{"id":24676,"date":"2021-04-21T12:44:52","date_gmt":"2021-04-21T19:44:52","guid":{"rendered":"https:\/\/evolvemga.com\/?p=24676"},"modified":"2021-04-21T12:49:08","modified_gmt":"2021-04-21T19:49:08","slug":"ransomware-with-a-twist-apple-quanta-hit-in-50m-attack","status":"publish","type":"post","link":"https:\/\/evolvemga.com\/ransomware-with-a-twist-apple-quanta-hit-in-50m-attack\/","title":{"rendered":"Ransomware with a Twist: Apple & Quanta Hit in $50M Attack"},"content":{"rendered":"[vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” top_padding=”0″ text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][divider line_type=”Small Line” line_alignment=”center” line_thickness=”1″ divider_color=”default” custom_line_width=”650″][vc_column_text]\n
As proof of the attack, REvil posted 15 screenshots of proprietary MacBook blueprints on the dark web, and has threatened to leak new data every day until either Apple or Quanta pays the record-tying ransom demand of $50M. That is the same amount REvil demanded in their attack<\/a> of Acer in March.<\/p>\n Ransomware criminals have historically only extorted the primary attack victim, not their customers. REvil\u2019s extortion of Apple after failing to get Quanta to pay is a new tactic.<\/p>\n Per Dmitry Smilyanets, Recorded Future<\/a>‘s threat intelligence analyst… \u201cThis is a new approach in the double extortion name-and-shame technique, where the threat actor engages with the affected third parties after the unsuccessful attempt to negotiate ransom with the primary victim.\u201d<\/p>\n REvil appears to be targeting Apple because of their recent product release, but it should be noted that the Quanta attack may impact many companies beyond the creators of the Macbook and iPhone.<\/p>\n The criminals released a list of other Quanta customers, including Dell, Hewlett-Packard Inc., Alienware Inc., Amazon.com Inc., Cisco Systems Inc., Fujitsu Ltd., Gericom, Lenovo Group Ltd., LG Electronics Inc., Maxdata, Microsoft Corp., MPC, Blackberry Ltd., Sharp Corp., Siemens AG, Sony Group Corp., Sun Microsystems Inc., Toshiba Corp., Verizon Wireless and Vizio Inc.<\/p>\n Traditional anti-virus and threat-detection platforms scan your computer and\/or network for files that may contain malware. And they do a good job of that.<\/p>\n The issue is that in these types of attacks, victims care just as much (or more) about stealing files rather than simply encrypting them. The answer? Data exfiltration detection, like that offered by Evolve’s newest risk management provider, BlackFog<\/a>.<\/p>\n BlackFog detects data leaving your network, which enables them to spot ransomware threats before competitors. All Evolve policyholders receive access to BlackFog as part of our complimentary policyholder risk management suite<\/a> (valued at $6,500+).<\/p>\n Related: <\/em><\/span>Computer giant Acer hit with $50M ransom demand.<\/a><\/strong><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/6″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” centered_text=”true” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”2\/3″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][nectar_btn size=”large” open_new_tab=”true” button_style=”regular” button_color_2=”Accent-Color” icon_family=”none” text=”Evolve’s Free Risk Mangement Providers” url=”https:\/\/evolvemga.com\/resources\/cybersecurity-risk-management-tools-for-policyholders\/”][\/vc_column][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/6″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][\/vc_column][\/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text css=”.vc_custom_1605123203967{padding-bottom: 25px !important;}”]\n [vc_row type=”in_container” full_screen_row_position=”middle” column_margin=”default” column_direction=”default” column_direction_tablet=”default” column_direction_phone=”default” scene_position=”center” top_padding=”0″ text_color=”dark” text_align=”left” row_border_radius=”none” row_border_radius_applies=”bg” overlay_strength=”0.3″ gradient_direction=”left_to_right” shape_divider_position=”bottom” bg_image_animation=”none” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_tablet=”inherit” column_padding_phone=”inherit” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” column_link_target=”_self” gradient_direction=”left_to_right” overlay_strength=”0.3″ width=”1\/1″…<\/p>\n","protected":false},"author":2,"featured_media":24689,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[72],"tags":[],"yoast_head":"\nA New Twist to Ransomware<\/span>
\n<\/strong><\/h3>\nOther potential victims?<\/span>
\n<\/strong><\/h3>\nHow does Evolve help policyholders prevent these attacks?<\/strong><\/span><\/h3>\n
PROTECT YOUR BUSINESS. EVOLVE.<\/span><\/a>
\n<\/strong><\/h2>\n[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"