Ransomed

Malware updated 5 months ago (2024-11-29T14:52:45.480Z)
Download STIX
Preview STIX
Ransomed is a malicious software, or malware, known for its unique approach to cyber extortion. In August 2017, it was reported that a ransomware variant identified as BitPaymer, associated with Ransomed, had targeted the U.K.'s National Health Service (NHS), demanding a high ransom of 53 BTC (approximately $200,000 USD). This attack not only disrupted operations but also potentially impacted patient care at adjacent hospitals. Ransomed's strategy seemingly involves setting ransom amounts lower than potential fines for data security violations, exploiting this discrepancy to increase the likelihood of payment. In recent years, the activity of ransomware groups like Ransomed has significantly increased. According to cybersecurity firm Rapid7, in the first half of 2024 alone, they observed 68 distinct ransomware groups actively posting ransomed datasets on their individual leak sites. The number of groups engaging in such activities saw a year-over-year increase of 117% in January 2024. One actor claimed to be working with Ransomed, further highlighting the group's active involvement in these breaches. Recently, Ransomed claimed to have compromised all of Sony's systems and started selling access to Sony's infrastructure after the company refused to pay the ransom. However, this claim has been challenged, with evidence suggesting that the actual amount of data stolen is significantly less than what Ransomed purports. Despite the hackers' assurances that they would not ransom the data, Ransomed's past actions suggest otherwise, as they are known to use threats of GDPR violation penalties to pressure companies into paying ransoms.
Description last updated: 2024-10-17T11:47:38.858Z
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Ransom
Extortion
Exploit
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.