Ransomware

Ring Denies Falling Victim to Ransomware Attack

Ring says it has no indications it has fallen victim to a ransomware attack after cybergang threatens to publish supposedly stolen data.

Ring says it has no indications it has fallen victim to a ransomware attack after cybergang threatens to publish supposedly stolen data.

In response to a cybercrime group’s claims, home security firm Ring says it has no evidence that it has fallen victim to a ransomware attack.

Founded in 2013 and acquired by Amazon in 2018, Ring started with a smart doorbell and later expanded its portfolio with an alarm system and other smart home security products.

On Monday, the cybergang behind the Alphv ransomware added an entry to their leaks site claiming they breached Ring and threatening to release data supposedly stolen from the company.

The entry does not provide details on the amount or type of data that might have been compromised.

“There’s always an option to let us leak your data,” the entry reads.

Responding to a SecurityWeek inquiry, Ring denied falling victim to a ransomware attack.

“We currently have no indications that Ring has experienced a ransomware event,” Ring said.

Also tracked as BlackCat and Noberus and written in the Rust programming language, the Alphv ransomware family was first seen in November 2021, but its operators are likely linked to the previously known cybercrime ring behind the Darkside/Blackmatter ransomware.

Advertisement. Scroll to continue reading.

Operating under the ransomware-as-a-service (RaaS) business model, the group typically harvests and exfiltrates data from the infected systems, and then uses it to pressure victims into paying a ransom.

In July 2022, shortly after creating a dedicated leak site to pressure one of their victims, the group created a searchable database so that employees and customers of victim organizations could search for their potentially compromised data.

In some cases, the group was also seen launching distributed denial-of-service (DDoS) attacks against victims, and harassing their customers, employees, and partners, to further pressure them into paying up. The Alphv ransomware operators have breached over 100 organizations to date.

Related: Ransomware Operator Abuses Anti-Cheat Driver to Disable Antiviruses

Related: Watch Sessions: Ransomware Resilience & Recovery Summit

Related: Ransomware Operators Leak Data Allegedly Stolen From City of Oakland

Related Content

Cybercrime

Yaroslav Vasinskyi was sentenced to 13 years and seven months in prison for his alleged role in the REvil ransomware operation.

Data Breaches

UnitedHealth confirms that personal and health information was stolen in a ransomware attack that could cost the company up to $1.6 billion.

Data Breaches

The LockBit ransomware gang leaks data allegedly stolen from government contractor Tyler Technologies.

Ransomware

Akira ransomware has hit over 250 organizations worldwide and received over $42 million in ransom payments.

Cybercrime

Telecom giant Frontier shuts down systems to contain a cyberattack that led to personal information compromise.

Ransomware

Join this one-day virtual summit as we shine the spotlight on the shadowy dynamics of ransomware attacks and how you can best prepare your...

Ransomware

United Nations Development Programme (UNDP) investigating a ransomware attack in which hackers stole sensitive data.

Data Breaches

Cherry Health says the personal information of over 180,000 individuals was stolen in a ransomware attack.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version