Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Uncork Capital in a 21-year venture cycle – and what's the difference between this?

August 26, 2025

Libby's library app adds AI discovery, but not everyone is excited

August 26, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Libby's library app adds AI discovery, but not everyone is excited

    August 26, 2025

    Google Translate accepts Duolingo with a new language learning tool

    August 26, 2025

    YouTube's “hype” feature that boosts small creators launches globally

    August 26, 2025

    Skylight's Tiktok Alternative adds community curators to the mix

    August 26, 2025

    Google Gemini AI Image Model Gets “Banana” Upgrade

    August 26, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025

    Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

    August 26, 2025

    Thetruthspy phone spyware new security flaw puts victims at risk

    August 25, 2025

    Developers get prison time to disrupt the ex-employer's network with “kill switch”

    August 22, 2025

    Explain why hackers who exposed the North Korean government did that

    August 21, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Uncork Capital in a 21-year venture cycle – and what's the difference between this?

    August 26, 2025

    A16z spends $1.49 million on lobbying in Washington, with rivals mostly going outside

    August 25, 2025

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025

    Amazon AGI Labs Chief defends his reverse Acquihire

    August 23, 2025

    Y Combinator says Apple's App Store is hampering startup growth

    August 22, 2025
TechBrunchTechBrunch

Ransomware gang's new extortion scheme? Call reception

TechBrunchBy TechBrunchApril 9, 20243 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


When hackers called the company they claimed their organization had breached, they felt the same frustration most of us feel when calling the front desk.

The phone call between a hacker claiming to be a representative of ransomware gang DragonForce and a victim company employee was posted on a dark website by the ransomware gang in an attempt to pressure the company to pay the ransom demand. In reality, this call recording merely shows a rather hilarious and failed attempt to blackmail and intimidate rank-and-file employees of a company.

The recording also shows that ransomware gangs are always looking for different ways to blackmail the companies they hack.

“It is becoming increasingly common for threat actors to contact us by phone, and this needs to be factored into an organization's response plan. To engage or not to engage? Who should engage? You don't want to make these decisions while you're listening,” said Brett Callow, Threat Analyst at Emsisoft.

During the call, the hacker asked to speak to “management.” Instead, two other employees put him on hold until Beth from Human Resources answered the phone.

“Hello Beth, how are you doing?” said the hacker.

After a minute of the two having trouble hearing each other, Beth tells the hacker that she doesn't know much about the data breach he claimed. When the hacker tries to explain what is going on, Beth interrupts him and asks, “Then why are you attacking us?”

“Is there a reason why you chose our company?'' Beth insists.

“No need to bother me, okay? I'm just trying to help you,” the hacker replied, growing increasingly irritated.

The hacker then explains to Beth that she has only eight hours to negotiate with the company she works for before the ransomware gang releases the company's stolen data.

“It will be released for public access and used by criminals to commit fraud and terrorism,” the hacker said.

“Oh, okay,” Beth said, clearly confused and not understanding where the data was going.

“So it's going to be broadcast on X?” Beth asks. “So, is that Dragonforce.com?”

The hacker then threatened Beth and said he would begin calling the company's customers, employees, and partners. The hacker added that he had already contacted the media and provided a recording of a previous call with one of her colleagues. It is also posted on the gang's dark website.

“So that includes talking to Patricia? Because that's illegal in Ohio,” Beth says.

“Excuse me?” the hacker responds.

“You can't do that in Ohio. Did you record Patricia?” Beth continues.

“Ma'am, I'm a hacker. I don't care about the law,” the hacker replied, even more irritated.

The hacker then tries once again to convince Beth to negotiate, but to no avail.

“I would never negotiate with terrorists or hackers like you call yourself,” Beth replied, asking to see the hacker's phone number to call back.

When the hacker says, “I don't have your phone number,” Beth has had enough.

“Okay, then let's end this call,” she said. “I think we've put enough time and energy into this.”

“Well, good luck,” Beth says.

“Thank you and take care,” says the hacker.

The companies that were allegedly hacked in the incident, which TechCrunch is not naming to avoid contributing to the hackers' extortion efforts, did not respond to requests for comment.

Read more on TechCrunch:



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Thetruthspy phone spyware new security flaw puts victims at risk

August 25, 2025

Developers get prison time to disrupt the ex-employer's network with “kill switch”

August 22, 2025

Explain why hackers who exposed the North Korean government did that

August 21, 2025

Device searches at US borders hit record-breaking records, new data show

August 20, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Uncork Capital in a 21-year venture cycle – and what's the difference between this?

August 26, 2025

Libby's library app adds AI discovery, but not everyone is excited

August 26, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.