A new ransomware group says it has breached Sony completely

Click here to visit Original posting

A new ransomware threat actor, going by the name Ransomed.vc, claims to have breached Sony in its entirety. 

In an ad recently posted on the dark web, the group said it breached all systems belonging to the Japanese tech conglomerate and stole sensitive corporate data. Given that the company isn’t keen on paying the ransom demand, the group is selling the stolen data.

The ad, seen by researchers at Cybersecurity Connect, also features a small sample of the data, which the publication says isn’t “particularly compelling”. It includes screenshots of an internal log-in page, an internal PowerPoint presentation outlining testbench details, and some Java files. 

New players

The group also posted a file tree of the entire leak, showcasing around 6,000 files. For the researchers, this is relatively small, if “all of Sony systems” were compromised. Still, the file tree shows “build log files”, some Java resources, and HTML files. Plenty of the stolen files were in Japanese, it was noted. 

The group did not say how much money it was looking to make on the database. So far, Sony hasn’t made any announcements regarding the breach.

Ransomed is a relatively new player on the scene, apparently emerging only this month, but it does have some connections to older groups. In its short lifespan, it has already managed to rack up a few victims, including Japanese mobile operator NTT Docomo. Reports claim the group has listed “dozens” of victims on its leak site. 

When it first emerged, the group apparently adopted a unique strategy by threatening to report its victims to EU authorities if they didn’t pay up, citing violation of data privacy laws in the region.

“In essence, Ransomed VC is leveraging the fear of these substantial fines to extort money from companies,” said Incident Response Analyst Ron Kaminsky in its analysis of the group. “This is an unusual approach, as most extortion or ransomware groups typically focus on encrypting data and demanding a ransom for its release, rather than exploiting data protection laws for financial gain.”

Via Cybersecurity Connect

More from TechRadar Pro