DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Two more hacks with ransom demands, but is anyone paying? Part 2.

Posted on September 27, 2016 by Dissent

As noted in Part 1, hackers continue to issue ransom demands, but going to the media to put pressure on hacked entities does not seem to have improved their chances of convincing their victims to pay the ransom. In Part 1, I reported on what appears to be a hack of VI Pay, Inc., a payroll processing firm in Michigan. In this part, I report on the return of TheDarkOverlord, who claim to have hacked an investment firm.

On Sunday, after disappearing from public view for a while, TheDarkOverlord (TDO) posted a statement on Pastebin in which they claim that they have continued to pillage sites, but Saint Francis Hospital wasn’t one of them.

Readers may recall that I had suggested that the Saint Francis Hack was not by TDO but rather, by copycats just using their name.  TDO confirms my impression:

On another note, we noticed that thedarkoverlord had apparently breached yet another healthcare entity. After conducting an internal audit to determine if anyone had gone rogue, we learned that no one did. Thereafter, we quickly realised that we were looking at the work of individuals of whom are operating under our name without authorisation. Be advised that no true members or associates of the thedarkoverlord have been in contact with the public since the breach of St. Francis up until this publication.

Based on the writing of the statement and confirmation from someone known to be associated with them, these actors are, indeed, the real TheDarkOverlord. A copy of their statement was also emailed to this site, and the email service used to deliver it was the same email service the original TDO had used to contact me. So I’m convinced this TDO is the real one.

So now to the hack they revealed: WestPark Capital in California, an international investment banking and securities brokerage firm that was founded in 1995.

TDO provided a sample of documents as proof of claim, including an image of a retainer check and a number of confidential files, including several background checks on individuals by BackTrack, non-disclosure agreements, and other internal documents.

Non-Disclosure and Non-Circumvention Agreement. Redacted by DataBreaches.net
Non-Disclosure and Non-Circumvention Agreement. Redacted by DataBreaches.net

By their own statement on Sunday, TDO attempted to extort the firm and failed. They claim that the CEO, Richard Rappaport, “spat in our face after making our signature and quite frankly, handsome, business proposal.” They did not say how much their ransom demand was, nor what the deadline was. DataBreaches.net had requested clarification on that, but was only told, in encrypted chat:

Richard Rappaport, the CEO of WestPark Capital, was contacted by us and the issue of the breach of his company was brought into the line of communication we established. We made a handsome proposal to Mr. Rappaport that would involve us withholding this news. However, Mr. Rappaport chose to not cooperate with us in what could have been a very clean and quiet business opportunity for himself.

When asked how much data they had acquired, the spokesperson responded:

“We have acquired the entirety of WestPark Capital’s internal records and files. We have acquired every electronic document since the inception of the company. Most of these internal records and files are sensitive and labeled CONFIDENTIAL. We urge Mr. Rappaport to speak with us about this matter and seek for a mutually beneficial solution.”

They declined to reveal the attack method used.

As they have done in other incidents, TDO added a warning to their announcement on Sunday:

P.S. To the existing/future victims of thedarkoverlord who have/will have outstanding balances, pay up.

Well, that strategy didn’t work before for their publicly announced breaches, but I guess hope springs eternal.

DataBreaches.net sent inquiries to WestPark Capital, seeking a response to TDO’s claims, but received no response. Joseph Cox of Motherboard, who confirmed the authenticity of one of the files in the sample, also reports that he has been unable to get a response from the firm so far. This post will be updated if more information becomes available.

DataBreaches.net has no idea how to value files from an investment banking firm, but I would think these files would be much more valuable than identity information, which may sell for less than $1 per record.  Does anyone have a resource on calculating the commercial value of these files if they are put up for sale?

Category: Business SectorHackU.S.

Post navigation

← Two more hacks with ransom demands, but is anyone paying? Part 1.
Federal judge cuts Darkode computer hacker a break →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.