Teacher
Professional
- Messages
- 2,670
- Reaction score
- 783
- Points
- 113
Who are Mogilevich - lying hackers or cybercrime geniuses?
The Ministry of Foreign Affairs of Ireland (DFA) has officially stated that there is no evidence of hacking of its IT systems, which was claimed by the Mogilevich ransomware group.
On its website, the Mogilevich group announced the sale of 7 GB of stolen DFA documents, without providing evidence of hacking. In addition to the Irish department, the Mogilevich website lists 3 more victims, whose names were not disclosed due to the lack of comments from these companies. Evidence of other break-ins was also not presented.
According to the DFA representative, the ministry was alerted to the potential incident that occurred on the evening of February 27 by the National Cyber Security Center of Ireland (NCSC).
The DFA is actively working with the NCSC to determine the authenticity of the threat. The investigation is ongoing, and if any violations are found, all necessary measures will be taken, according to the DFA.
It is noted that the actions of the Mogilevich group raise doubts about its legitimacy. The extortion site is not professionally designed, which is not typical for "serious" groups that engage in extortion using the Ransomware-as-a-Service (RaaS) model. In addition, the group requires a deposit of $1,000 from potential partners, which may cause suspicion among experienced scammers.
Recall that the Mogilevich group on February 27 announced the hacking of Epic Games ' servers. According to the ransomware, the attack on Epic Games servers was carried out quietly and unnoticed. As a result, the group allegedly stole 189 GB of confidential company data.
Ransomware groups are a well-established phenomenon in the world of cybercrime, but among all such groups, there are some that are not who they claim to be. Back in 2019, the information security company Coveware mentioned such a phenomenon as"phantom extortion". Such scammers are the lowest caste in the cybercrime world, with neither the ability to gain initial access to the victim's network, nor the platform to monetize that access-despite how much modern technology has lowered the bar for hacking.
The Ministry of Foreign Affairs of Ireland (DFA) has officially stated that there is no evidence of hacking of its IT systems, which was claimed by the Mogilevich ransomware group.
On its website, the Mogilevich group announced the sale of 7 GB of stolen DFA documents, without providing evidence of hacking. In addition to the Irish department, the Mogilevich website lists 3 more victims, whose names were not disclosed due to the lack of comments from these companies. Evidence of other break-ins was also not presented.
According to the DFA representative, the ministry was alerted to the potential incident that occurred on the evening of February 27 by the National Cyber Security Center of Ireland (NCSC).
The DFA is actively working with the NCSC to determine the authenticity of the threat. The investigation is ongoing, and if any violations are found, all necessary measures will be taken, according to the DFA.
It is noted that the actions of the Mogilevich group raise doubts about its legitimacy. The extortion site is not professionally designed, which is not typical for "serious" groups that engage in extortion using the Ransomware-as-a-Service (RaaS) model. In addition, the group requires a deposit of $1,000 from potential partners, which may cause suspicion among experienced scammers.
Recall that the Mogilevich group on February 27 announced the hacking of Epic Games ' servers. According to the ransomware, the attack on Epic Games servers was carried out quietly and unnoticed. As a result, the group allegedly stole 189 GB of confidential company data.
Ransomware groups are a well-established phenomenon in the world of cybercrime, but among all such groups, there are some that are not who they claim to be. Back in 2019, the information security company Coveware mentioned such a phenomenon as"phantom extortion". Such scammers are the lowest caste in the cybercrime world, with neither the ability to gain initial access to the victim's network, nor the platform to monetize that access-despite how much modern technology has lowered the bar for hacking.