Press "Enter" to skip to content

Security moves towards extortion ware — and two kinds

I also need to follow up on that Bluetooth enabled chastity device.  Remember that?  The one that had a flaw where you could be locked in… remotely?  By someone else?    Yeah, that one.

The source code for the ChastityLock ransomware is now publicly available for researchers.  

Meanwhile, a new trend in ransomware is emerging.    It seems the gangs are focused on top tier workstations, finding execs and managers to find “juicy” information.   Why?  Well, to force better ransom payments from the top brass.

Why do we care?

I can’t resist that ChastityLock story because of the absurdity of it.  Not everything needs to be online.    Open sourcing software isn’t a panacea, but researchers able to provide insights is a good thing.

Now, learning that attackers are getting more focused… that’s news.    It’s more evidence of the transition to extortionware.   Now, criminals are attacking targets selectively to find the best use of their time.

It’s smart.   It’s also intensely dangerous and harder to protect against.     As it becomes systemized too, you’re fighting against better and better adversaries… bringing a water gun to a tank battle.

Source: Bleeping Computer

Source: ZDNet