With few options, companies pay hush money to data thieves

Companies can face ruin if sensitive data is dumped on the Internet

There's a disturbing new angle to cyberattacks that has become more common over the last year, and it is proving costly for organizations: extortion.

Over the last year, companies have at times paid more than US$1 million in hush money to cyberattackers who have stolen their sensitive data and threatened to release it online, said Charles Carmakal, a vice president with Mandiant, the computer forensics unit of FireEye, in an interview on Wednesday.

"This is where a human adversary has deliberately targeted an organization, has stolen data, has reviewed that data and understands the value of it," Carmakal said. "We have seen seven-figure payouts by organizations that are afraid for that data to be published."

Mandiant outlined such attacks in a new report it issued on Thursday, saying in some cases, executives have been also taunted by hackers.

Extortion attacks are more sophisticated than so-called ransomware such as Cryptolocker, the malware that encrypts a computer's files and where payment is in bitcoin.

While ransomware attacks can be devastating in their bluntness, the payment demanded usually is a few hundred dollars, although some attacks have succeeded in extracting much more.

The extortion attacks, however, are far more meticulous and could be potentially more damaging, especially to a large company. Carmakal said some of the data, if publicly revealed, could potentially put a company out of business.

So "the reality is lots of people are paying," he said.

For Mandiant, which has investigated large data breaches at Target, Home Depot and Anthem, it can be tough to advise an organization about what course of action to take, Carmakal said.

The attackers often don't give much time to allow for a full forensics review to figure out if the hackers are bluffing. And there are fakers looking for an easy payout.

"What we need is proof that someone actually has access to data," Carmakal said. "We get them to send a sample, or we do as quick an investigation as we can."

If forensic artifacts reveal that someone has been sneaking around, next comes a very hard decision: even if a company pays, there's no guarantee that the attackers won't release the data anyway.

"There's absolutely a risk in not paying, and there's a risk in paying," Carmakal said. "Everybody's goal is that they pay the ransom, and the attackers go away and they delete data, but you will never get the confirmation that you want that the attackers have deleted the data."

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags data thievessecurity

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Father’s Day Gift Guide

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?