Sunday, June 4, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • Strengthening The Canadian Financial Sector’s Cybersecurity
  • Dancho Danchev's OSINT and Threat Intelligence Training Video Demonstration in Bulgarian - Part Two
  • Dancho Danchev's OSINT and Threat Intelligence Training Video Demonstration in Bulgarian - Part One
  • Technical Analysis of Bandit Stealer
  • BSidesSF 2023 - Sanchay Jaipuriyar - Overwatch: A Serverless Approach To Orchestrating Your Security Automation
Data Security SBN News Security Bloggers Network 

Home » Cybersecurity » Data Security » RobbinHood Ransomware Demands Grow $10K Per Day after Fourth Day

SBN

RobbinHood Ransomware Demands Grow $10K Per Day after Fourth Day

by David Bisson on April 15, 2019

The ransom demands imposed by the new “RobbinHood” ransomware family increase $10,000 each day beginning on the fourth day following encryption.

The creators of RobbinHood appear to be aiming their attacks at entire networks. When they’ve gained access to a target, they use their ransomware to encrypt as many computers as possible. They then drop ransom notes under four different names on the infected machines.

Each copy of the ransom message provides victims with two options of payment: pay three Bitcoins (currently worth $15,476.47) per each affected system or seven Bitcoins (currently worth $36,111.76) to recover all affected systems. Each note then informs those who have suffered an infection that the ransom amounts will increase by $10,000 each day if they haven’t paid by the fourth day after encryption.

A partial copy of the RobbinHood ransomware note. (Source: Bleeping Computer)

The ransomware also distinguishes itself by leveraging privacy to its advantage. For instance, the RobbinHood ransom note makes a point of reassuring the victim that “your privacy is important for us, all of your records including IP address and Encryption keys will be wiped out after your payment.” It goes on to note how how “[t]here is no need to mention that our servers have no event a bit of your network data and information.”

Lawrence Abrams, creator and owner of Bleeping Computer, feels that this second statement in particular has a purpose. As he explains in a blog post:

This is the first time I have ever seen a ransomware offer that bit of advice. By stating that they will keep the victim’s ransomware infection a secret they are implying that a company can pay for the ransomware without having to disclose the breach and receive negative publicity. This is being done to potentially (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/robbinhood-ransomware-demands-grow-10k-per-day-after-fourth-day/

April 15, 2019April 15, 2019 David Bisson IT Security and Data Protection, Latest Security News, Privacy, Ransomware, RobbinHood
  • ← Penetration Testing at DevSecOps Speed
  • China Spying on Undersea Internet Cables →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Sun 04

Simplify, Secure, Strengthen: Implementing Zero-Trust Across Your Endpoints

May 17 @ 1:00 pm - July 12 @ 2:00 pm
Thu 08

ActiveState Workshop: Building Secure and Reproducible Open Source Runtimes

June 8 @ 1:00 pm - 2:00 pm
Tue 13

Uncovering the Hidden Cybersecurity Threat in Your Organization

June 13 @ 1:00 pm - 2:00 pm
Wed 14

Enrich Security Investigations With ServiceNow Asset Data in Snowflake

June 14 @ 3:00 pm - July 24 @ 4:00 pm
Thu 15

Securing Containers & Kubernetes With AWS And Calico

June 15 @ 3:00 pm - 4:30 pm
Thu 22

Strange Bedfellows: Software, Security and the Law

June 22 @ 11:00 am - 12:00 pm
Thu 22

Sneak Peek: Cloud Security Prioritized With Sonrai

June 22 @ 1:00 pm - 2:00 pm
Thu 22

Unleash the Potential of Your Log and Event Data, Including AI’s Growing Impact

June 22 @ 3:00 pm - 4:00 pm
Jul 24

Identity and Access Management

July 24 @ 1:00 pm - 2:00 pm
Feb 12

Ransomware

February 12, 2024 @ 1:00 pm - 2:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

‘Predator’ — Nasty Android Spyware Revealed
Legacy AppSec Tools Getting Lost in the Cloud
External Attack Surface Management: How Focusing on Basics Improves Security
Russia Says NSA Hacked iOS With Apple’s Help — we Triangulate Kaspersky’s Research
Attack Surface Management Vs. Vulnerability Management
Malicious extensions: Avast detects new threats on the Chrome Web Store
Discord Admins Hacked by Malicious Bookmarks
Why Cloud Did Not Kill the Data Center
CyRC Vulnerability Advisory: CVE-2023-32353, Apple iTunes local privilege escalation on Windows
Listen to These Recordings: Deepfake Social Engineering Scams Are Scaring Victims

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

Dark Web Threats Target Energy Industry as Cybercrime Tactics Shift
Analytics & Intelligence Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Malware Security Boulevard (Original) Threat Intelligence 

Dark Web Threats Target Energy Industry as Cybercrime Tactics Shift

June 2, 2023 Nathan Eddy | 2 days ago 0
‘Predator’ — Nasty Android Spyware Revealed
Analytics & Intelligence API Security Cyberlaw Cybersecurity Data Security Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Predator’ — Nasty Android Spyware Revealed

May 30, 2023 Richi Jennings | 4 days ago 0
Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift
Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Industry Spotlight News Security Boulevard (Original) Spotlight 

Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift

May 23, 2023 Michael Vizard | May 23 0

Top Stories

Russia Says NSA Hacked iOS With Apple’s Help — we Triangulate Kaspersky’s Research
Analytics & Intelligence API Security Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Incident Response Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

Russia Says NSA Hacked iOS With Apple’s Help — we Triangulate Kaspersky’s Research

June 2, 2023 Richi Jennings | 1 day ago 0
COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Analytics & Intelligence API Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT

May 26, 2023 Richi Jennings | May 26 0
Federal Appellate Court Approves ‘Pretext’ Border Search
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access News Security Boulevard (Original) 

Federal Appellate Court Approves ‘Pretext’ Border Search

May 26, 2023 Mark Rasch | May 26 0

Security Humor

Eugene Kaspersky—is he a useful idiot?

Russia Says NSA Hacked iOS With Apple’s Help — we Triangulate Kaspersky’s Research

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.