The Group Claiming To Have Hacked Sony Is Using GDPR As A Weapon For Demanding Ransoms
We've spilled a great deal of ink discussing the GDPR and its failures and unintended consequences. The European data privacy law that was ostensibly built to protect the data of private citizens, but which was also expected to result in heavy fines for primarily American internet companies, has mostly failed to do either. While the larger American internet players have the money and resources to navigate GDPR just fine, smaller companies or innovative startups can't. The end result has been to harm competition, harm innovation, and build a scenario rife with harmful unintended consequences. A bang up job all around, in other words.
And now we have yet another unintended consequence: hacking groups are beginning to use the GDPR as a weapon to threaten private companies in order to get ransom money. You may have heard that a hacking group calling itself Ransomed.vc is claiming to have compromised all of Sony. We don't yet have proof that the hack is that widespread, but hacking groups generally both don't lie about that sort of thing or it ruins their business" plan, and Ransomed.vc has also claimed that if a buyer isn't found for Sony's data, it will simply release that data on September 28th. So, as to what they have, I guess we'll just have to wait and see.
The hack was reported byCyber Security Connect, which said that a group calling itself Ransomed.vc claimed to have breached Sony's systems and accessed an unknown quantity of data. We have successfully compromissed [sic] all of Sony systems," Ransomed.vc wrote on its leak sites. We won't ransom them! we will sell the data. due to sony not wanting to pay. DATA IS FOR SALE ... WE ARE SELLING IT."
The site said the hackers posted some proof-of-hack data" but described it as not particularly compelling," and also said that the file tree for the alleged hack looks small, given the group's claim that it had compromised all of Sony's systems." A price for the hacked data isn't posted, but Ransomed.vc did list a post date" of September 28, which is presumably when it will release the data publicly if no buyers are found.
But what really caught my attention was the description of how this particular group was going about issuing threats to its victims in order to collect ransoms. And part of the group's reputation is that it compromises its victims and then hunts for GDPR violations, building ransom requests that are less consequential than what the GDPR violation fines would be.
While the hackers say they're not going to ransom the data, Ransomed.vc apparently does have a history of doing so, with a unique twist: Cybersecurity siteFlashpointsaid in August that Ransomed takes a novel approach to extortion" by using the threat of the European Union'sGeneral Data Protection Regulation(GDPR) rules to convince companies to pony up. By threatening to release data that exposes companies to potentially massive GDPR fines, the group may hope to convince them that paying a little now is better than paying a whole lot later.
The group has disclosed ransom demands for its victims, which span from 50,000 EUR to 200,000 EUR," Flashpoint explained. For comparison, GDPR fines can climb into the millions and beyond-the highest ever was over 1 billion EUR. It is likely that Ransomed's strategy is to set ransom amounts lower than the price of a fine for a data security violation, which may allow them to exploit this discrepancy in order to increase the chance of payment."
And so because of the mess that the GDPR is, combined with its remarkable level of fines, the end result is that in some respects the EU has empowered rogue hacking groups to act as its enforcement wing for GDPR. And that both sucks and certainly isn't what the EU had in mind when it came up with this legislative plate of spaghetti.
Frankly, this has some parallels to other unintended boondoggles we've seen. What is making the hacking industry such a rich endeavor? Well, in part it's the cyber-insurance industry and its habit of paying out the bad actors because it's cheaper than helping their customers recover from ransomware and other attacks. All of which encourages more hacking groups to compromise more people and companies. GDPR appears to now operate in the same way for bad actors.
Well meaning or otherwise, when legislation purported to protect private data and interests instead proves to be a weapon in the hands of the very people most interested in compromising those private data and interests, it's time to scrap the thing and send it back to the shop to be rebuilt, or discarded.
As to what this Sony hack actually is, for that we'll have to wait and see.