Hackers Will Publish President Trump's Secret Data

A aansomware hacking group calling itself REvil has threatened to release sensitive political documents of US President Donald Trump unless they get ransom money worth $42m.  

The ransomware operators gave a one-week deadline to meet the demand, and now this has been rejected by the law firm Grubman Shire. Among other personalities, the law firm also represents Lady Gaga, Bruce Springsteen, Madonna, Drake, the Weeknd, U2, Mariah Carey, and Nicki Minaj, as well as celebrities, Robert De Niro and LeBron James. 

“We can confirm that we’ve been victimised by a cyber-attack. We have notified our clients and our staff. We have hired the world’s experts who specialise in this area, and we are working around the clock to address these matters.”, said the law firm in a statement, although visitors to the firm's website for information will find it locked down

The ransomware group, which seized 756 GB of data from a law firm, claimed that they had data belonging to Trump after their money requests were rejected. 

The attackers have now posted an email image to show that these allegations were not bluffing. In a news report recently, REvil ransomware group first entered the database of a law firm where many names, from Robert DeNiro to Madonna, entered the database and requested the US President Donald Trump to sit on the target board after the company refused to make this payment. 

In such cases, it is customary for attackers to request money not to release or leak data. However, the victims may not accept paying every time and things get complicated at this point. Data from Trump started leaking REvil ransomware group stated that they hold 756 GB of data belonging to Grubman Shire Meiselas & Sacks and they want $ 21 million in return. 

The company refused to give this money, saying that there was no guarantee that the hackers would not leak data after receiving the money. Hackers said that after this rejection, they had data about Donald Trump and had doubled the amount.
According to the hackers, the data of Trump, which they have, may negatively affect Trump’s campaign in the election to be held in the USA. Attackers recently released an email to prove that they have Trump data. 

In addition to the e-mail they leaked, the hackers also posted a letter directly to the law firm. The hackers reapteated that they arenot bluffing in the letter they published to Grubman where theyare reported to say; “Data of the company’s customers will be sold to anyone in the form of an auction. This means that the person purchasing the data can share the information for free on the Internet”.

As long as the attackers hold the encryption key, the law firm will not be able to retrieve the data. These events once again showed the importance that companies should hire cyber security experts to protect their sensitive data. 

IBTimes:          Complex.com:         BeeBon:      SOMAG News:       MXDWN:  

You Migt Also Read:

AI Can Turn Hollywood Stars Into Pornographic Actors:

Nude Celebrity Photo Hacker Jailed:

 

 

« Microsoft & Intel Agree To Fight Malware
EU Parliament Suffers A Major Attack »

Perimeter 81

Directory of Suppliers

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

Thursday, Jan 28, 2021 - Join this webinar to learn how to improve your Cloud Threat Intelligence (CTI) program by gathering critical cloud-specific event data in the AWS Cloud.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

Paladion

Paladion

Paladion is a provider of managed IT security services.

Northwave

Northwave

Northwave is 100% focused on providing integrated high quality information security services.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.