{"id":7814,"date":"2023-03-28T15:55:22","date_gmt":"2023-03-28T19:55:22","guid":{"rendered":"https:\/\/joindeleteme.com\/blog\/?p=7814"},"modified":"2024-10-10T17:07:04","modified_gmt":"2024-10-10T21:07:04","slug":"new-ransomware-march-2023-newsletter","status":"publish","type":"b2b-post","link":"https:\/\/joindeleteme.com\/business\/blog\/new-ransomware-march-2023-newsletter\/","title":{"rendered":"Ransomware Gangs New Blackmail Tactics: March 2023 Newsletter"},"content":{"rendered":"\n<p>In the March 2023 edition of our business privacy newsletter, you\u2019ll find our take on:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#ransomware\">Ransomware gangs new personal blackmail tactics<\/a>; <\/li>\n\n\n\n<li><a href=\"#breaches\" data-type=\"internal\" data-id=\"#breaches\">The latest breach news from Congress &amp; Telecoms<\/a>;<\/li>\n\n\n\n<li><a href=\"#chatgpt\" data-type=\"internal\" data-id=\"#chatgpt\">ChatGPT&#8217;s first PII leak<\/a>;<\/li>\n\n\n\n<li><a href=\"#utah\">Age verification in Utah&#8230;and beyond<\/a><\/li>\n<\/ul>\n\n\n\n<p id=\"ransomware\"><\/p><hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.axios.com\/2023\/03\/14\/ransomware-gangs-blackmail-cybersecurity\" target=\"_blank\" rel=\"noopener\">Ransomware Gangs Resorting to Personal Blackmail Tactics to Compel Payment<\/a><\/h2>\n\n\n\n<p>\u2018<a href=\"https:\/\/cpl.thalesgroup.com\/blog\/data-protection\/protection-against-double-ransomware\" target=\"_blank\" rel=\"noopener\">Double Extortion<\/a>\u2019 ransomware tactics are not especially new. Company data is first exfiltrated and then encrypted, allowing criminals to demand payment for the return of data access or to refrain from public dumps of information (or both).&nbsp;&nbsp;<\/p>\n\n\n\n<p>What is new is that with ransomware <a href=\"https:\/\/blog.chainalysis.com\/reports\/crypto-ransomware-revenue-down-as-victims-refuse-to-pay\/\" target=\"_blank\" rel=\"noopener\">payouts declining<\/a>, criminal gangs are now often <a href=\"https:\/\/www.axios.com\/2023\/01\/13\/ransomware-gangs-cut-out-encryption\" target=\"_blank\" rel=\"noopener\">skipping encryption<\/a>, focusing on stolen, sensitive individual data, and selectively leaking it to create public embarrassment, <a href=\"https:\/\/www.theregister.com\/2023\/03\/15\/cancer_lvhn_sues_hospital\/\" target=\"_blank\" rel=\"noopener\">exposing target companies to litigation risk<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Our Take<\/h3>\n\n\n\n<p>Similar incidents have occurred, like with the Washington DC police force in 2021, where selected <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/hackers-publish-extensive-dossiers-dc-police-officers-extortion-attemp-rcna788\" target=\"_blank\" rel=\"noopener\">personal details about officers and informants<\/a> were leaked in advance to try and compel rapid payout. With companies getting better at technical protection of systems from encryption, direct blackmail is likely to become more common; recent IT <a href=\"https:\/\/venafi.com\/news-center\/press-release\/study-seventy-four-percent-it-decision-makers-say-new-extortion-tactics\/\" target=\"_blank\" rel=\"noopener\">surveys<\/a> indicate more than a third of breaches are now being followed by extortion of customers.<\/p>\n\n\n\n<p id=\"breaches\"><\/p><hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.nbcnews.com\/politics\/congress\/info-data-breach-affecting-lawmakers-posted-hacker-site-rcna75140\" target=\"_blank\" rel=\"noopener\">Congress Experiences Data Breach<\/a>, <a href=\"https:\/\/www.axios.com\/2023\/03\/17\/telecom-data-breaches-t-mobile-att\" target=\"_blank\" rel=\"noopener\">Telecoms Under Siege<\/a><\/h2>\n\n\n\n<p>Personal data for over 56,000 Federal workers\u2014including house representatives, staffers, and senate members\u2014was stolen in a <a href=\"https:\/\/apnews.com\/article\/congress-data-breach-hackers-identity-theft-480938fd42dc00d1a23fa5dbd37d5051\" target=\"_blank\" rel=\"noopener\">breach of DC Health Link<\/a> services in early March. Investigators warned that the information included the social security numbers of some capitol employees, and the FBI has already <a href=\"https:\/\/www.nbcnews.com\/tech\/security\/fbi-arrests-alleged-operator-site-hosted-hacked-congressional-health-d-rcna76562\" target=\"_blank\" rel=\"noopener\">arrested<\/a> people believed connected to the public sale of the data.<\/p>\n\n\n\n<p>Meanwhile, security firm <a href=\"https:\/\/blog.cyble.com\/2023\/02\/10\/u-s-telecommunications-companies-targeted-consumers-hit-hardest\/?stream=top\" target=\"_blank\" rel=\"noopener\">Cyble<\/a> estimates that more than 74 million U.S. telecom customers have already had their data leaked on the dark web in 2023.&nbsp; <a href=\"https:\/\/www.telecomstechnews.com\/news\/2023\/jan\/20\/t-mobile-suffers-another-large-data-breach\/\" target=\"_blank\" rel=\"noopener\">T-Mobile<\/a>, <a href=\"https:\/\/www.fiercewireless.com\/sponsored\/mwc-2023-what-we-heard-about-virtualization-open-networks-and-sustainability\" target=\"_blank\" rel=\"noopener\">AT&amp;T<\/a>, and <a href=\"https:\/\/thecyberexpress.com\/verizon-customer-data-for-sale-on-dark-web\/\" target=\"_blank\" rel=\"noopener\">Verizon<\/a> all acknowledged significant data losses in 2023, even as <a href=\"https:\/\/www.nytimes.com\/2023\/03\/02\/us\/politics\/biden-cybersecurity-strategy.html\" target=\"_blank\" rel=\"noopener\">the White House recently appealed to the industry<\/a> to take more robust measures against growing cybersecurity risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Our Take<\/h3>\n\n\n\n<p>Now that Congress has joined the rest of America in the daily reality of PII risk, we hope it might motivate some of them to advance stronger privacy regulations that limit data-breaking fallout finally.<\/p>\n\n\n\n<p id=\"chatgpt\"><\/p><hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.cmswire.com\/digital-experience\/chatgpt-suffers-first-data-breach-exposes-personal-information\/\" target=\"_blank\" rel=\"noopener\">ChatGPT Experiences First PII Leak Incident<\/a><\/h2>\n\n\n\n<p>On March 20th, the world\u2019s most-popular chatbot, OpenAI\u2019s ChatGPT, suffered <a href=\"https:\/\/openai.com\/blog\/march-20-chatgpt-outage\" target=\"_blank\" rel=\"noopener\">its first data-breach incident<\/a>, exposing names, email addresses, payment-related information, and chat history of ~1% of its users during a 9-hour window. &nbsp; Since its launch in November 2022, ChatGPT has become one of the fastest-growing consumer apps in history, hitting 100 million unique monthly users in January alone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Our Take<\/h3>\n\n\n\n<p>While the scope of the breach is small, it highlights potential privacy risks associated with the rapid adoption of any new technology and serves as a warning for future implementation of AI tech at scale without strong user safeguards built in from the outset.<\/p>\n\n\n\n<p id=\"utah\"><\/p><hr class=\"wp-block-separator has-alpha-channel-opacity\">\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/www.vox.com\/technology\/2023\/3\/25\/23655549\/utah-social-media-law-children-facebook-instagram-tiktok-snapchat\" target=\"_blank\" rel=\"noopener\">Utah Bans Minors from Social Media<\/a>; <a href=\"https:\/\/www.biometricupdate.com\/202303\/virginia-and-arkansas-in-us-moving-age-verification-bills-closer-to-reality\" target=\"_blank\" rel=\"noopener\">State Age-Verification Laws Proliferating<\/a><\/h2>\n\n\n\n<p>On March 23rd, Utah <a href=\"https:\/\/www.forbes.com\/sites\/nicholasreimann\/2023\/03\/23\/utah-bans-teens-under-18-from-social-media-without-parental-consent\/\" target=\"_blank\" rel=\"noopener\">signed legislation<\/a> that would impose strict restrictions on minors&#8217; use of social media. A <a href=\"https:\/\/www.huschblackwell.com\/2023-state-childrens-privacy-law-tracker\" target=\"_blank\" rel=\"noopener\">growing number of states<\/a> have similar forms of \u2018child-protection\u2019 legislation currently in progress, some of which are close to passage.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Most of these laws share a common requirement for online services\u2014from social media like Instagram and Twitter to adult-content sites\u2014to impose stricter processes for positively identifying users and verifying their age. No law specifies how online providers are supposed to accomplish this, and technical <a href=\"https:\/\/www.axios.com\/2023\/03\/06\/age-checks-online-children-social-media-privacy\" target=\"_blank\" rel=\"noopener\">hurdles for doing so remain significant<\/a>.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Our Take<\/h3>\n\n\n\n<p>While branded as Child Privacy\u201d laws, the framework would require millions of adults to share official identification documents or other sensitive personal information with various new 3rd parties. And, as the French Data Privacy Authority (CNIL) has <a href=\"https:\/\/www.cnil.fr\/en\/online-age-verification-balancing-privacy-and-protection-minors\" target=\"_blank\" rel=\"noopener\">pointed out<\/a>, all current age-verification technologies are both easily-exploitable and vastly increase user data risks.&nbsp; We share the <a href=\"https:\/\/www.eff.org\/deeplinks\/2023\/03\/age-verification-mandates-would-undermine-anonymity-online\" target=\"_blank\" rel=\"noopener\">Electronic Freedom Foundation\u2019s view<\/a> that the proposed \u2018solution\u2019 in this case is worse than the problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Check Out Our Latest Blog Posts<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/joindeleteme.com\/business\/blog\/corporate-account-takeover-data-brokers\/\">3 Ways Data Brokers Enable Corporate Account Takeover<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/joindeleteme.com\/business\/blog\/personal-data-privacy-impact-on-business\/\">Personal Data Privacy &amp; its Important Impact on Business<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/joindeleteme.com\/business\/blog\/executive-reputation-management\/\">Executive Reputation Management: How Data Broker Profiles Create Reputational Risk<\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">DeleteMe in the News<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check out our<a href=\"https:\/\/joindeleteme.com\/business\/blog\/deleteme-in-the-news-in-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u00a0running log<\/a>\u00a0of DeleteMe in the news in 2023.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Upcoming Events<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/joindeleteme.com\/business\/blog\/rsa-conference-2023-excited-exhibitor-alert\/\" target=\"_blank\" data-type=\"post\" data-id=\"7817\" rel=\"noreferrer noopener\">We&#8217;ll be at RSA Conference 2023 on April 24-27 in San Francisco. See you there?<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Read the March 2023 issue of our business privacy newsletter.<\/p>\n","protected":false},"author":16,"featured_media":7815,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"b2b-category":[45],"class_list":["post-7814","b2b-post","type-b2b-post","status-publish","format-standard","has-post-thumbnail","hentry","b2b-category-resources"],"acf":[],"_links":{"self":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/7814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post"}],"about":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/types\/b2b-post"}],"author":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":0,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/7814\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media\/7815"}],"wp:attachment":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media?parent=7814"}],"wp:term":[{"taxonomy":"b2b-category","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-category?post=7814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}