Bitcoin Forum
April 25, 2024, 02:57:21 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [2017-06-27] Don’t Pay Bitcoin Ransoms, South Korean Govt Tells Banks Facing DD  (Read 3042 times)
Terraformer (OP)
Sr. Member
****
Offline Offline

Activity: 574
Merit: 251



View Profile
June 27, 2017, 01:45:04 PM
 #1

The Financial Supervisory Service of South Korea has told local banks not to cave into threats by DDoS attackers following this month’s million-dollar bitcoin ransom paid by South Korean web hoster Nayana, the victim of a ransomware attack.

According to local reports, the Financial Supervisory Service (FSC) has sent official letters to a number of local financial companies on Monday, urging them not to yield to threats by DDoS attackers. The Korea Times reveals that infamous DDoS group, the Armada Collective, has sent threats to at least seven banks, some securities brokerages and the operator of the Korea Exchange last week. The seven banks include some of Korea’s largest lenders, namely: Shinhan, Kookmin, Woori, KEB Hana, Nonghyup, IBK, and KDB.

The precedent was set by South Korean web hosting firm Nayana, which paid out a total of 397.6 bitcoins (over $1 million at the time) to recover the data of websites belonging to some 3,400 customers following a ransomware attack that began a fortnight ago.

The threat: In extortion messages sent to these financial institutions between June 20 and June 23, the Armada Collective demanded between 10 to 15 bitcoins (approx. $24,000 – $36,000) or face disruption via DDoS attacks.

The attackers have already carried out attacks against smaller banks on Monday. The Korea Financial Telecommunications & Clearings Institute (KFTC) received an extortion threat at 9:50 AM on Monday morning, immediately followed by a minor DDoS attack at 9:52 AM. The attack lasted for 16 minutes, according to the Korea Times report.

Notably, the Armada Collective’s threat has marked Wednesday as ‘D-day’, with the threat of a large-scale attack to be carried out tomorrow. The DDoS group has successfully extorted companies in the past.  A high-profile incident in late 2015 saw encrypted email service provider Protonmail give in to a demand of 15 bitcoins (approx. $6,000 at the time) to stop crippling DDoS attacks that exceeded speeds of 100Gbps.

Read more
- https://www.cryptocoinsnews.com/dont-pay-bitcoin-ransoms-south-korean-govt-tells-banks-facing-ddos-threats/
1714057041
Hero Member
*
Offline Offline

Posts: 1714057041

View Profile Personal Message (Offline)

Ignore
1714057041
Reply with quote  #2

1714057041
Report to moderator
1714057041
Hero Member
*
Offline Offline

Posts: 1714057041

View Profile Personal Message (Offline)

Ignore
1714057041
Reply with quote  #2

1714057041
Report to moderator
"In a nutshell, the network works like a distributed timestamp server, stamping the first transaction to spend a coin. It takes advantage of the nature of information being easy to spread but hard to stifle." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
Kprawn
Legendary
*
Offline Offline

Activity: 1904
Merit: 1073


View Profile
June 27, 2017, 03:22:34 PM
 #2

What are the alternative? You are losing millions if you do not adhere to these requests or you lose a few million less, if you do? The IT

consultants will have to beef up their systems to prevent these attacks or to reduce their influence. I would much rather dump this money into

some sort of preventative strategy, than dumping it into ransom requests that might or might not stop? I know ProtonMail asked for more funding

to upgrade their systems and they have not gone down since. Until the preventative measures are in place, you will have to pay to keep your

doors open for business.  Roll Eyes


THE FIRST DECENTRALIZED & PLAYER-OWNED CASINO
.EARNBET..EARN BITCOIN: DIVIDENDS
FOR-LIFETIME & MUCH MORE.
. BET WITH: BTCETHEOSLTCBCHWAXXRPBNB
.JOIN US: GITLABTWITTERTELEGRAM
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!