In a recent turn of events following the recent data breach at Sony, the infamous ransomware group Ransomed.vc has set its sights on Japan’s largest telecommunications company, NTT Docomo.
Resecurity, a cybersecurity firm, recently released an advisory stating that Ransomed.vc is demanding a ransom of over $1 million from NTT Docomo. This comes after Sony refused to pay a similar ransom, which allegedly led to the leak of their stolen data.
The HUNTER team at Resecurity made contact with the operators of Ransomed.vc through TOX (TOR IM) regarding the Sony breach and NTT Docomo. The group claims to have 240 GB of data stolen from Sony, which they are offering to sell for as low as $10,000 in Bitcoin. Their main objective seems to be to publicly shame their victims rather than solely seeking financial gain. This tactic, known as “pressure support,” is intended to coerce the victim into paying the ransom.
Ransomed.vc originally emerged from an underground forum and was first identified by Malwarebytes in August 2023. The group quickly transitioned into a ransomware operation, focusing on profiting from stolen data. They have since employed unique strategies, including leveraging GDPR laws and data protection regulations to extort companies in the European Union by threatening fines if the ransom is not paid.
Additionally, Ransomed.vc operates an affiliate program to monetize compromised access to corporate networks. Interestingly, they discourage attacks on Russian or Ukrainian infrastructure. It is anticipated that the group will target businesses across various industries, such as fintech, telecommunications, oil & gas, and media, using stolen data to extort payments.
Resecurity has committed to monitoring Ransomed.vc’s activities by actively surveilling the dark web and gathering actionable cyber threat intelligence to combat their operations.
As the cybersecurity landscape continues to evolve, it is crucial for companies to prioritize data protection measures and remain vigilant against ransomware attacks. Stay tuned for more updates on this developing story.
Image credit: Piotr Swat / Shutterstock.com