News & Analysis as of

Extortion Data Breach

Patterson Belknap Webb & Tyler LLP

Recent Ransomware Attacks Highlight the Evolving Challenges in Responding to Cyber Extortion

A spate of recent ransomware attacks illustrates the increasingly difficult calculations that businesses face following the theft or encryption of their data....more

Wyrick Robbins Yates & Ponton LLP

Empire State of Security: New York DFS Finalizes Significant Amendment to Financial Services Cybersecurity Regulation

The New York State Department of Financial Services (“NYDFS”), which regulates financial services institutions including banks, insurance companies, and mortgage brokers, finalized an amendment to its Cybersecurity Regulation...more

Kohrman Jackson & Krantz LLP

A New Twist in the Ransomware Debate: Is it Negligent to Fail to Pay Ransom?

Lehigh Valley Health Network (LVHN) is a healthcare network based in Allentown, Pennsylvania, and serves eastern and northeastern Pennsylvania. On Feb. 6th of this year, LVHN was hit with a combination ransomware and...more

Burr & Forman

U.S. and Europe Target Top Ransomware Cartel

Burr & Forman on

An international law-enforcement effort has led to the arrest of multiple individuals affiliated with the most prolific ransomware cartel operating today. In November, Justice Department officials announced indictments and an...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - August 2021

Robinson & Cole LLP on

CYBERSECURITY - Extortion Doesn’t Work for EA Sports Hackers - According to The Record, Electronic Arts Sports (EA) was the victim of a cyber hacking in June, when hackers posted on an underground hacking forum that they...more

Robinson+Cole Data Privacy + Security Insider

Extortion Doesn’t Work for EA Sports Hackers

According to The Record, Electronic Arts Sports (EA) was the victim of a cyber hacking in June, when hackers posted on an underground hacking forum that they were in possession of EA data seeking a sale price of $28 million....more

Foley & Lardner LLP

Practical Guidance In-House Counsel Should Follow & Share with IT Staff Handling Data Breaches

Foley & Lardner LLP on

On August 20, 2020, Uber’s former Chief Security Officer, Joe Sullivan, was charged by the U.S. Department of Justice (DOJ) with obstruction of justice and concealing a felony for allegedly trying to cover up a 2016...more

McDermott Will & Emery

Uber Criminal Complaint Raises the Stakes for Breach Response

On August 20, 2020, a criminal complaint was filed charging Joseph Sullivan, Uber’s former chief security officer, with obstruction of justice and misprision of a felony in connection with an alleged attempted cover-up of a...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - February 2020 #3

Robinson & Cole LLP on

Natural Gas Compressor Facility Shut Down After Ransomware Attack - The Department of Homeland Security (DHS) announced this week that a ransomware attack shut down a natural gas compressor facility for two days. While in...more

Mitchell, Williams, Selig, Gates & Woodyard,...

Fueling the Fire: How Extortion Has Changed the Face of Data Breaches

Ransomware attackers typically encrypt victims’ data and demand ransom in exchange for the decryption keys. Ransomware is not a new cybercriminal activity. In fact, ransomware attacks are over 30 years old. However, around...more

Harris Beach PLLC

Can Hackers be Ethical, not Evil?

Harris Beach PLLC on

We are increasingly seeing situations in which a client’s information systems are breached by an ethical hacker. Typically, they take a screen shot or two of data to prove their accomplishment, carefully redact any...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - June 2019

Robinson & Cole LLP on

Vicious malware continues to be deployed by China-based attackers. A new strain of malware, dubbed “HiddenWasp,” which has the ability to remotely infect computers, has been discovered by a security researcher at Intezar. The...more

Robinson+Cole Data Privacy + Security Insider

OCR Warns of Cyber Extortion and Provides Checklist

In its January newsletter, the Office for Civil Rights (OCR) focused on cyber extortion, which it stated has “risen steadily over the past couple of years and continue to be a major source of disruption for many...more

K&L Gates LLP

K&L Gates Triage: Cyber Insurance Issues for the Healthcare Industry

K&L Gates LLP on

This episode provides an overview of the major cyber security issues affecting the health care industry. Given that health care is one of the most frequently targeted industries by data hackers, this episode outlines the...more

BCLP

Data Breach Decision Points: Part 7

BCLP on

The best way for a company to handle a data breach is to be prepared. As we discuss in our data breach readiness handbook, preparation includes, among other things, drafting an incident response plan, reviewing...more

Bennett Jones LLP

Naughty Secrets – Findings in the Ashley Madison Breach

Bennett Jones LLP on

A quote attributed to FBI Director Robert Mueller is, “There are only two types of companies: those that have been hacked and those that will be”. The assessment of the Ashley Madison cyber-attack has lessons for all...more

Robinson+Cole Data Privacy + Security Insider

Symantec releases “Ransomware and Businesses” report

Symantec Corp released its annual “Ransomware and Businesses” report this week outlining the increasing sophistication of ransomware attacks. Individuals continue to be the primary target of ransomware attacks as they usually...more

Robinson+Cole Data Privacy + Security Insider

First home cyber protection insurance offered by Hartford Steam Boiler

The Hartford Steam Boiler Inspection and Insurance Company has announced that it is offering “the first personal lines cyber insurance program for consumers, protecting against computer attacks, cyber extortion, online fraud...more

BCLP

Your Organization is Impacted by Ransomware - Now What?

BCLP on

Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid....more

BCLP

How to Respond to a Cyber Extortion Demand

BCLP on

Cyber extortion refers to a situation in which a third party threatens that if an organization does not pay money, or take a certain action, the third party will take an adverse action against the organization. Among other...more

Butler Snow LLP

Ransomware: Electronic Extortion for a Digital Era

Butler Snow LLP on

Last month, the FBI asked the American Bar Association to share a cyberalert with its members warning of an increased risk of ransomware. Ransomware poses significant legal and operational risks to businesses. Personnel at...more

Nossaman LLP

Purchasing Cyber Insurance? Important Considerations from the Recent Nossaman/ UCI Cyber Symposium

Nossaman LLP on

On October 12, 2015, Nossaman and UC Irvine hosted a Cyber Symposium at the City Club in Los Angeles. The event included four panels of Nossaman lawyers, UCI professors, and private professionals who are experts in the areas...more

22 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide