Hackers Will Publish President Trump's Secret Data

A ransomware hacking group calling itself REvil has threatened to release sensitive political documents of US President Donald Trump unless they get ransom money worth $42m.  

The ransomware operators gave a one-week deadline to meet the demand, and now this has been rejected by the law firm Grubman Shire. Among other personalities, the law firm also represents Lady Gaga, Bruce Springsteen, Madonna, Drake, the Weeknd, U2, Mariah Carey, and Nicki Minaj, as well as celebrities, Robert De Niro and LeBron James. 

“We can confirm that we’ve been victimised by a cyber-attack. We have notified our clients and our staff. We have hired the world’s experts who specialise in this area, and we are working around the clock to address these matters.”, said the law firm in a statement, although visitors to the firm's website for information will find it locked down

The ransomware group, which seized 756 GB of data from a law firm, claimed that they had data belonging to Trump after their money requests were rejected. 

The attackers have now posted an email image to show that these allegations were not bluffing. In a news report recently, REvil ransomware group first entered the database of a law firm where many names, from Robert DeNiro to Madonna, entered the database and requested the US President Donald Trump to sit on the target board after the company refused to make this payment. 

In such cases, it is customary for attackers to request money not to release or leak data. However, the victims may not accept paying every time and things get complicated at this point. Data from Trump started leaking REvil ransomware group stated that they hold 756 GB of data belonging to Grubman Shire Meiselas & Sacks and they want $ 21 million in return. 

The company refused to give this money, saying that there was no guarantee that the hackers would not leak data after receiving the money. Hackers said that after this rejection, they had data about Donald Trump and had doubled the amount.
According to the hackers, the data of Trump, which they have, may negatively affect Trump’s campaign in the election to be held in the USA. Attackers recently released an email to prove that they have Trump data. 

In addition to the e-mail they leaked, the hackers also posted a letter directly to the law firm. The hackers reapteated that they arenot bluffing in the letter they published to Grubman where theyare reported to say; “Data of the company’s customers will be sold to anyone in the form of an auction. This means that the person purchasing the data can share the information for free on the Internet”.

As long as the attackers hold the encryption key, the law firm will not be able to retrieve the data. These events once again showed the importance that companies should hire cyber security experts to protect their sensitive data. 

IBTimes:          Complex.com:         BeeBon:      SOMAG News:       MXDWN:  

You Migt Also Read:

AI Can Turn Hollywood Stars Into Pornographic Actors:

Nude Celebrity Photo Hacker Jailed:

 

 

« Microsoft & Intel Agree To Fight Malware
EU Parliament Suffers A Major Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

Defence Labs

Defence Labs

Defence Labs is a cybersecurity company specialising in cost effective penetration testing for small-to-medium sized enterprises.