/?pid=22540

Updated:04:41 AM EST Feb 21


this is ggmania.com subsite Apple's ransomware mess is the future of online extortion - TechAmok

Apple's ransomware mess is the future of online extortion - [security]
01:37 PM EDT - Apr,26 2021 - post a comment

On the day Apple was set to announce a slew of new products at its Spring Loaded event, a leak appeared from an unexpected quarter. The notorious ransomware gang REvil said they had stolen data and schematics from Apple supplier Quanta Computer about unreleased products and that they would sell the data to the highest bidder if they didn't get a $50 million payment. As proof, they released a cache of documents about upcoming, unreleased MacBook Pros. They've since added iMac schematics to the pile. The connection to Apple and dramatic timing generated buzz about the attack. But it also reflects the confluence of a number of disturbing trends in ransomware. After years of refining their mass data encryption techniques to lock victims out of their own systems, criminal gangs are increasingly focusing on data theft and extortion as the centerpiece of their attacks-and making eye-popping demands in the process. In the case of Quanta, attackers likely feel they hit a nerve, because Apple is notoriously secretive about intellectual property and new products in its pipeline. By hitting a vendor downstream in the supply chain, attackers give themselves more options about the companies they can extort. Quanta, for example, also supplies Dell, HP, and other large tech companies, so any breach of Quanta's customer data would be potentially valuable for attackers. Attackers also may find softer targets when they look to third-party suppliers who may not have as many resources to funnel into cybersecurity.

The $50 million demand may seem extraordinary, but it also fits in with the recent ransomware trend of "big game" hunting. REvil reportedly put the same sum to Acer in March, and the average ransomware demand reportedly doubled between 2019 and 2020. Large companies have become a more popular target specifically, because they can potentially afford big payouts; it's a more efficient racket for a criminal group than cobbling smaller payments together from more victims. And attackers have already been experimenting with strategies to put pressure on extortion victims, like contacting individuals or businesses whose data might be impacted by a breach and telling them to encourage a target to pay. Just this week, one ransomware group threatened to feed information to short sellers of publicly traded companies. A company like Apple would presumably take the threat of leaking intellectual property seriously. But other organizations, especially those that hold regulated personal data from customers, have even more incentive to pay if they think it will help cover up an incident. A seven-figure ransom might seem appealing if disclosing a breach might result in $2 million of regulatory fines under laws like Europe's GDPR or California's Consumer Privacy Act.


Add your comment (free registrationrequired)

Short overview of recent news articles

Feb,21 2026 Everyone is Buying the Wrong Dash Cam! (2026)
Feb,20 2026 Big Brother on Discord: Leaked Code Shows Age Verification Runs You
Feb,19 2026 OpenClaw’s Top Skill is a Malware that Stole SSH Keys and Opened
Feb,19 2026 Google Adds Satellite SOS to its Affordable Pixel Phone
Feb,19 2026 Phison CEO Warns: AI-Driven NAND and DRAM Shortage Could Bankrupt
Feb,19 2026 NVIDIA CEO hypes up GTC 2026, promises to unveil a chip that will
Feb,19 2026 Microsoft is uploading your confidential emails to Copilot for
Feb,18 2026 Anthropic Releases Claude Sonnet 4.6 with Improved Coding, Computer
Feb,17 2026 Apple Eyeing A Partnership With Chinese Memory Makers YMTC And CXMT
Feb,17 2026 This $60,000 TV was IRRESISTIBLE
Feb,17 2026 Keenadu Android Backdoor Infects Firmware, Spreads via Google Play
Feb,17 2026 Discord's ID Check Nightmare Sparks Massive Exodus to TeamSpeak
Feb,17 2026 Amazing Robot Performance at the 2026 Spring Festival Gala
Feb,16 2026 Apple brings video podcasts and other improvements in iOS 26.4 beta
Feb,16 2026 Dutch Defence Secretary Boldly Claims F-35 Software Could Be
Feb,16 2026 Samsung shows off Galaxy S26 Ultra privacy display
Feb,16 2026 60 Million Passwords Exposed? ETH Zurich Shatters 'Unbreakable'
Feb,15 2026 Apple MacBook with iPhone chip launches next month
Feb,15 2026 Discord's Disturbing Ties to Global Surveillance | ID Verification,
Feb,15 2026 20 Mind-Blowing Tech Gadgets You MUST See in 2026!
Feb,15 2026 Western Digital's HDD production capacity for 2026 is fully sold
Feb,14 2026 Google Releases First Beta Version of Android 17
Feb,14 2026 The Audiophile Gaming Headset - HIFIMAN x ROG Kithara
Feb,14 2026 7zip Malware: Beware 7zip.com
Feb,14 2026 REDMAGIC 11 Pro Review: Can This Be Your ONLY Phone?
Feb,13 2026 Google Docs now has AI-generated audio summaries
Feb,13 2026 Apple Patches Actively Exploited Zero-Day Vulnerability Across
Feb,13 2026 What is the Windows.old folder and can I delete it?
Feb,12 2026 Microsoft AI CEO Mustafa Suleyman: 'Most White Collar Work Will Be
Feb,12 2026 Helldivers Movie Lands November 2027 Release, Jason Momoa to Star
Feb,12 2026 Apple 0-Day Vulnerability Actively Exploited in Sophisticated Attack
Feb,11 2026 Apple releases iOS 26.3 and iPadOS 26.3 to the public
Feb,11 2026 T-Mobile Announces Live Audio Language Translation as a Network
Feb,10 2026 Windows 11 26H1 Drops Exclusively on New Snapdragon X2 Devices - No
Feb,10 2026 Fake 7-Zip downloads are turning home PCs into proxy nodes
Feb,10 2026 Microsoft Patch Tuesday February 2026 - 54 Vulnerabilities Fixed,
Feb,10 2026 Snapdragon X2 Elite Early - Performance Preview
Feb,10 2026 AI Chat App Exposes 300 Million Messages from 25 Million Users
Feb,09 2026 My Kids can Pick ANY Phone They Want For a Present
Feb,09 2026 Microsoft Removes Printer Drivers in Windows 11 Update - What You
>> News Archive <<

TechAmok - Privacy Policy        loading time:0.01secs