Led development and deployment of CISA's first passive, opt-out vulnerability scanning program with Crossfeed, assessing all 50 states and over 2,500 countiesĪdvised the IT-ISAC on rebuilding relationships betweenĬommunity and elections industry, leading to the adoption The Stanford Empirical Security Research Group and the Stanford Internet Observatory Some of my work: Jack studied computer science at Stanford, where he worked as a researcher Including Google, Facebook, Uber, Yahoo, and the U.S. Jack is also a top-ranked bug bounty hunter, having identified over 350 vulnerabilities in companies Portfolio, advised on the next iteration of the DoD Helped run the Hack the Pentagon bug bounty Jack joined the Defense Digital Service out of high school, where he Security Architect at Krebs Stamos Group.īefore that, Jack served as an Election Security Technical Advisor at CISA, where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide. "But I would like to get as complete of a picture as possible.Jack Cable is a computer scientist and security researcher, currently a Fellow with #Jack cable stamos group ransomwhere 32m pagetechcrunch full“It'll never be possible to get the full picture - criminals who are using Monero will be nearly impossible to track”, Cable says. He’s also looking at ways to support other traceable cryptocurrencies, such as Ethereum, as well as at the potential to track downstream bitcoin addresses. RangarLocker, DarkSide and Egregor round out Ransomwhere’s top five list - for now at least - having amassed sums of $4.6 million, $4.4 million and $3.2 million, respectively.Ĭable says that going forward, he’s exploring ways of partnering with companies in the security and blockchain analysis spaces in order to integrate data that they already have on ransomware actions. Netwalker, one of the most popular ransomware-as-a-service offerings on the dark web, comes in second with more than $6.3 million in payments for 2021, though Ransomwhere’s tally shows that the group has racked up the most ransom payments in total, with roughly $28 million to its name based on the site’s data. Maze, a notorious ransomware group, says it’s shutting downĬD Projekt hit by ransomware attack, refuses to pay ransom Kaseya hack floods hundreds of companies with ransomware Read more on TechCrunchĪre we overestimating the ransomware threat?įujifilm becomes the latest victim of a network-crippling ransomware attack The group has racked up more than $11 million in ransom payments this year, according to Ransomwhere, an amount that could increase dramatically if its recent demands for $70 million as part of the Kaseya attack are met. The bulk of these payments have been made to the REvil, the Russia-linked ransomware gang that took credit for the JBS and Kaseya hacks. “For law enforcement, as we saw with the Colonial Pipeline hack, law enforcement does have the ability to recover some payments, so it would be great if this can further aid their efforts.”Īt the time of writing, the site is tracking a total of more than $32 million in ransom payments for 2021. “As we consider policy proposals to change the state of ransomware economics, we will need data to assess whether these actions are successful," Cable said. #Jack cable stamos group ransomwhere 32m pagetechcrunch downloadThe already-burgeoning database, which doesn’t include any personal or victim-identifying information, is available as a free download for the cybersecurity community and law enforcement officials, which Cable hopes will help give some much-needed public transparency about the current state of the problem. Cybersecurity and Infrastructure Agency (CISA), is looking to solve that problem with the launch of a crowdsourced ransom payments tracking website, Ransomwhere. Jack Cable, a security architect at Krebs Stamos Group who previously worked for the U.S. However, while ransomware attacks continue to make headlines, it’s nearly impossible to understand their full impact, nor is it known whether taking certain decisions - such as paying the cybercriminals’ ransom demands - make a difference. In the last few months alone we’ve witnessed the attack on Colonial Pipeline that forced the company to shut down its systems - and the gasoline supply - to much of the eastern seaboard, the hack on meat supplier JBS that abruptly halted its slaughterhouse operations around the world, and just this month a supply chain attack on IT vendor Kaseya that saw hundreds of downstream victims locked out of their systems. These file-encrypting attacks have continued largely unabated this year, too. Ransomware attacks, fueled by COVID-19 pandemic turbulence, have become a major money earner for cybercriminals, with the number of attacks rising in 2020.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |