Topics

Latest

AI

Amazon

Article image

Image Credits:William Whitehurst / Getty Images

Apps

Biotech & Health

Climate

a desk phone with its receiver off the hook

Image Credits:William Whitehurst / Getty Images

Cloud Computing

DoC

Crypto

Enterprise

EVs

Fintech

Fundraising

gadget

Gaming

Google

Government & Policy

Hardware

Instagram

Layoffs

Media & Entertainment

Meta

Microsoft

privateness

Robotics

Security

Social

blank

Startups

TikTok

Transportation

Venture

More from TechCrunch

Events

Startup Battlefield

StrictlyVC

newssheet

Podcasts

video recording

Partner Content

TechCrunch Brand Studio

Crunchboard

adjoin Us

When a hacker foretell the company that his gang claimed to breach , he feel the same way that most of us find when calling the front desk : frustrated .

The telephone set call between the hacker , who claims to represent the ransomware gang DragonForce , and the victim company employee was brand by the ransomware crowd on its dark web website in an apparent attempt to put pressing on the fellowship to compensate a ransom need . In realism , the call recording just evince a somewhat hilarious and neglect attempt to extort and intimidate a company ’s rank and file - and - file employee .

The recording also shows how ransomware gangs are always looking for different ways to restrain the companies they hack .

“ It ’s increasingly common for terror actors to make contact via telephony , and this should be factor out into organizations ’ response plans . Do we engage or not ? Who should operate ? You do n’t need to be work these decision while the threat actor is heed to your clench music , ” said Brett Callow , a scourge psychoanalyst at Emsisoft .

In the call , the drudge asks to talk with the “ management team . ” Instead , two different employee put him on hold until Beth , from 60 minutes , answers the call .

“ Hi , Beth , how are you doing ? ” the hacker said .

After a minute in which the two have trouble see each other , Beth tell the hacker that she is not intimate with the data breach that the cyberpunk arrogate . When the hacker attempts to explain what ’s going on , Beth break up him and asks : “ Now , why would you attack us ? ”

Join us at TechCrunch Sessions: AI

Exhibit at TechCrunch Sessions: AI

“ Is there a reason why you chose us ? ” Beth take a firm stand .

“ No need to interrupt me , OK ? I ’m just trying to help you , ” the hacker respond , growing increasingly defeated .

The hacker then proceeds to explain to Beth that the company she cultivate for only has eight minute to talk terms before the ransomware gang will issue the ship’s company ’s stolen data .

“ It will be published for public entree , and it will be used for fallacious activity and for terrorism by criminals , ” the hacker says .

“ Oh , OK , ” say Beth , apparently at a loss , and not understanding where the information is go to be .

“ So it will be on X ? ” Beth postulate . “ So is that Dragonforce.com ? ”

The hacker then endanger Beth , aver they will start calling the company ’s node , employee and collaborator . The hacker adds that they have already contacted the media and provide a transcription of a previous call with one of her colleagues , which is also on the gang ’s dark web situation .

“ So that include a conversation with Patricia ? Because you know , that ’s illegal in Ohio , ” Beth says .

“ rationalise me ? ” the hacker responds .

“ You ca n’t do that in Ohio . Did you record Patricia ? ” Beth continues .

“ Ma’am , I am a hack . I do n’t handle about the police force , ” reply the hacker , farm even more defeated .

Then the hack tries one more time to convince Beth to negociate , to no avail .

“ I would never negotiate with a terrorist or a hacker as you call yourself , ” Beth responds , need the hacker to support a estimable earpiece number to call them back .

When the hacker says they “ get no telephone set number , ” Beth has had enough .

“ Alright , well then I ’m just gon na go ahead and cease this headphone call now , ” she order . “ I think we spent enough time and muscularity on this . ”

“ Well , good destiny , ” Beth suppose .

“ Thank you , take care , ” the hacker says .

The company that was allegedly hacked in this incident , which TechCrunch is not naming as to not serve the hackers extort the company , did not respond to a request for remark .

Read more on TechCrunch :