'Security Breach - Stolen Data' Email Scam Fishes for Victims

After careful examination, it has been determined that the email in question is a fraudulent extortion letter designed to trick recipients into paying a ransom. The phishing campaign includes two versions of the letter, which use the names of well-known cybercriminals to instill fear and make the threats more convincing.

One version of the email claims to be from a group called Surtr and states that they have accessed 800 GB of important documentation due to a security breach. The letter threatens to expose sensitive HR records, employee records, and personal and medical data of employees unless the recipient pays for the return of the stolen data. The sender demands that the recipient contact them via the provided email address, using only corporate email, to enter a secure chat and negotiate payment.

The other version of the email suggests that the recipient's company has been breached by a group called Midnight, and 600 GB of important data, including HR and employee records and personal and medical data of the employees, has been accessed. The email urges the recipient to inform their managers and emphasizes the severity of the stolen information, the potential consequences for the company and partners, and the strict regulatory laws in America. It also threatens that if the employer does not pay, the cybercriminals will target customers and staff. The email includes an email address for managers to contact the group, promising to provide a comprehensive listing of the stolen files and instructions on what to do next.

In both cases, the email is a scam designed to intimidate and extort money from recipients. Companies and individuals should be aware of such fraudulent schemes and avoid paying any ransom demands. They should report such incidents to the appropriate authorities and take measures to secure their data and prevent security breaches.

Why Do Scammers and Threat Actors Often Use Scare Tactics and Why Should You Not Play Along?

Scammers and threat actors often use scare tactics in their phishing and extortion attempts to create a sense of urgency and fear in the victims. By doing so, they hope to pressure the victim into taking immediate action, such as clicking on a malicious link, providing personal information, or paying a ransom. This is a common tactic because it can be effective in catching the victim off guard and making them more vulnerable to falling for the scam.

However, it's important not to play along with these scare tactics. Responding to the scammer's demands or threats can only make the situation worse. It may encourage the scammer to continue targeting you, or it could lead to the loss of sensitive data, money, or both. Instead, you should immediately report the scam to the relevant authorities, such as your IT department, the police, or the Federal Trade Commission (FTC). It's also essential to educate yourself and your colleagues about the common types of scams and how to spot them, so you can protect yourself and your organization from falling victim to these threats.

April 6, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.