Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

August 28, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    Mississippi's Age Guarantee Act Tests Decentralized Social Networks

    August 28, 2025

    Threads test how to share long format text on the platform

    August 28, 2025

    New AI features in WhatsApp allow you to rearrange and adjust the tone of your message

    August 27, 2025

    Google and Grok are catching up to ChatGpt, says the latest AI report from A16Z

    August 27, 2025

    Google Vids adds AI avatars to the video editor and launches the consumer version

    August 27, 2025
  • Crypto

    Coinbase CEO explains why he fired an engineer who didn't try AI right away

    August 22, 2025

    Your next customer is destroying the 2025 Expo floor

    August 19, 2025

    Crypto Company Gemini File for Winklevoss Twins IPO

    August 16, 2025

    North Korean spies pretending to be remote workers have invaded hundreds of businesses, CloudStrike says

    August 4, 2025

    Telegram's Crypto Wallet will be released in the US

    July 22, 2025
  • Security

    According to Transunion, hackers say they stole the personal information of 4.4 million customers

    August 28, 2025

    The FBI says that China's salt typhoon has hacked at least 200 US companies

    August 27, 2025

    US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

    August 27, 2025

    Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

    August 26, 2025

    Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

    August 26, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

    August 28, 2025

    From streaming to healthcare to AI, Mark Cuba reveals his “formula of confusion”

    August 27, 2025

    Uncork Capital in a 21-year venture cycle – and what's the difference between this?

    August 26, 2025

    A16z spends $1.49 million on lobbying in Washington, with rivals mostly going outside

    August 25, 2025

    Openai warns against SPVs and other “unauthorized” investments

    August 23, 2025
TechBrunchTechBrunch

Security bug in ransomware leak site allows six companies to avoid paying hefty ransoms

TechBrunchBy TechBrunchAugust 8, 20243 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Six companies have avoided paying potentially costly ransoms thanks to new security flaws in web infrastructure used by a ransomware gang, security researchers say.

Two of the companies received decryption keys to decrypt their data without having to pay ransom to the cybercriminals, and the four hacked cryptocurrency companies were warned before the ransomware gang began encrypting files, marking a rare win for targeted victim organisations.

Vangelis Stikas, security researcher and chief technology officer at Atropos.ai, embarked on a research project to identify the command and control servers behind more than 100 ransomware and extortion groups and their data leak sites, with the goal of identifying flaws that could be used to uncover information about the gangs themselves, including their victims.

Speaking to TechCrunch on Thursday ahead of his talk at the Black Hat security conference in Las Vegas, Stikas told the outlet that he'd found several simple vulnerabilities in web dashboards used by at least three ransomware gangs that were enough to compromise the inner workings of the operations themselves.

Ransomware gangs typically hide their identities and activities on the dark web, an anonymous version of the web accessible through the Tor browser, making it difficult to pinpoint the location of the real-world servers they use for cyber attacks and to store stolen data.

But the leak sites that ransomware gangs use to publish stolen files and extort money from their victims contained coding errors and security bugs that allowed Stykus to peer inside and extract information about each operation without logging in. In some cases, the bugs also exposed the IP addresses of the leak site's servers, potentially making it possible to trace their actual location.

Among the bugs were the Everest ransomware gang's use of default passwords to access the backend SQL database, exposing file directories, and exposing API endpoints to expose the targeting of the BlackCat ransomware gang during ongoing attacks.

Stykas also said he used a bug called Insecure Direct Object Reference (IDOR) to crawl all of the chat messages of the Malox ransomware administrators, which contained two decryption keys, which Stykas shared with victim companies.

The researchers told TechCrunch that two of the victims were small or medium-sized businesses, while the remaining four were cryptocurrency-related companies, two of which are believed to be unicorns (startups valued at more than $1 billion), but declined to disclose the names of the companies.

He added that none of the companies he had reported to had made their security incidents public, and did not rule out the possibility of disclosing the names of the companies in the future.

The FBI and other government agencies have long urged ransomware victims not to pay hackers' ransoms to prevent them from profiting from cyberattacks, but that advice offers little relief for businesses that need to regain access to their data or are unable to operate.

Law enforcement agencies have had some success in infiltrating ransomware rings and obtaining banks of decryption keys, cutting off cybercriminals' illicit revenue streams, but results have been mixed.

Research has shown that ransomware gangs are susceptible to the same simple security issues as larger companies, potentially allowing law enforcement to target criminal hackers outside of their jurisdiction.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

According to Transunion, hackers say they stole the personal information of 4.4 million customers

August 28, 2025

The FBI says that China's salt typhoon has hacked at least 200 US companies

August 27, 2025

US sanctions fraud network used by North Korea's “remote IT workers” to steal money for work

August 27, 2025

Doge uploads live copies of Social Security databases to “vulnerable” cloud servers, whistleblower says

August 26, 2025

Security researchers map hundreds of Teslamate servers spilling Tesla vehicle data

August 26, 2025

Thetruthspy phone spyware new security flaw puts victims at risk

August 25, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

Mississippi's Age Guarantee Act Tests Decentralized Social Networks

August 28, 2025

Threads test how to share long format text on the platform

August 28, 2025

Do you hire AI, or are you a human being? Next frontier for Startup Ops in 2025

August 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.