Attacker Demands $15,000 Ransom for Stolen Customer Credentials

August 5, 2015
| |
2 min read

A cybercriminal going by the name DetoxRansome claims to have stolen some of the login credentials of Bitdefender’s users and threatened to release the details if $15,000 is not paid as ransom. The attacker told Forbes that all information, including passwords and usernames, was unencrypted.

The antivirus software provider Bitdefender confirmed that customer login credentials were obtained by the attacker but stated that a very limited number of usernames and passwords has been exposed. Their spokesperson stated that the attack did not penetrate the server, but “a vulnerability potentially enabled exposure of a few user accounts and passwords.” The attack leaked a “very limited” number of usernames and passwords — less than 1 percent of Bitdefender’s small and medium business customers, according to the spokesperson.

These days, most targeted attacks make use of stolen credentials. Fraud expert Avivah Litan wrote earlier this year that “password compromise is the most common way bad guys get into our accounts.” She continued, “Over the past couple of months, Gartner clients have been telling us [Gartner] about the significant rise in automated attacks, whereby hackers use bot armies to run through user credentials at various consumer service websites, knowing that a few percent of them will probably work.”

According to a Gartner survey conducted several years ago, over two-thirds of consumers reuse their passwords across sites whenever they can. Many employees reuse their corporate passwords for accessing personal online services and applications. This is a dangerous practice because, if stolen or exposed to others, that single password can provide access to multiple systems and sites. Furthermore, cybercriminals know this, which is why even seemingly innocuous credentials are so valuable to them.

To minimize risk, it is imperative that, in addition to education programs, organizations enforce password security policies that require employees to use different passwords for accessing corporate resources and noncorporate online services. This can easily be achieved with credential protection platforms that can automatically alert on and optionally prevent password reuse by employees.

As this breach demonstrates, exposed or stolen credentials can have a far-reaching impact, both on the source from which they were stolen and the customers that may now be exposed.

Can’t get enough ransomware stories? Read more about the enterprise boogeyman and its older cousin, DDoS Extortion.

Dana Tamir
Director of Enterprise Security at Trusteer, an IBM Company

Dana Tamir is Director of Enterprise Security at Trusteer, an IBM Company. In her role she leads activities related to enterprise advanced threat protection ...
read more