‘Robin Hood' Hackers Donate Stolen Money

A hacking group going by the name of Darkside has attempted to donate around $20,000 in stolen Bitcoin to charity the first known instance for cyber criminals. Despite having extorted millions of dollars from corporate victims, Darkside claim that they want to "make the world a better place".

In a message posted on the Dark Web, Darkside posted receipts for $10,000 in Bitcoin donations to two charities but Children International, says it won’t keep the money. 

The recipients of Darkside's generosity are Children International, which supports children, families and communities in South East Asia, Central America, Mexico and  the US. Also,The Water Project, which works to improve access to clean water in sub-Saharan Africa. Children International say they wont keep the money.

In the blog post on 13 October, the hackers claim they only target large profitable companies with their ransomware attacks and analysis of the crypto-currency market confirms they are actively extorting funds from victims. There is also evidence they may have links to high-profile attacks on companies including Travelex, driven into bankruptcy a crippling ransomware attack in January 2020.

The way the hackers paid the charities is also a possible cause for concern. Darkside used a US-based service called The Giving Block, which is used by 67 different non-profits from around the world including Save the Children, Rainforest Foundation. The Giving Block describes itself "the only non-profit specific solution for accepting crypto-currency donations". 

The Giving Block told the BBC it was not aware these donations were made by cyber-criminals, claiming that were still working to determine if these funds were actually stolen.  The company did not clarify if this means returning the stolen money to the criminals, or attempting to reimburse Darkside's victims.

It remains unclear whether that would mean returning the money to the hackers, or whether The Giving Block will give that money back to one of the victims of the Darkside hacker's ransomware attack.

ITPro:          Coindesk:        Forbes:        BornCity:     Web24

You Might Also Read:

A Charity Defrauded By Email:

 

« US Invests Big In Space Force Cyber Security
Webinar: How to enhance SOC efficiency for the AWS Cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Institute for Cyber Security Innovation - Royal Holloway

Institute for Cyber Security Innovation - Royal Holloway

The Institute for Cyber Security Innovation aims to bring together Academia, Industry and Government to be a catalyst for applied research and innovation in cyber security policy and solutions.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

National Cybersecurity Preparedness Consortium (NCPC)

National Cybersecurity Preparedness Consortium (NCPC)

The mission of the NCPC is to provide research-based, cybersecurity-related training, exercises and technical assistance to local jurisdictions, counties, states and the private sector.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

CI-ISAC Australia

CI-ISAC Australia

CI-ISAC has been designed to support and promote existing legislation and Government initiatives that are working to uplift cyber resilience across critical infrastructure sectors.

Centum Digital

Centum Digital

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence.