DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Everything old is new again? Ransomware groups stop encrypting and switch to theft/extortion model.

Posted on June 25, 2022 by Dissent

In a new post at The Register, Jessica Lyons Hardcastle reports, in part:

….. Increasingly, however, cybercrime rings still tracked as ransomware operators are turning toward primarily data theft and extortion – and skipping the encryption step altogether. Rather than scramble files and demand payment for the decryption keys, and all the faff in between in facilitating that, simply exfiltrating the data and demanding a fee to not leak it all is just as effective. This shift has been ongoing for many months, and is now virtually unavoidable.

The shift from locking data to just stealing it and attempting to extort victims sounds like a return to a decade ago when groups like Rex Mundi and then later, thedarkoverlord, would privately — and then publicly — threaten to start leaking or selling data that they had hacked and exfiltrated if their victims did not pay.

This week, DataBreaches received a copy of a communication that Hive threat actors have sent to a victim in the U.K. The victim is a firm of chartered accountants and auditors. Hive’s note reads:

Downloaded most important information of you and your clients. This information contains a lot of personal information, including passports, contracts, NIN’s and another sensitive data.

Since your company is not very big and it doesn’t have big revenue and good cyberprotection we decided not to damage your business and not to encrypt your entire network. But we still have a lot of your information that we can use in different ways. You can find link below this message with a sample of files that we downloaded. To ensure that your network has been hacked – you can ask your IT specialists.

We remind you that after the unauthorised publication of this data you should expect court fines, both from your clients and from the regulator, and also a huge business reputation loss.

We offer you to enter into negotiations with us as soon is possible, to do this you should only answer this e-mail. If you refuse to contact us for 3 next days we will be forced to publish all data from your network for free download. Plus we will send emails about this breach to all your customers.

Have a good day!

Appended to their note was a copy of a file tree and a sample of more than 100 files that appear to be from the named victim. The files were what you might expect from a firm of chartered accountants and auditors, with numerous client records, banking statements, completed tax forms for clients, payroll-related information on departing employees, etc.

[Note: DataBreaches is not naming the victim firm at this time because we have not contacted them to attempt to confirm any claims or to seek a response to claims. Nor would we want to interfere with any negotiations if any is going on.]

Will a return to the old theft/extortion model work as well in 2022 as the model that involved encryption? Will ransomware groups/threat actors lower their ransom amounts because no encryption or decryption key is needed?

And will more victims decide not to pay because the public now understands that pretty much all companies can become victims, so there is less potential reputation harm? And is there also less reason to pay when the law still requires you to notify even if you paid extortion to get assurances?

It will be interesting to see how this new approach plays out over time.

 


Related:

  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • Hotel and Casino near Las Vegas Strip suffers data breach, documents say
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
Category: Commentaries and AnalysesHackOf NoteOther

Post navigation

← New York State School District Audits Released in June
Expensive week for Carnival Corp: a $1.25 million settlement with states over one breach, then a $5 million settlement with New York for violating state cybersecurity regulation →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.