"The Dark Overlord" is a hacker who's made headline by advertising the availability of millions of health records on darknet sites, sending samples to news-outlets to validate their authenticity; in an interview with Motherboard's Joseph Cox, Dark Overlord reveals that the disclosures are timed to put the pressure on other victims to pay ransoms to guarantee that their stolen data won't leak.
Dark Overlord has published five data-sets so far: "48,000 records from a healthcare organisation in Farmington, Missouri; hundreds of thousands from Atlanta, Georgia, and the Central/Midwest US; 9 million apparent patient insurance details; and, on Tuesday, information on 34,000 supposed New York healthcare patients." According to Dark Overlord, these releases were calculated to build their reputation so that the other health entities that they've compromised will pay without hesitation.
But just listing the data might not be enough to secure a ransom payment, and that's where the media comes in, which is able to quickly, dramatically, and inadvertently squeeze the target organizations tighter.
“I have a reputation with this handle now. Another step accomplished,” the Dark Overlord added. “Every time I put a new listing up it gets reported without hesitation now.”
Hackers using the media to their own ends is not new. Anonymous has distributed attention-grabbing and ready-to-publish imagery or press releases that were easy for journalists to quickly report on. Impact Team, the hackers behind the Ashley Madison breach, sent a link of the data to at least one well-known security journalist.
But this latest campaign sticks out in its systematic and very deliberate approach. The Dark Overlord knows how to game the media, and reporters are playing along.
How a Hacker Is Gaming the Media to Extort His Victims
Wired has published another long excerpt from Sandworm, reporter Andy Greenberg's (previously) forthcoming book on the advanced Russian hacking team who took the US-Israeli Stuxnet program to the next level, attacking Ukrainian power infrastructure, literally blowing up key components of the country's power grid by attacking the embedded code in their microcontrollers.
For decades, it was a commonplace in western business that no one could afford to ignore China: whatever problems a CEO might have with China's human rights record could never outweigh the profits to be had by targeting the growing Chinese middle-class.
A little over a year ago, Bloomberg stunned the world with a report that claimed that Chinese intelligence services had figured out how to put undetectable, rice-grain-sized hardware implants into servers headed for the biggest US cloud and enterprise IT firms, and that when some of the victims discovered this fact, they quietly ripped out […]
People tend to keep luggage around for a long time. And why not? New suitcases are pricey, and no matter how banged up or patched up that old bag gets, it still holds your clothes. Right? Maybe not. Here are 15 travel bags and accessories that make a strong case for upgrading your gear. They’ve […]
Do you own a Mac? Unless you’re using it for a paperweight, you almost can’t afford not to get the Magnificent Mac Bundle. It’s a roundup of some truly essential security and file management apps, bundled up with great photo and video enhancers. The best part is that all nine apps are potentially available for […]
As much as vaping has taken over the market during the last decade, there’s still a lot of questions about the technology, as well as health concerns that we’re just now finding out about. One thing you can say about smoking: You know exactly what you’re getting, especially when it comes to pipes that you […]