Hackers Will Publish President Trump's Secret Data

A ransomware hacking group calling itself REvil has threatened to release sensitive political documents of US President Donald Trump unless they get ransom money worth $42m.  

The ransomware operators gave a one-week deadline to meet the demand, and now this has been rejected by the law firm Grubman Shire. Among other personalities, the law firm also represents Lady Gaga, Bruce Springsteen, Madonna, Drake, the Weeknd, U2, Mariah Carey, and Nicki Minaj, as well as celebrities, Robert De Niro and LeBron James. 

“We can confirm that we’ve been victimised by a cyber-attack. We have notified our clients and our staff. We have hired the world’s experts who specialise in this area, and we are working around the clock to address these matters.”, said the law firm in a statement, although visitors to the firm's website for information will find it locked down

The ransomware group, which seized 756 GB of data from a law firm, claimed that they had data belonging to Trump after their money requests were rejected. 

The attackers have now posted an email image to show that these allegations were not bluffing. In a news report recently, REvil ransomware group first entered the database of a law firm where many names, from Robert DeNiro to Madonna, entered the database and requested the US President Donald Trump to sit on the target board after the company refused to make this payment. 

In such cases, it is customary for attackers to request money not to release or leak data. However, the victims may not accept paying every time and things get complicated at this point. Data from Trump started leaking REvil ransomware group stated that they hold 756 GB of data belonging to Grubman Shire Meiselas & Sacks and they want $ 21 million in return. 

The company refused to give this money, saying that there was no guarantee that the hackers would not leak data after receiving the money. Hackers said that after this rejection, they had data about Donald Trump and had doubled the amount.
According to the hackers, the data of Trump, which they have, may negatively affect Trump’s campaign in the election to be held in the USA. Attackers recently released an email to prove that they have Trump data. 

In addition to the e-mail they leaked, the hackers also posted a letter directly to the law firm. The hackers reapteated that they arenot bluffing in the letter they published to Grubman where theyare reported to say; “Data of the company’s customers will be sold to anyone in the form of an auction. This means that the person purchasing the data can share the information for free on the Internet”.

As long as the attackers hold the encryption key, the law firm will not be able to retrieve the data. These events once again showed the importance that companies should hire cyber security experts to protect their sensitive data. 

IBTimes:          Complex.com:         BeeBon:      SOMAG News:       MXDWN:  

You Migt Also Read:

AI Can Turn Hollywood Stars Into Pornographic Actors:

Nude Celebrity Photo Hacker Jailed:

 

 

« Microsoft & Intel Agree To Fight Malware
EU Parliament Suffers A Major Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

Naq Cyber

Naq Cyber

Naq is the number one platform for SMEs looking to become legally compliant and protect against cybercrime and other data-related incidents.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

MadWolf Technologies

MadWolf Technologies

MadWolf’s mission is to deliver enterprise-quality managed services and focused applications to organizations operating in the non-profit, association and international development sectors.

Future Crime Research Foundation (FCRF)

Future Crime Research Foundation (FCRF)

FCRF is a Non-Profit NGO specializing in Research in Cyber Security, Digital Crime, Fraud Risk Management, Cyber Laws and Cyber Forensics.