report on it if there was something to report. Pressure on Larson to pay would be especially intense if Larson hadn’t told any of their clients about the hack and theft of the data. It appears that Larson hadn’t told their clients by the time another journalist and DataBreaches.net both reached out to Larson. And to be clear: TDO never told me the victim was Larson Studios. This site figured it out, so there was no way me contacting Larson was a test to see if they would “spill the beans.”

But in many ways, the biggest surprise is that TheDarkOverlord did not keep their word and may have destroyed their credibility going forward:

Soon after, another email from the Dark Overlord arrived at Larson. “They said they felt they owed us an explanation as to why they had done it,” said Jill Larson. In the email, the hackers argued that Larson Studios had broken the terms of the agreement by talking to the FBI. “So they decided to punish us.”

And that, dear readers, strikes this blogger as total b.s. TDO has always known that their victims reach out to the FBI, and has often included little notes in their emails to victims like, “Say Hello to the FBI for us.” They have never, to my knowledge, then “punished” a victim who paid up.

So something doesn’t seem right here, and I am more inclined to believe that they got greedy and tried to get more money from Netflix and then other networks and studios. If I’m wrong, they’re welcome to contact me via secure chat to explain how. I dislike it when things don’t make sense to me.

UPDATE: I was able to make contact with TheDarkOverlord, who tells a somewhat different story than what Roettgers tells. In an encrypted chat, TDO claimed that unlike other victims who have talked to law enforcement, Larson Studios went much further and worked directly with law enforcement.

We’re a professional outfit. Unfortunately, in any line of business, sometimes clients can become disruptive to their own good. In this case, Larson Studios blatantly violated the terms of our agreement by extensively cooperating with law enforcement. Our reaction was a direct result of the disregard Larson Studios had for our contract. 

They would not reveal exactly what Larson had done, but their point was clear – that this was not just a case of a victim reporting the hack and extortion attempt to the FBI.
“Larson Studios is the first client we’ve ever had this much trouble from,” they tell DataBreaches.net.  And because Larson breached their contract, they took the steps they took.
Category: Business SectorHackOf NoteU.S.

Post navigation

← AU: Confidential child protection files on sale at Alice Springs tip shop
Waverly Health Center hit by ransomware; patient records not compromised →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)
  • Cyberattack brings down Kettering Health phone lines, MyChart patient portal access (1)
  • Gujarat ATS arrests 18-year-old for cyberattacks during Operation Sindoor
  • Hackers Nab 15 Years of UK Legal Aid Applicant Data
  • Supplier to major UK supermarkets Aldi, Tesco & Sainsbury’s hit by cyber attack with ransom demand

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.