US cybersecurity experts indicted for BlackCat ransomware attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是三名前网络安全公司的员工被起诉,他们涉嫌参与BlackCat勒索软件攻击,时间在2023年5月至11月期间。他们入侵了五家美国公司的网络,窃取数据并加密,要求赎金。如果定罪,他们可能面临最长20年的监禁。 接下来,我需要提取关键信息:前雇员、DigitalMint和Sygnia、BlackCat勒索软件、攻击时间、受害者数量和类型、指控内容以及可能的刑罚。 然后,我要把这些信息浓缩成一个简洁的句子,不超过100字。确保包含主要人物、事件、时间和后果。 最后,检查是否符合用户的要求:中文总结,直接描述内容,不使用特定开头。 </think> 三名前网络安全公司员工因涉嫌参与BlackCat勒索软件攻击被起诉。他们被指控在2023年5月至11月期间入侵五家美国公司网络,窃取数据并加密索要赎金。若定罪,每人最高可判处20年监禁。 2025-11-3 17:30:21 Author: www.bleepingcomputer.com(查看原文) 阅读量:7 收藏

Hacking

Three former employees of cybersecurity incident response companies DigitalMint and Sygnia have been indicted for allegedly hacking the networks of five U.S. companies in BlackCat (ALPHV) ransomware attacks between May 2023 and November 2023.

28-year-old Kevin Tyler Martin of Roanoke, Texas (who pleaded not guilty), 33-year-old Ryan Clifford Goldberg of Watkinsville, Georgia (in federal custody since September 2023), and an unnamed accomplice face charges of conspiracy to interfere with interstate commerce by extortion, and intentional damage to protected computers.

If convicted, the defendants could face up to 20 years in prison for extortion and 10 years for damage to computer systems.

Wiz

According to the Chicago Sun-Times, which first spotted the unsealed court documents, Martin worked at DigitalMint as a ransomware threat negotiator (just as the unnamed co-conspirator), while Goldberg is a former Sygnia incident response manager.

The Department of Justice claims the defendants operated as ALPHV BlackCat affiliates, gaining unauthorized access to the victims' networks, stealing data, deploying encryption malware, and demanding cryptocurrency payments in exchange for decryption keys and promises not to leak the stolen information online.

Per the indictment, the group's alleged victims include a Tampa medical device manufacturer, a Maryland pharmaceutical company, a California doctor's office, a California engineering firm, and a Virginia drone manufacturer.

Prosecutors said the attackers have demanded ransoms ranging from $300,000 to $10 million. Still, they were only paid $1.27 million by the Tampa medical device company after they encrypted its servers and demanded $10 million in May 2023. Although other victims also received ransom demands, the indictment does not indicate whether additional payments were made.

As BleepingComputer previously reported, the Department of Justice was investigating a former DigitalMint ransomware negotiator for allegedly working with ransomware gangs to profit from extortion payment deals. The DOJ and the FBI declined to comment when contacted at the time for more information. It is unclear if this indictment is related to the DOJ's previous investigation.

A 2019 ProPublica report revealed that some U.S. data recovery firms have also secretly paid ransomware gangs while charging clients for restoration services without disclosing these payments.

In a February 2024 joint advisory, the FBI, CISA, and the Department of Health and Human Services (HHS) warned that Blackcat ransomware affiliates were primarily targeting organizations in the U.S. healthcare sector.

The FBI has also linked BlackCat to over 60 breaches between November 2021 and March 2022 (the ransomware group's first four months of activity) and said they raked in at least $300 million in ransoms from more than 1,000 victims until September 2023.

Wiz

7 Security Best Practices for MCP

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.


文章来源: https://www.bleepingcomputer.com/news/security/us-cybersecurity-experts-indicted-for-blackcat-ransomware-attacks/
如有侵权请联系:admin#unsafe.sh