Crime Ransomware gang threatens release of DC police records - Cough up, suckas

  • ⚙️ Performance issue identified and being addressed.
  • Want to keep track of this thread?
    Accounts can bookmark posts, watch threads for updates, and jump back to where you stopped reading.
    Create account
https://www.seattletimes.com/busine...-gang-threatens-release-of-dc-police-records/ (Archive)

RICHMOND, Va. (AP) — A Russian-speaking ransomware syndicate that stole data from the Washington, D.C., police department says negotiations over payment have broken down, with it rejecting a $100,000 payment, and it will release sensitive information that could put lives at risk if more money is not offered.

The extortion threat comes amid a separate ransomware attack on a major pipeline that’s affected part of the U.S.’s fuel supply, highlighting the power of internet-savvy criminal gangs to sow mayhem from a half a world away with impunity.

The Babuk group said on its website late Monday that it would release “all the data” it stole from the Washington police department if it did not “raise the price.”

“The negotiations reached a dead end, the amount we were offered does not suit us,” the group said.

The department did not immediately comment and has not said whether it’s negotiated any possible payment.

On Tuesday, the gang released screenshots that appear to be negotiations with the department. They show the gang asked for $4 million and received a counter-offer of $100,000. The authenticity of the screenshots could not be independently confirmed.

If true, it’s an example how complex the ransomware problem is when even police find themselves forced to consider making payments to criminal gangs.

Late last month, the group said it had hacked into the network of the city’s police department and threatened to leak the identities of confidential informants unless an unspecified ransom was paid. Experts said such a release could endanger the lives of the informants.

A day after the initial threat was posted, the gang tried to spur payment by leaking personal information of some police officers taken from background checks, including details of officers’ past drug use, finances and — in at least one incident — of past sexual abuse.

Babuk leaked similar background files on Monday with its threat to release more, said Brett Callow, a threat analyst and ransomware expert at the security firm Emsisoft.

“This is far worse than any hack of other police departments previously,” Callow said, adding that he’s never seen a law enforcement agency pay a ransom before.

Ransomware gangs have been leaking sensitive data from victims for well over a year, but experts said they’ve not seen such aggressive new tactics used before against police departments. The cybercriminal mafias mostly operate in foreign safe havens out of the reach of Western law enforcement.

The average ransom payments last year were $310,000, up 171% from 2019, according to Palo Alto Networks.

The Biden administration has said that curbing ransomware attacks are a top priority, saying they are a threat to national security.
____
That two high-profile ransomware attacks in a week. But remember, it's those damn dirty Deplorables who are the Greatest Threat to America™️!
 
...threatened to leak the identities of confidential informants...
Dew it.
These cyber attacks including and especially the recent pipeline attack all stem from the 2010 stuxnet attack proving how effective cyber attacks can be.
 
Dew it.
These cyber attacks including and especially the recent pipeline attack all stem from the 2010 stuxnet attack proving how effective cyber attacks can be.
It's like these boomers have never seen an ad for NordVPN.
 
I want more america held for ransom events.
Weakness is our strength after all.

Who am I kidding? This is going to trigger a feeding frenzy. Eve seen a lamb torn apart by a pack of wolves? This what starts it.
 
Last edited:
It's like these boomers have never seen an ad for NordVPN.
If that's in one of their ads that's good, but iirc no VPN would have helped them there. People should know how Pandora's box was opened with those orders, Countdown to zero day really goes in depth to how it all happened.
 
Why is all this stuff connected online. Maybe I don't know computers, but it seems like we managed to operate so well before, not having every goddamn thing connected online.

Is it that hard to airgap sensitive data?
 
Why is all this stuff connected online. Maybe I don't know computers, but it seems like we managed to operate so well before, not having every goddamn thing connected online.

Is it that hard to airgap sensitive data?
Yes, not because the task is hard, but because any cybersecurity person recommending critical things be air gapped gets lip from management about security being what they're paid to do, and no one wants to go through the hassle of travelling between precincts to fetch that data like it's the 1970's.
 
and no one wants to go through the hassle of travelling between precincts to fetch that data like it's the 1970's.

I'm just spitballing ideas but why not have your central database of sensitive info. Departments call it up/send email to the operator who then walks over to the airgapped computers gets the necessary info and send it back. I know it adds a extra layer of work and needing a operator but it sounds like the most secure way to handle it.

IT isn't my thing, so maybe I'm missing something big in the equation as to way this isn't feasible. Unless it just goes back to your first point, which is just a "of course management fucks it up again", not surprising.
 
It would be so simple to make literally impenetable custom barebones linux operating systems for every single different type of industry specifically for their needs, with GUI's in minimal scripting languages so that anyone with an above average IQ could make changes to the workflows. ( I would love this as a career)

That would be amazing and so so so efficient.
But we get microshit's inefficient globalhomo israeli spyware instead.
 
do_it_faggot.jpg

I love me some leaks and need more of them, especially if it's government related.
 
I'm just spitballing ideas but why not have your central database of sensitive info. Departments call it up/send email to the operator who then walks over to the airgapped computers gets the necessary info and send it back. I know it adds a extra layer of work and needing a operator but it sounds like the most secure way to handle it.
Technically the most secure way to do it would be to not have the operator, since the operator itself presents a fairly large vulnerability, and make people physically go and get their own data when they need it. That concept already exists, it's called a SCIF, and it's the standard used in the military/intelligence communites because the design, when done properly, works well.

As for why cops don't do something similar, or even your idea which is essentialy a SCIF + intermediary, it's a combination of cost issues/convenience and sheer fucking incompetence (remember most of the politicians and brass in charge are boomers who don't understand technology)
 
Last edited:
Why is all this stuff connected online. Maybe I don't know computers, but it seems like we managed to operate so well before, not having every goddamn thing connected online.

Is it that hard to airgap sensitive data?
I agree that not everything needs to be online, as anything online is a security risk, no matter how secure you are. Even the NSA has had major issues with that.
Good luck telling that to any form of leadership, though.

As for airgapping, that's too big a task for most people. First they'll bitch about having to do it, then they will start cutting corners to make it more convenient, eg using a usb back and forth between airgapped networks which would make it nearly null.
 
It's like these boomers have never seen an ad for NordVPN.
Except Ransomware has nothing to do with VPNs. A VPN is good for masking your IP address so that people think you're somewhere else. It's just ONE step in having good internet privacy/security, but not THE step.

The reason why Ransomware keeps happening is because of stupid-ass people that keep opening up emails that are CLEARLY suspicious with links going to who the fuck knows where. Look at Capcom. They had their shit opened up last year because of Ransomware, and they are a BIG company that has a big IT team (or at least one would think) that is supposed to train their employees on what NOT to do at the office regarding emails and the like.

If people want to prevent Ransomware, they have to fix stupid, and the only way to do that is getting rid of the people that clearly don't get it.
 
Except Ransomware has nothing to do with VPNs. A VPN is good for masking your IP address so that people think you're somewhere else. It's just ONE step in having good internet privacy/security, but not THE step.
Sorry, I know next to nothing about IT.
 
Back
Top Bottom