Linchakin

Cybercriminal Group SnapMC Takes a Page from Ransomware Gangs in Data Breach-Turned-Extortion Attacks

 October 20, 2021     No comments   

Ransomware Gangs in Data BreachNew analysis of attacks shows threat actors that traditionally focus on stealing data are now utilizing extortion as their monetization strategy, converging tactics with ransomware attacks.

We’ve all become “comfortable” with the norm that ransomware gangs extort to make money and data breach gangs steal and sell the data. But a new cybercriminal gang identified as SnapMC by security researchers at the NCC Group appears to be blurring the threat tactic lines and could be the poster child for what’s to come.

According to NCC Group, SnapMC (named for their very fast attack patterns) gain access to and steal data from networks in under 30 minutes. Once data has been exfiltrated, the story changes and begins to look like a ransomware attack. The victim organization is notified via email of the data theft and an extortion begins – the victim has 24 hours to respond and 72 hours to negotiate. A list of stolen data is included and if the timeframes are not met, the data may be published with media outlets informed.

While this gang uses vulnerable Internet-facing devices as their initial attack vector, I suspect we’re going to see an entirely new set of services helping those experienced at data breaches to pivot their attack into an extortion scam, and plenty more phishing attack players getting into the game to provide the initial access to the data breach folks.

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • 29th Aug - Types of Encoding TechniquesThe process of conversion of data from one form to another form is known as Encoding. It is used to transform the data so that data can be supported a… Read More
  • MEAT - This Toolkit Aims To Help Forensicators Perform Different Kinds Of Acquisitions On iOS Devices M.E.A.T. - Mobile Evidence Acquisition Toolkit Meet M.E.A.T! From Jack Farley - BlackStone Discovery This toolkit aims to help forensicators perform … Read More
  • 29th Aug - Overfitting in Machine LearningIn the real world, the dataset present will never be clean and perfect. It means each dataset contains impurities, noisy data, outliers, missing data,… Read More
  • SketchUp Pro 2021.1.1 Crack + Keygen [32/64 Bit] Download Download Crack SketchUp Pro 2021.1.1 Crack + License Key [Win+ Mac] SketchUp Pro 21.1.299 Crack is truly an advanced software in the field of 3D g… Read More
  • How to register Rosichi? 1. Access at website: rosichi.net. 2. Register an account quickly by going to the right corner on the homepage and clicking the “Register” butto… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates