News & Analysis as of

Extortion Hackers

Kohrman Jackson & Krantz LLP

How a John Doe Lawsuit Can Help You Unmask the Source of Fake Reviews, Defamation, and Harassment

The internet holds some of the largest threats an individual or business can face in 2024. Online threats can become even more challenging to address when the attacker acts anonymously...more

Patterson Belknap Webb & Tyler LLP

Recent Ransomware Attacks Highlight the Evolving Challenges in Responding to Cyber Extortion

A spate of recent ransomware attacks illustrates the increasingly difficult calculations that businesses face following the theft or encryption of their data....more

BakerHostetler

DSIR Deeper Dive: 2023 Crypto Threat Landscape

BakerHostetler on

Following one of the most turbulent years in crypto history, 2023, in contrast, unfolded as a year of reprieve, including from crypto threats. According to a July 12, 2023, report from blockchain analytics firm Chainalysis,...more

Kohrman Jackson & Krantz LLP

Sextortion, Deepfakes, and AI Scams: How to Protect Children from Cyberattacks

Cyberattacks are a growing threat, with children being among the most vulnerable of targets. The internet serves as a platform for criminals to access children under the guise of anonymity...more

Kohrman Jackson & Krantz LLP

A New Twist in the Ransomware Debate: Is it Negligent to Fail to Pay Ransom?

Lehigh Valley Health Network (LVHN) is a healthcare network based in Allentown, Pennsylvania, and serves eastern and northeastern Pennsylvania. On Feb. 6th of this year, LVHN was hit with a combination ransomware and...more

Fenwick & West LLP

To Pay or Not to Pay: Five Critical Approaches to Beating a Ransomware Threat

Fenwick & West LLP on

It’s the call you hope you never get. Your company has been hit with a ransomware attack. Your systems are offline. Your customer data was stolen by an unknown threat actor who is threatening to leak it. You have lots of...more

Burr & Forman

U.S. and Europe Target Top Ransomware Cartel

Burr & Forman on

An international law-enforcement effort has led to the arrest of multiple individuals affiliated with the most prolific ransomware cartel operating today. In November, Justice Department officials announced indictments and an...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2021

Robinson & Cole LLP on

CYBERSECURITY - Extortion Doesn’t Work for EA Sports Hackers - According to The Record, Electronic Arts Sports (EA) was the victim of a cyber hacking in June, when hackers posted on an underground hacking forum that they...more

Robinson+Cole Data Privacy + Security Insider

Extortion Doesn’t Work for EA Sports Hackers

According to The Record, Electronic Arts Sports (EA) was the victim of a cyber hacking in June, when hackers posted on an underground hacking forum that they were in possession of EA data seeking a sale price of $28 million....more

Pillsbury - Policyholder Pulse blog

Insuring a King’s Ransom: The Role of Cyber Insurance in Ransomware Risk Management

Nearly 700 years ago, England captured King John II of France and held him for ransom for four million écus. But France could not afford to pay, and King John II ultimately traded his two sons as substitute hostages to try...more

McDermott Will & Emery

Uber Criminal Complaint Raises the Stakes for Breach Response

On August 20, 2020, a criminal complaint was filed charging Joseph Sullivan, Uber’s former chief security officer, with obstruction of justice and misprision of a felony in connection with an alleged attempted cover-up of a...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020 #3

Robinson & Cole LLP on

Natural Gas Compressor Facility Shut Down After Ransomware Attack - The Department of Homeland Security (DHS) announced this week that a ransomware attack shut down a natural gas compressor facility for two days. While in...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #227 – Sextortion Ransomware

Criminal minds are creative, and new ransomware strains show just how creative cyber-attackers can be. A new strain of ransomware, dubbed Ransomwared, requests a different kind of payment from the victim than the typical...more

Harris Beach PLLC

Can Hackers be Ethical, not Evil?

Harris Beach PLLC on

We are increasingly seeing situations in which a client’s information systems are breached by an ethical hacker. Typically, they take a screen shot or two of data to prove their accomplishment, carefully redact any...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2019

Robinson & Cole LLP on

Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more

Robinson+Cole Data Privacy + Security Insider

OCR Warns of Cyber Extortion and Provides Checklist

In its January newsletter, the Office for Civil Rights (OCR) focused on cyber extortion, which it stated has “risen steadily over the past couple of years and continue to be a major source of disruption for many...more

K&L Gates LLP

Winter is Coming: The HBO Hack, Ransomware Attacks, and Cyber Extortion Coverage

K&L Gates LLP on

Cyber extortion and ransomware attacks made headlines across the globe this summer, but the cyber attack at HBO stands out due to the size of the ransom demanded ($6 million). The HBO hack highlights the importance of one of...more

Robinson+Cole Data Privacy + Security Insider

Symantec releases “Ransomware and Businesses” report

Symantec Corp released its annual “Ransomware and Businesses” report this week outlining the increasing sophistication of ransomware attacks. Individuals continue to be the primary target of ransomware attacks as they usually...more

Robinson+Cole Data Privacy + Security Insider

FBI reports $3.1 billion lost by businesses through “business email compromise”

Wire fraud crime has long been a problem for financial institutions and banks. However, wire fraud through email is a completely different beast. Originally characterized by law enforcement as an extension of traditional wire...more

BCLP

Data Privacy Considerations for Starting or Evaluating a Bounty Program

BCLP on

Data security officers typically look for security risks by monitoring reports from automated security systems, listening to employees’ reports of security issues, and/or auditing IT systems. There is a great deal of debate,...more

Robinson+Cole Data Privacy + Security Insider

FBI’s cyber most wanted: Spotlight on Firas Dardar and Ahmed Agha

New additions to the FBI’s Cyber’s Most Wanted List show “the line between ordinary criminal hackers and potential national security threats is increasingly blurry,” according to Assistant Attorney General for National...more

Robinson+Cole Data Privacy + Security Insider

Cyber prosecutions update

The feds have been busy on the cyber prosecutions front. First, on March 18, 2016, the FBI announced that a multi-agency collaborative effort blew up an identity theft ring whose leader was an inmate in a Georgia prison. The...more

King & Spalding

Financial Institutions Council Publishes Statement On Hacker Extortion

King & Spalding on

Amid the recent increase in hacker extortion cases, the Federal Financial Institutions Examination Council (“FFIEC”) issued a statement on November 3 (the “Statement”) describing steps financial institutions should take to...more

Nossaman LLP

Purchasing Cyber Insurance? Important Considerations from the Recent Nossaman/ UCI Cyber Symposium

Nossaman LLP on

On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more

Gray Reed

Sony vs. N. Korea – Let Capitalism Fight Totalitarianism!

Gray Reed on

Cyber terrorism, North Korea, Sony, extortion, free speech, The Interview, international relations, journalistic ethics, cyber security… can it get any better than this?...more

25 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide