skip to Main Content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    Cybercriminal Group SnapMC Takes a Page from Ransomware Gangs in Data Breach-Turned-Extortion Attacks

    Ransomware Gangs in Data Breach

    New analysis of attacks shows threat actors that traditionally focus on stealing data are now utilizing extortion as their monetization strategy, converging tactics with ransomware attacks.

    We’ve all become “comfortable” with the norm that ransomware gangs extort to make money and data breach gangs steal and sell the data. But a new cybercriminal gang identified as SnapMC by security researchers at the NCC Group appears to be blurring the threat tactic lines and could be the poster child for what’s to come.

    According to NCC Group, SnapMC (named for their very fast attack patterns) gain access to and steal data from networks in under 30 minutes. Once data has been exfiltrated, the story changes and begins to look like a ransomware attack. The victim organization is notified via email of the data theft and an extortion begins – the victim has 24 hours to respond and 72 hours to negotiate. A list of stolen data is included and if the timeframes are not met, the data may be published with media outlets informed.

    While this gang uses vulnerable Internet-facing devices as their initial attack vector, I suspect we’re going to see an entirely new set of services helping those experienced at data breaches to pivot their attack into an extortion scam, and plenty more phishing attack players getting into the game to provide the initial access to the data breach folks.


    Free Ransomware Simulator Tool

    Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    RansIm-Monitor3

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 21 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    close

    Sign Up to the TIO Intel Alerts!

    Back To Top