Security experts have disclosed a new extortion campaign threatening to leak sensitive corporate details unless of course a Bitcoin payment is designed.
Microsoft regional director and HaveIBeenPwned founder, Troy Hunt, disclosed the unsolicited email in a social media publish. It claimed that the fraudsters experienced hacked his web page by exploiting some unnamed vulnerabilities and harvesting database credentials before extracting the “complete data” from all pcs and servers.
“We will systematically go through a series of ways to thoroughly destruction your status. Initial, your database will be leaked or bought to the maximum bidder to be utilised for any reason. Subsequent, e-mails will be sent to all your consumers, suppliers and business partners, stating that all of their details has been offered or leaked and your [web] site was at fault for leaking the facts and harmful the standing of all your consumers and providers,” the concept said.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
“Lastly, any one-way links you have indexed in lookup engines will be de-indexed based on the black hat techniques we made use of in the earlier to de-index our targets, not to point out finding your business enterprise on just about every blacklist in the place.”
The scammers then posted a Bitcoin deal with, demanding $2500 in 72 hrs or else they will “completely destroy your name with your shoppers, your suppliers, your partners, on Google and the complete region.”
It’s unclear how popular the campaign is, but the ‘Team Montesano’ team driving it are clearly hoping to cash-in on popular information of facts breach extortion groups these as the notorious Lapsus$.
As these kinds of, it can be submitted along with identical makes an attempt like sextortion cons which often use compact items of previously breached information these as legacy email passwords in an try to lend legitimacy to their tale that they have obtain to the victim’s machine.
In these email messages, the individual’s website address is shown in buy to personalize the scam, but there’s minimal else there to advise the group’s requires should be taken severely.
Some parts of this report are sourced from:
www.infosecurity-journal.com