Bitcoin Is Increasing Ransom Attacks

There are a few good reasons to use Bitcoin: It’s global, private and won’t bulk up your wallet. But there’s another more sinister perk.

The currency will not be traceable when you collect it as ransom for a computer taken hostage from a community college in Southern California.

A gang of hackers recently held Los Angeles Valley College’s data at bay and received $28,000 in Bitcoin ransom in exchange for setting it free.

Luckily, the school is reported to hane an insurance policy for such unexpected eventualities.

“It was the assessment of our outside cyber-security experts that making a payment would offer an extremely high probability of restoring access to the affected systems, while failure to pay would virtually guarantee that data would be lost,” Chancellor Francisco C. Rodriguez revealed in a statement.

 “After payment was made, a ‘key’ was delivered to open access to our computer systems. The process to ‘unlock’ hundreds of thousands of files will be a lengthy one, but so far, the key has worked in every attempt that has been made.”

According to Phil Lieberman, a cybersecurity expert quoted in the LA Times, “The attacks generally come out of Eastern Europe and cannot be stopped because the United States does not have pacts with the countries where the attacks are launched. The governments of countries that launch [these] are uncooperative, and, in fact, benefit from the criminal activity going on within their borders.”

Although it surely provides small consolation, the college is not alone in enduring a high-tech shakedown. According to the Wall Street Journal, these virtual kidnappings have become so prevalent that companies are being advised to have people on staff who actually know how to acquire Bitcoin, it is apparently the currency of choice among those who prefer kidnapping data from cyber-space over kidnapping people off of city streets.

On the upside, firms that pay up can keep invasions discreet and data private.

“From what we are seeing,” security industry expert Katherine Keefe told the Journal, “it appears that many hackers are finding it easier to make money by holding companies to ransom for Bitcoin than through selling personal data on the Dark Web,” referring to untraceable Web sites hidden from most users.

So, vulnerable CEOs, keep your insurance paid up and your Bitcoin surplus deep.

NYPost

Hack Headlines Cause Financial Damage:

 

« Queen opens Centre to protect against Attacks
Facebook Algorithms Will Identify Terrorists »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

Metmox

Metmox

Metmox mission is to be trusted advisor and partner to protect our customer’s evolving Cloud, Network, Application, IT infrastructure and cybersecurity needs.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.