Travelex Ransom Demand Is Doubled

Malicious hackers are holding Travelex to ransom and the original demand for payment  of $3m to re-start the copmanies online systems now been doubled to $6m. Two weeks after the enormous Travelex cyber hack banks that use Travelex for their foreign exchange services still cannot sell travel money. The affected banks  include Lloyds, Barclays, and RBS.

The hackers struck on New Year's Eve forcing the London-headquartered firm to take down all its global websites. Travelex has a presence in more than 70 countries, with more than 1,200 branches and 1,000 ATMs worldwide. In a statement, the foreign exchange firm said it is making "good progress" recovering its systems over 15 days after the firrst event.

The firm’s employees are using pen and paper since the hack, but should be able to switch on their computers again soon.
Travelex website, that was taken down immediately after the attack was launched two weeks ago, but is still offline and the firm has not said when it will be operational again.

Banks that depend on its foreign exchange services are still unable to sell travel money online or in store as a result of the attack.

"We continue to make good progress with our recovery and have already completed a considerable amount in the background," said Travelex boss Tony D'Souza. "We are now at the point where we are able to start restoring functionality in our partner and customer services, and will be giving our partners additional detail on what that will look like during the course of this week," adding that "There is no evidence to suggest that customer data has been compromised."

The hackers, thought to be a gang using Sodinokibi, malware also known as REvil, have told the BBC they gained access to the company's computer network six months ago and claim to have downloaded 5GB of sensitive customer data.In August last year threat analysts at leading cybersecurity form Cybereason dubbed Sodinokiba 'The Crown Prince of Ransomware. 

The hackers are understood to claim that they have dates of birth, credit card information and national insurance numbers of Travelex customers all in their possession. 

Travelex has started issuing refunds to customers, with its website still down two weeks after being hit by the cyberattack.
Now Travelex has said it is working closely with the Metropolitan Police, which is leading the investigation into the attack.
Travelex’s network of branches around the UK are still operational, and are providing foreign exchange services manually.

Portswigger:        BBC:         iNews:        Yorkshire Evening Post::

You Might Also Read:

Cyber Criminals Demand Ransom From Travelex:

 

 

« Ireland’s Cyber Strategy
Can A 5G Network Really Be Secure? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.