DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

What’s new in ransomware gang pressure tactics? Not as much as you might think.

Posted on March 13, 2023 by Dissent

It’s hard to believe, but it has really been 17 years since PogoWasRight.org began blogging about breaches, and it’s been 14 years since this spinoff site, DataBreaches.net, opened. Since then, DataBreaches has often reported on criminals’ tactics to secure payment from victims, especially those in the healthcare sector. Thousands of archived posts on DataBreaches.net provide a useful collection of news items and posts to identify and document historical trends.

cartoon illustration of blackhat criminal holding folders in one hand and a lock in the other while staring at laptop.

Some developments really have been novel, such as the use of a double extortion model and the creation of dark web leak sites to try to name and shame victims into paying demands. Other developments or tactics have not been as enduring or effective.

This month, some news sites report that ransomware attacks may be entering a heinous new phase. Are they really, though? Join me for a stroll down an ugly memory lane because what is being discussed as “new” is not really new at all.

Gang Leaks Nude Photos of Patients

The BlackCat ransomware gang recently leaked some nude photos of cancer patients from a healthcare entity in Pennsylvania that wouldn’t pay their ransom demand. The gang has threatened to leak more. But is this really a sign of any new or escalating trend, as suggested in a report on Wired?

BlackCat is certainly not the first gang to use nude photos of patients and threats of more of the same to try to pressure victims into paying a ransom. The tactic never became a trend before, even though earlier criminals were desperate to secure payment from victims.

DataBreaches remembers back in 2016 when thedarkoverlord (TDO) gleefully posted unredacted photos of identifiable patients of a U.S. medical practice who were amputees in various stages post-surgically. Then in 2017, TDO hacked a prominent plastic surgery clinic in the U.K. and sent news outlets graphic photos of genitalia taken from the surgery’s files. But other than a few images publicly leaked by the threat actors more than a year later when a few celebrity patients of the clinic refused to pay them to delete their files,  other photos from the massive trove of images were never leaked publicly.  TDO would later claim that the clinic had paid something, but it seemed that TDO never got the payment they wanted and yet still didn’t dump the photos.

TDO wasn’t the only criminal gang threatening to dump nude photos of patients or actually leaking them back then. In 2017, DataBreaches also noted a report that personal records and photos of patients from the Grožio Chirurgija plastic surgery clinic in Lithuania were up for sale on the dark web. The criminals reportedly contacted some of the patients to give them the first opportunity to buy or ransom their own pictures and delete them from public availability.

So is what BlackCat did this month by leaking  nude pictures of cancer patients and threatening to leak more really anything new? Not at all. And they should not be rewarded for their vile behavior.

Hopefully, though, entities will be concerned enough that this might happen to them that they will lock down their data better and/or get it offline to protect it better. Will the next medical victim be sued for not protecting sensitive images better when plaintiffs can argue that data theft and public data leaking were foreseeable after the BlackCat leak?

Gang Uses .mp4’s to Show Scope of Attack

Another “new” or alleged escalation that is also not new at all involves the Medusa ransomware gang’s use of a 51-minute .mp4 to show the scope of what they were able to access from Minneapolis Public Schools (MPS).

Some news sites quoted a well-known analyst who said he had never seen anything like that .mp4 usage before, but DataBreaches has seen it — and not just once but numerous times since early 2021.

Both the ALTDOS and DESORDEN groups that DataBreaches reported on frequently have used .mp4 files in their proof of claims and to send to news outlets to encourage media coverage. Unlike the Medusa gang, however, ALTDOS and DESORDEN did not upload to Vimeo and their mp4 files generally included an open letter to their victims.

Nothing New Under the Sun

Despite what quotes from some analysts or experts suggest, DataBreaches respectfully disagrees with them and does not see anything really new or any indications of any new trends at this point when it comes to tactics for pressuring victims to pay.

Could or will either of the two tactics discussed in this post become an actual trend? They never have in the past, and if victims continue to refuse to pay ransom despite these tactics, they will likely not become a trend. But if victims cave in and pay, then we might realistically expect to see more adoption of these strategies. Behavioral principles apply to ransomware tactics and strategies. If you don’t want the behavior to continue or escalate, don’t reward it.


Related:

  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
Category: Breach IncidentsCommentaries and AnalysesMalware

Post navigation

← A joke gone too far: “thekilob” falsely accused of being responsible for DC Links breach
Ransomware Vulnerability Warning Pilot (RVWP) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
  • ALT5 Sigma sues former consultant over alleged data breach
  • Is your cyberinsurance paid up? Are you sure?
  • Everest Group Interview on Collins Aerospace Breach — Daily Dark Web
  • Breaking Up With Edtech Is Hard to Do
  • Benworth Capital Partners negotiated with threat actors after more than 25,000 lenders had data stolen
  • Android Hit by 0-Click RCE Vulnerability in Core System Component
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Illuminate Education For Failing to Protect Students’ Data
  • The Congressional Budget Office was hacked. It says it has implemented new security measures.
  • Clop Ransomware group claims the breach of The Washington Post

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Modern cars are spying on you. Here’s what you can do about it.
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Education Software Company for Failing to Protect Students’ Data       
  • EU Parliament committee votes to advance controversial Europol data sharing proposal
  • DHS offers “disturbing new excuses” to seize kids’ biometric data, expert says
  • California Adds Injunctive Relief to its Right of Publicity Statute and Extends Liability to Digital Replicas

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.