Hackers Will Publish President Trump's Secret Data

A ransomware hacking group calling itself REvil has threatened to release sensitive political documents of US President Donald Trump unless they get ransom money worth $42m.  

The ransomware operators gave a one-week deadline to meet the demand, and now this has been rejected by the law firm Grubman Shire. Among other personalities, the law firm also represents Lady Gaga, Bruce Springsteen, Madonna, Drake, the Weeknd, U2, Mariah Carey, and Nicki Minaj, as well as celebrities, Robert De Niro and LeBron James. 

“We can confirm that we’ve been victimised by a cyber-attack. We have notified our clients and our staff. We have hired the world’s experts who specialise in this area, and we are working around the clock to address these matters.”, said the law firm in a statement, although visitors to the firm's website for information will find it locked down

The ransomware group, which seized 756 GB of data from a law firm, claimed that they had data belonging to Trump after their money requests were rejected. 

The attackers have now posted an email image to show that these allegations were not bluffing. In a news report recently, REvil ransomware group first entered the database of a law firm where many names, from Robert DeNiro to Madonna, entered the database and requested the US President Donald Trump to sit on the target board after the company refused to make this payment. 

In such cases, it is customary for attackers to request money not to release or leak data. However, the victims may not accept paying every time and things get complicated at this point. Data from Trump started leaking REvil ransomware group stated that they hold 756 GB of data belonging to Grubman Shire Meiselas & Sacks and they want $ 21 million in return. 

The company refused to give this money, saying that there was no guarantee that the hackers would not leak data after receiving the money. Hackers said that after this rejection, they had data about Donald Trump and had doubled the amount.
According to the hackers, the data of Trump, which they have, may negatively affect Trump’s campaign in the election to be held in the USA. Attackers recently released an email to prove that they have Trump data. 

In addition to the e-mail they leaked, the hackers also posted a letter directly to the law firm. The hackers reapteated that they arenot bluffing in the letter they published to Grubman where theyare reported to say; “Data of the company’s customers will be sold to anyone in the form of an auction. This means that the person purchasing the data can share the information for free on the Internet”.

As long as the attackers hold the encryption key, the law firm will not be able to retrieve the data. These events once again showed the importance that companies should hire cyber security experts to protect their sensitive data. 

IBTimes:          Complex.com:         BeeBon:      SOMAG News:       MXDWN:  

You Migt Also Read:

AI Can Turn Hollywood Stars Into Pornographic Actors:

Nude Celebrity Photo Hacker Jailed:

 

 

« Microsoft & Intel Agree To Fight Malware
EU Parliament Suffers A Major Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Nohau

Nohau

Nohau provide services for safe and secure embedded software development.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Advens

Advens

Advens is a company specializing in information security management. We provide Consultancy, Security Audits and Technology Solutions.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

BluescreenIT (BIT)

BluescreenIT (BIT)

BluescreenIT is an IT Security Consultancy and IT and Cyber Security Training company supporting industry, local authorities, MoD and governmental IT departments.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.