Bitcoin Is Increasing Ransom Attacks

There are a few good reasons to use Bitcoin: It’s global, private and won’t bulk up your wallet. But there’s another more sinister perk.

The currency will not be traceable when you collect it as ransom for a computer taken hostage from a community college in Southern California.

A gang of hackers recently held Los Angeles Valley College’s data at bay and received $28,000 in Bitcoin ransom in exchange for setting it free.

Luckily, the school is reported to hane an insurance policy for such unexpected eventualities.

“It was the assessment of our outside cyber-security experts that making a payment would offer an extremely high probability of restoring access to the affected systems, while failure to pay would virtually guarantee that data would be lost,” Chancellor Francisco C. Rodriguez revealed in a statement.

 “After payment was made, a ‘key’ was delivered to open access to our computer systems. The process to ‘unlock’ hundreds of thousands of files will be a lengthy one, but so far, the key has worked in every attempt that has been made.”

According to Phil Lieberman, a cybersecurity expert quoted in the LA Times, “The attacks generally come out of Eastern Europe and cannot be stopped because the United States does not have pacts with the countries where the attacks are launched. The governments of countries that launch [these] are uncooperative, and, in fact, benefit from the criminal activity going on within their borders.”

Although it surely provides small consolation, the college is not alone in enduring a high-tech shakedown. According to the Wall Street Journal, these virtual kidnappings have become so prevalent that companies are being advised to have people on staff who actually know how to acquire Bitcoin, it is apparently the currency of choice among those who prefer kidnapping data from cyber-space over kidnapping people off of city streets.

On the upside, firms that pay up can keep invasions discreet and data private.

“From what we are seeing,” security industry expert Katherine Keefe told the Journal, “it appears that many hackers are finding it easier to make money by holding companies to ransom for Bitcoin than through selling personal data on the Dark Web,” referring to untraceable Web sites hidden from most users.

So, vulnerable CEOs, keep your insurance paid up and your Bitcoin surplus deep.

NYPost

Hack Headlines Cause Financial Damage:

 

« Queen opens Centre to protect against Attacks
Facebook Algorithms Will Identify Terrorists »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TrustedIA

TrustedIA

TrustedIA - safeguarding your business, it's critical assets, information, reputation and brand.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

INSUREtrust

INSUREtrust

INSUREtrust is focused on insuring emerging risks related to Cyber Liability, Technology Errors & Omissions issues, and Miscellaneous Professional Liability (MPLI).

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Templar Shield

Templar Shield

Templar Shield is a premier information security, risk and compliance technology professional services firm serving North America.

Citadel Cyber Security

Citadel Cyber Security

Citadel is a leading 'One Stop Shop' provider of consulting services in cyber and information security. Our experts operate in hundreds of business organizations in Israel and around the world.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.