Tag Archive for: compromised

Compromised backups send ransomware recovery costs soaring


There’s a common misperception that to defeat ransomware attacks, organizations must simply back up their systems and data. Unfortunately, that’s not necessarily the case. Organizations must back up their systems and data, but they must also protect those backups as if their business survivability depended on it, because it likely does.

Consider a report from cybersecurity firm Sophos, published last month, revealing an alarming trend: Ransomware attackers increasingly target and compromise victims’ backups. And, in doing so, they are increasingly crippling the victim’s ability to recover maliciously encrypted files without having to pay the ransom demand.  

Based on a survey of nearly 3,000 organizations hit by ransomware in the past year, the study found that a staggering 94% of respondents reported attempts by cybercriminals to compromise their backups during the attack. In specific sectors such as state and local government as well as media and entertainment, this figure soared to 99%.

Attackers know that when potential victims can simply recover their systems and data from backups, the attacker loses their leverage. However, by successfully compromising backups, the script is flipped: Victims lose any leverage they may have. And this drives the costs of ransomware relatively high. Data from Sophos’s survey shows that organizations whose backups were compromised faced the following:

  • 63% higher rate of data encryption, 85% vs 52% if backups are not compromised.
  • More than double the median ransom demand at $2.3 million compared to $1 million if backups remain intact
  • 67% paid the ransom, compared to just 36% if backups were available
  • A median ransom payment of $2 million is nearly double the $1.062 million paid by those with secure backups

Backups are the start

There is good news here: Lots of organizations are backing up their data. That’s a great start in the successful recovery from a ransomware attack. The bad news is that not enough organizations are protecting these backups from attack. Sophos found that attackers have very high success rates in some industries. For instance, the success rate of energy utilities’ backup compromises reached 79%. However, in IT/technology…

Source…

Ransomware Compromised Personal Data, Texas County Appraiser Says


(TNS) — Hackers who have taken control of the Tarrant Appraisal District’s website say they have the Social Security numbers and driver’s license numbers of 300 people, the agency said.

“It has been determined that there was unauthorized access to our network, which has resulted in the potential exposure of a small amount of personal information,” a statement from TAD said.

The statement also said TAD will notify those affected “as soon as possible.”


The ransomware attack took place March 21 by the hacking group Medusa.

On March 25, the district’s legal council announced at an emergency meeting that the hackers were asking for $700,000. The district has not paid the ransom.

The district said it expects to send value notices this and that property owners will be able protest them online.

Medusa has previously used extortion and the threat of selling sensitive information on the dark web as a tactic to negotiate, according to the U.S. Cybersecurity & Infrastructure Security Agency.

The appraisal district’s chief appraiser, Joe Don Bobbitt told the Star-Telegram last week that a majority of the data the district keeps on file is “sales data” and property details such as square footage, tax deeds or the year a property was sold — almost all of it public information.

In the statement put out Wednesday, TAD offered information on how to freeze a credit card or report fraud.

Many function’s of the appraisal district’s website are still offline.

The district sets property appraisals and administers exemptions for tax purposes.

©2024 Fort Worth Star-Telegram, Distributed by Tribune Content Agency, LLC.

Source…

Thousands Of Roku Accounts Were Compromised By Hackers


Roku City used to be a safe and welcoming place filled with picturesque purple sunsets and nostalgia-fueled movie references. Now it’s just a glorified commercial. But this is how most cities evolve, so we shouldn’t be surprised. What is surprising is that the company is not very good at discouraging hackers from taking a quick vacation to Roku City, where they subsequently compromised nearly 15,000 accounts. Gotham sure looks like the preferred fictional city right about now.

The Hollywood Reporter revealed that 15,363 Roku accounts were compromised between December 28, 2023 and February 21, 2024. Filings in California and Maine indicate that hackers obtained login data from another source to try and purchase streaming subscriptions.

A company spokesperson told The Hollywood Reporter:

Roku’s security team recently detected suspicious activity that indicated a limited number of Roku accounts were accessed by unauthorized actors using login credentials obtained from third-party sources (e.g., through data breaches of third-party services that are not related to Roku). In response, we took immediate steps to secure these accounts and are notifying affected customers. Roku is committed to maintaining our customers’ privacy and security, and we take this incident very seriously.

Bleeping Computer also reported that the stolen accounts were being sold for as little as $0.50 per account.

While it sounds scary, the company assured customers that the hackers did not gain access to “social security numbers, full payment account numbers, dates of birth, or other similar sensitive personal information requiring notification.” It seems like they really just wanted to log in to Hulu and see what Shogun is all about.

(Via The Hollywood Reporter)

Source…