Tag: extortion
-
The ransomware economy is shifting toward straight-up data extortion
Google’s research report on ransomware activity last year underscores how cybercrime is evolving and clouding a collective understanding of its full impact and scale. First seen on cyberscoop.com Jump to article: cyberscoop.com/google-threat-intelligence-group-ransomware-report-2026/
-
Feds say another DigitalMint negotiator ran ransomware attacks and helped extort $75 million
Angelo Martino is accused of playing both sides, committing attacks and conducting ransomware negotiations on some of the same cases on behalf of his former employer. First seen on cyberscoop.com Jump to article: cyberscoop.com/digitalmint-ransomware-negotiator-arrest-angelo-martino-extortion/
-
Feds say another DigitalMint negotiator ran ransomware attacks and helped extort $75 million
Angelo Martino is accused of playing both sides, committing attacks and conducting ransomware negotiations on some of the same cases on behalf of his former employer. First seen on cyberscoop.com Jump to article: cyberscoop.com/digitalmint-ransomware-negotiator-arrest-angelo-martino-extortion/
-
Feds say another DigitalMint negotiator ran ransomware attacks and helped extort $75 million
Angelo Martino is accused of playing both sides, committing attacks and conducting ransomware negotiations on some of the same cases on behalf of his former employer. First seen on cyberscoop.com Jump to article: cyberscoop.com/digitalmint-ransomware-negotiator-arrest-angelo-martino-extortion/
-
Salesforce issues new security alert tied to third customer attack spree in six months
Researchers said the threat group behind the campaign is associated with ShinyHunters, an outfit that’s previously stolen data from Salesforce instances for extortion attempts. First seen on cyberscoop.com Jump to article: cyberscoop.com/salesforce-experience-cloud-customers-attacks/
-
Salesforce Sounds Alarm Over Fresh Data Extortion Campaign
CRM-Obsessed ShinyHunters Gang Exploits Misconfigured Customer Experience Portals. A prolific and noisy cybercrime gang with a penchant for stealing Salesforce customers’ data and holding it ransom is taking advantage of misconfigured guest accounts meant to provide public access to services meant to remain private, using a Google scanning tool to identify vulnerable accounts. First seen…
-
The people behind cyber extortion are often in their forties
Many cybercrime investigations end with arrests or indictments that reveal little about the people behind the operations. When authorities do disclose demographic details, the … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/10/cyber-extortion-cybercrime-age-profile/
-
ISMG Security Report: Data-Extortion Ransomware Loses Steam
Revenue From Data-Extortion-Only Attacks Appear to Have Plummeted to Virtually Nil. While ransomware continues to disrupt businesses, thankfully some shakedown strategies are losing steam. The latest ISMG Security Report reviews how criminals have continued to refine the ransomware business model and why once-successful strategies for maximizing illicit profits now fall short. First seen on govinfosecurity.com…
-
ShinyHunters claims ongoing Salesforce Aura data theft attacks
Salesforce is warning customers that hackers are targeting websites with misconfigured Experience Cloud platforms that give guest users access to more data than intended. However, the ShinyHunters extortion gang claims to be actively exploiting a new bug to steal data from instances. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/shinyhunters-claims-ongoing-salesforce-aura-data-theft-attacks/
-
Tarnung als Taktik: Warum Ransomware-Angriffe raffinierter werden
Tags: access, ai, ciso, control, cyber, cyberattack, detection, encryption, endpoint, extortion, framework, intelligence, lockbit, mitre, openai, ransomware, RedTeam, service, software, strategy, threat, tool, vulnerabilityStatt eines kurzen, aber sehr schmerzhaften Stiches setzen Cyberkrimelle zunehmend darauf, sich in ihren Opfern festzubeißen und beständig auszusaugen.Ransomware-Angreifer ändern zunehmend ihre Taktik und setzen vermehrt auf unauffällige Infiltration. Dies liegt daran, dass die Drohung mit der Veröffentlichung sensibler Unternehmensdaten zum Hauptdruckmittel bei Erpressungen geworden ist.Der jährliche Red-Teaming-Bericht von Picus Security zeigt, dass Angreifer zunehmen…
-
Teenage hacker myth primed for a middle-age criminal makeover
Tags: access, breach, business, corporate, crypto, cyber, cybercrime, cybersecurity, data, detection, extortion, finance, group, hacker, hacking, infrastructure, jobs, malware, network, penetration-testing, programming, ransomware, service, skills, software, technology, threat, vulnerabilityCybercrime cartels: Dray Agha, senior security operations manager at managed detection and response services firm Huntress, said the analysis illustrates that the “Hollywood image of a teenage lone wolf hacking for bragging rights” is vastly outdated since the threat landscape is dominated by “highly organised, profit-driven syndicates.””While young people may still engage in digital vandalism…
-
ShinyHunters Claims Woflow Breach: What It Means for SaaS Supply Chain Security
Learn the security risks in SaaS supply chains and about ShinyHunters’ evolving extortion tactics behind the alleged Woflow breach. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/shinyhunters-claims-woflow-breach-what-it-means-for-saas-supply-chain-security/
-
Phobos ransomware leader pleads guilty, faces up to 20 years in prison
The 43-year-old Russian national ran a ransomware operation that impacted more than 1,000 victims globally. The conspiracy netted more than $39 million in extortion payments. First seen on cyberscoop.com Jump to article: cyberscoop.com/phobos-ransomware-leader-guilty/
-
Von Ethical Hacker erpresst? – Ungeschützte Datenbank legt eine Milliarde Kundendaten offen
First seen on security-insider.de Jump to article: www.security-insider.de/datenleck-milliarden-sensible-daten-enthuellt-a-d866daf68c3c4d3fcb3df0e8e9bc7f61/
-
Von Ethical Hacker erpresst? – Ungeschützte Datenbank legt eine Milliarde Kundendaten offen
First seen on security-insider.de Jump to article: www.security-insider.de/datenleck-milliarden-sensible-daten-enthuellt-a-d866daf68c3c4d3fcb3df0e8e9bc7f61/
-
What to Expect from Iran’s Digital Counterstrike
Tags: attack, breach, cloud, communications, cyber, cyberattack, cybersecurity, data, defense, espionage, exploit, extortion, finance, government, group, hacking, infrastructure, intelligence, international, iran, leak, middle-east, military, network, ransomware, risk, risk-assessment, service, tool, update, vulnerability, wormAfter the United States and Israel began a bombing campaign on Iran, leading to the decapitation of its political and military leaders, the Middle East has erupted into waves of kinetic warfare. But what should we expect about cyber? Iran has a formidable offensive cybersecurity capability and is considered one of the four most aggressive…
-
Hacker mass-mails HungerRush extortion emails to restaurant patrons
Customers of restaurants using the HungerRush point-of-sale (POS) platform say they received emails from a threat actor attempting to extort the company, warning that restaurant and customer data could be exposed if HungerRush fails to respond. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hacker-mass-mails-hungerrush-extortion-emails-to-restaurant-patrons/
-
Alabama man pleads guilty to hacking, extorting hundreds of women
A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors). First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/alabama-man-pleads-guilty-to-hacking-extorting-hundreds-of-women/
-
2nd March Threat Intelligence Report
Wynn Resorts, a United States-based casino and hotel operator, has confirmed that employee data was accessed following an extortion threat linked to ShinyHunters. The company said operations were not disrupted. Reports indicate […] First seen on research.checkpoint.com Jump to article: research.checkpoint.com/2026/2nd-march-threat-intelligence-report/
-
Europol goes after The Com’s ransomware and extortion networks
Law enforcement agencies across 28 countries have spent the past year building cases against a loosely organized collective known as The Com, a decentralized network of mostly … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/02/27/europol-the-com-network-arrests/
-
‘Project Compass’ Cracks Down on ‘The Com’: 30 Members of Notorious Cybercrime Gang Arrested
International law enforcement operation led by Europol targets network of teenagers and young adults involved in ransomware attacks, extortion and other crimes First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/project-compass-com-arrests/
-
1 Million Records from Dutch Telco Odido Leaked Online in Massive Data Breach
The Dutch telecommunications company Odido suffered a massive data breach that exposed the personal information of nearly 700,000 customers. The incident, which included an extortion attempt, has raised serious concerns about customer privacy and data security in the telecom sector. Following the breach, attackers leaked the stolen information online in two separate dumps. Extent of…
-
Ransomware groups switch to stealthy attacks and long-term access
Tags: access, application-security, attack, ciso, control, crime, cyber, cybercrime, cybersecurity, data, detection, encryption, endpoint, exploit, extortion, group, identity, intelligence, monitoring, organized, ransomware, service, software, strategy, supply-chain, switch, theft, threat, tool, vulnerability38% drop in encryption over the past 12 months as more cybercriminals turn to silently exfiltrating data for extortion as their main stock in trade.Picus’ suggestion that the volume of ransomware attacks is dropping is disputed by other experts.Tony Anscombe, chief security evangelist at endpoint security vendor Eset, offered a contrasting perspective.”In the recent Eset…
-
Cryptohack Roundup: Step Finance Shuts Down After Exploit
Also: IoTex Bridge Exploit Linked to Private Key Breach. This week, Step Finance shuts down, IoTeX bridge exploit, Russia-linked exchanges help evade sanctions, Australian charged in $3.5 million scam, a hacker returned $21 million in seized bitcoin to South Korean prosecutors and Malaysia arrested 12 police officers in an extortion case. First seen on govinfosecurity.com…
-
Notorious ransomware gang allegedly blackmailed by fake FSB officer
There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has been accused of trying to extort money… from a notorious Russian ransomware gang. First seen on bitdefender.com Jump to article: www.bitdefender.com/en-us/blog/hotforsecurity/ransomware-gang-blackmailed-fake-fsb-officer

