/?pid=22540

Updated:12:02 PM EDT Jun 21


this is ggmania.com subsite Apple's ransomware mess is the future of online extortion - TechAmok

Apple's ransomware mess is the future of online extortion - [security]
01:37 PM EDT - Apr,26 2021 - post a comment

On the day Apple was set to announce a slew of new products at its Spring Loaded event, a leak appeared from an unexpected quarter. The notorious ransomware gang REvil said they had stolen data and schematics from Apple supplier Quanta Computer about unreleased products and that they would sell the data to the highest bidder if they didn't get a $50 million payment. As proof, they released a cache of documents about upcoming, unreleased MacBook Pros. They've since added iMac schematics to the pile. The connection to Apple and dramatic timing generated buzz about the attack. But it also reflects the confluence of a number of disturbing trends in ransomware. After years of refining their mass data encryption techniques to lock victims out of their own systems, criminal gangs are increasingly focusing on data theft and extortion as the centerpiece of their attacks-and making eye-popping demands in the process. In the case of Quanta, attackers likely feel they hit a nerve, because Apple is notoriously secretive about intellectual property and new products in its pipeline. By hitting a vendor downstream in the supply chain, attackers give themselves more options about the companies they can extort. Quanta, for example, also supplies Dell, HP, and other large tech companies, so any breach of Quanta's customer data would be potentially valuable for attackers. Attackers also may find softer targets when they look to third-party suppliers who may not have as many resources to funnel into cybersecurity.

The $50 million demand may seem extraordinary, but it also fits in with the recent ransomware trend of "big game" hunting. REvil reportedly put the same sum to Acer in March, and the average ransomware demand reportedly doubled between 2019 and 2020. Large companies have become a more popular target specifically, because they can potentially afford big payouts; it's a more efficient racket for a criminal group than cobbling smaller payments together from more victims. And attackers have already been experimenting with strategies to put pressure on extortion victims, like contacting individuals or businesses whose data might be impacted by a breach and telling them to encourage a target to pay. Just this week, one ransomware group threatened to feed information to short sellers of publicly traded companies. A company like Apple would presumably take the threat of leaking intellectual property seriously. But other organizations, especially those that hold regulated personal data from customers, have even more incentive to pay if they think it will help cover up an incident. A seven-figure ransom might seem appealing if disclosing a breach might result in $2 million of regulatory fines under laws like Europe's GDPR or California's Consumer Privacy Act.


Add your comment (free registrationrequired)

Short overview of recent news articles

Jun,21 2025 Superman - Official 30 Second Spot (2025)
Jun,21 2025 'The fastest road car I've ever been in!' - Ferrari F80 track day
Jun,20 2025 CPU SCAM: AMD Ryzen 9800X3D Counterfeits & Fraud
Jun,19 2025 28 Years Later Review
Jun,18 2025 HW News - NVIDIA "N1x" CPU Leak, ASUS Xbox ROG Ally, More Intel
Jun,17 2025 NVIDIA GeForce 576.80 WHQL Driver
Jun,16 2025 The Fantastic Four: First Steps - Official 'H.E.R.B.I.E.' Teaser
Jun,15 2025 Huawei Maextro S800 First Look - A True BMW & Mercedes Killer?
Jun,14 2025 Upgrade Windows 10 to Windows 10 LTSC Without Losing Data
Jun,14 2025 Squid Game: Season 3 - Final Games Trailer
Jun,11 2025 WWDC 2025: Everything Revealed in 9 Minutes
Jun,10 2025 Microsoft June 2025 Patch Tuesday fixes exploited zero-day, 66 flaws
Jun,10 2025 This Malware BREAKS WINDOWS!
Jun,10 2025 Reset Forgotten Password without Any Software, without USB drive in
Jun,08 2025 Microsoft Will Block Unsupported Hardware For Windows 11
Jun,08 2025 Memory Wars! Apple vs Ryzen - Is Unified Memory Faster than Shared
Jun,06 2025 Predator: Killer of Killers - Exclusive Clip (2025)
Jun,06 2025 Enable Deep Effect on Samsung One Ui 7
Jun,05 2025 Google Kills Off PayPal in Google Wallet
Jun,05 2025 Samsung's Next Flagship Foldable Will be Ultra
Jun,05 2025 Over 40 Malicious Chrome Extensions Mimic Popular Brands to Steal
Jun,03 2025 The Witcher IV - Unreal Engine 5 tech demo
Jun,02 2025 Nintendo Switch 2 Welcome Tour trailer
Jun,01 2025 Stranger Things 5 | Date Announcement | Netflix
May,31 2025 RTX 5060 Review... No wonder NVIDIA tried to stop us from talking
May,30 2025 Samsung Galaxy Watch 8 Classic Is Here - 7 New Updates
May,30 2025 Biggest Windows 11 24H2 May Update in the Main Release
May,29 2025 How Much Money Should You Spend on a Gaming PC?
May,29 2025 laud Note vs Note Pin - Which AI Voice Recorder To Choose
May,29 2025 Samsung One UI 8.0 vs One UI 7.0 - 25+ Changes
May,28 2025 SECRET CODE UPDATE for Samsung Galaxy Phone to Boost Performance &
May,27 2025 WhatsApp is finally available on iPad
May,27 2025 Simple Trick To Lower CPU Temperatures
May,26 2025 Alma & The Wolf - Official Trailer (2025) Ethan Embry, Li Jun Li,
May,25 2025 Change These Browser Security Settings NOW
May,24 2025 I NEED AMD to Seize This Moment - RX 9060XT
May,23 2025 Windows 98 with a G41 Core 2 Duo System
May,23 2025 Disable These Windows Settings for Better FPS!
May,20 2025 I Got the Golden GPU from Dubai
May,19 2025 Windows 10 emergency update KB5061768 fixes BitLocker boot loops -
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs