DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

If the ransomware doesn’t get you, the DDoS might (UPDATE4)

Posted on November 9, 2015 by Dissent

Extortionists are busier than ever. This past week saw more reports on ransomware that corrupts files even if you pay the ransom, and DDoS attacks so powerful that usual defenses may be inadequate.

Brian Krebs reports:

One of the more common and destructive computer crimes to emerge over the past few years involves ransomware — malicious code that quietly scrambles all of the infected user’s documents and files with very strong encryption.  A ransom, to be paid in Bitcon, is demanded in exchange for a key to unlock the files. Well, now it appears fraudsters are developing ransomware that does the same but for Web sites — essentially holding the site’s files, pages and images for ransom.

Read more on KrebsOnSecurity.com, where Brian also includes some info on backing up your system. One of the things he reports – and I’ve seen this elsewhere as well – is that there’s something about the new ransomware that even when you are eventually able to decrypt your files (assuming you pay the ransom), some of the files seem to be corrupted by the ransomware’s decryption. TheHackerNews also has more on the Linux ransomware Brian discusses.

Besides the ransomware threat this week, I am also seeing more about companies paying extortion demands to avoid massive DDoS attacks that are taking down web sites. A few days after ProtonMail announced that it had paid the extortion demands at the urging of its web host and other companies affected by the massive attack, a tweet from @CocaineSecurity suggested that Swedbank had  paid an extortion demand to stop a DDoS attack. In a tweet on November 7, @CocaineSecurity wrote:

Thanks for the bitcoins! @Swedbank Nobody will now touch your website.

— CocaineSecurity (@CocaineSecurity) November 7, 2015

“Thanks for the bitcoins! @Swedbank Nobody will now touch your website.”

As of the time of this posting, there’s been no statement from Swedbank either confirming or denying the claim that they paid the extortion demand.

Update: Swedbank just responded to my tweeted inquiry about this by replying that they have not paid any ransom demand and have reported the individual to the police:

@PogoWasRight We haven’t paid anyone. We have reported the person behind this to the police. — Swedbank Sverige (@Swedbank) November 9, 2015

@CocaineSecurity quickly responded with its own tweet:

@PogoWasRight @Swedbank Wanna go down again? We do bite — CocaineSecurity (@CocaineSecurity) November 9, 2015

“@PogoWasRight @Swedbank Wanna go down again? We do bite”

Update2: Not all are DDoS attacks, it seems.

Update3: Paying ransom didn’t work. See ProtonMail DDoS wipeout: Day 6. Yes, we’re still under attack

Update4: Hushmail is also under DDoS attack. Runbox was hit over the weekend, but reports they are now functioning normally. VFEMail was also attacked.

Category: Commentaries and Analyses

Post navigation

← IE: 317 civil servants hit by payroll system data breach due to brain fade at PeoplePoint
We’ve Never Seen a Stolen Credit Card Market as Slick as This →

5 thoughts on “If the ransomware doesn’t get you, the DDoS might (UPDATE4)”

  1. Anonymous says:
    November 9, 2015 at 9:43 am

    I get the feeling that there will be more than this one update, laff. 😉

    Is this the same group responsible for all the email hosts/providers going up and down like yo-yo’s?

    1. Dissent says:
      November 9, 2015 at 9:57 am

      I share your guess that there will be more updates. Not sure whether it’s the same group that hit ProtonMail. Can’t believe everything I read. 🙂

      1. Anonymous says:
        November 9, 2015 at 12:22 pm

        a provider called Zoho is also hit. Never heard of them before, but they claim to have 15M users. See, https://twitter.com/zoho

        Makes me wonder if there is one main provider that resells their services (re-branded reselling) and if all these providers are interrelated?

        Zoho states they are “facing a criminal cyber-attack”.
        https://blogs.zoho.com/service-updates

        They all seem to have started around the same time, which leads me to question if they are rebranded from one main company type thing…

        1. Dissent says:
          November 9, 2015 at 1:07 pm

          Thanks for sharing the info. Since some of those being hits are Swedish sites/businesses uninvolved in email, it seems likely that there really are two different groups of attackers.

          1. Anonymous says:
            November 9, 2015 at 1:32 pm

            Likely. So just coincidence then.
            Secure email providers are having a bad week.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.