PandaBuy pays ransom to hacker only to get extorted again

umami_wasabi@lemmy.ml to Technology@lemmy.world – 229 points –
PandaBuy pays ransom to hacker only to get extorted again
bleepingcomputer.com

LOL

23

Never pay ransomware. Just write the data off. Learn how to take decent backups

It's bad business to not be honest and trustworthy. If a hacker group is known to always give back the data and not strike twice, they are obviously much more likely to get paid. No one's paying someone known for ripping off. We see this in company ransomwware all the time. They are friendly, helpful in explaining the breech, and professional. If they were the opposite, they'd be broke.

It's an interesting dynamic where the ransomware groups have to be reliable and professional for their business model to work.

It was the same with Pirates, if you get a bad Rep with your extortion business you're just making your own life harder down the line

The article says that they weren't paying to recover their only copy of data, but to prevent it from being leaked:

to prevent stolen data from being leaked

Backups (or more backups) wouldn't have helped.

Not ransomware but just ransom to data exfil by a vulnerable API. But paying is still a dumb idea.

5 more...

I mean news like this is the best way to stop people paying, I hope every business that doesn't pay sends the hackers this article and says this is why

9 more...

Are ransom attacks on the rise in recent months? Any sites that track these sort of things?

Anecdotally, the Seattle Public Library is currently recovering from a ransomware attack and still has major systems offline. Of all targets, a public library is a pretty major low.

Isn't the next step to take the same amount of money and offer it to any bounty hunter that brings back the heads of the hackers (with sufficient evidence to link the heads to the attack)?

Maybe I watch the wrong movies.

Wasn’t panda buy also recently targeted by a joint investigation from Nike and the Chinese government which led to the seizure of many warehouses for counterfeited items?

exposing customer names, phone numbers, email addresses, login IP addresses, home addresses, and order details.

So, nothing important? You know what else has names, phone numbers, home addresses, etc? Publicly available databases. It's called a phone book. IP addresses? Please. It's not static anyway and it might just lead to a VPN.

To prove your point, please dox yourself.

I'd be interested in your full name, address, your phone numbers, your email adresses, birth date and credit information (which is probably in the order details)

It's what they can do with all of it together. Particularly about calling you and pretending to be a real company, phishing you, because if they called your phone and confirmed your email, name, and home address and order details with you, then it's likely many people would believe them.