Hackers Will Publish President Trump's Secret Data

A ransomware hacking group calling itself REvil has threatened to release sensitive political documents of US President Donald Trump unless they get ransom money worth $42m.  

The ransomware operators gave a one-week deadline to meet the demand, and now this has been rejected by the law firm Grubman Shire. Among other personalities, the law firm also represents Lady Gaga, Bruce Springsteen, Madonna, Drake, the Weeknd, U2, Mariah Carey, and Nicki Minaj, as well as celebrities, Robert De Niro and LeBron James. 

“We can confirm that we’ve been victimised by a cyber-attack. We have notified our clients and our staff. We have hired the world’s experts who specialise in this area, and we are working around the clock to address these matters.”, said the law firm in a statement, although visitors to the firm's website for information will find it locked down

The ransomware group, which seized 756 GB of data from a law firm, claimed that they had data belonging to Trump after their money requests were rejected. 

The attackers have now posted an email image to show that these allegations were not bluffing. In a news report recently, REvil ransomware group first entered the database of a law firm where many names, from Robert DeNiro to Madonna, entered the database and requested the US President Donald Trump to sit on the target board after the company refused to make this payment. 

In such cases, it is customary for attackers to request money not to release or leak data. However, the victims may not accept paying every time and things get complicated at this point. Data from Trump started leaking REvil ransomware group stated that they hold 756 GB of data belonging to Grubman Shire Meiselas & Sacks and they want $ 21 million in return. 

The company refused to give this money, saying that there was no guarantee that the hackers would not leak data after receiving the money. Hackers said that after this rejection, they had data about Donald Trump and had doubled the amount.
According to the hackers, the data of Trump, which they have, may negatively affect Trump’s campaign in the election to be held in the USA. Attackers recently released an email to prove that they have Trump data. 

In addition to the e-mail they leaked, the hackers also posted a letter directly to the law firm. The hackers reapteated that they arenot bluffing in the letter they published to Grubman where theyare reported to say; “Data of the company’s customers will be sold to anyone in the form of an auction. This means that the person purchasing the data can share the information for free on the Internet”.

As long as the attackers hold the encryption key, the law firm will not be able to retrieve the data. These events once again showed the importance that companies should hire cyber security experts to protect their sensitive data. 

IBTimes:          Complex.com:         BeeBon:      SOMAG News:       MXDWN:  

You Migt Also Read:

AI Can Turn Hollywood Stars Into Pornographic Actors:

Nude Celebrity Photo Hacker Jailed:

 

 

« Microsoft & Intel Agree To Fight Malware
EU Parliament Suffers A Major Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

Auxilium Cyber Security

Auxilium Cyber Security

Auxilium Cyber Security is independent information security consultancy company.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service — basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

guardDog.ai

guardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Innefu Labs

Innefu Labs

Innefu is an Information Security R&D startup, providing cutting edge Information Security & Data Analytics solutions.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.