![]() ![]() Some businesses targeted by the fakers had indeed suffered a ransomware attack of some kind previously. Targeting genuine victims by accident or design.They talk of accessing HR records, employee records, personal and medical data. In one "attack" 600GB of data was supposedly taken from business servers. The bigger the theft claim, the better.“Notifying you about your business’s security case, we accessed your information” is one example given. The target will confirm the group exists with a quick Google search, but won’t be able to do much more beyond that. If the scammers claim to be some sort of obscure (but known) affiliate or spin-off, so much the better. Claim to be a different, genuine ransomware group.The battle plan of a fake ransomware group ![]() They’re simply lying through their teeth and hoping that recipients of their messages don’t realise until it’s too late.Īs reported by Bleeping Computer, a group named Midnight has been using this tactic since at least March 16, and the organisations affected all seem to be located in the US. Why are they “fake it till you make it”? Because they don’t actually create ransomware or compromise networks in any way. Fake it till you make it ransomware groups are trying to get rich off the backs of genuine ransomware authors.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |