Embargo’s Double Extortion Play Bags $34M From US Victims


Enjoyed this article?

Share it with your friends!

EmbargoCyber crime group, has collected more than $ 34 million in Crypto currency from April 2024According to An August 8.

Embargo manages the Ransomware-AS-A-Servis modelwhere he deals with other attack groups using their tools and sharing profits.

The victims included American pharmacies, a memorial hospital and a castle in Georgia and the Weiser Hospital in Idah. Some redemption requirements amounted to as much as $ 1.3 million.

A wallet that is not a guardian: why do you need it right away

Did you know?

Want to be smarter and richer with cryptocurrencies?

Subscribe – every week we are posting new videos of Crypto explanator!

According to the TRM, the embargo Uses a double extortion method. First, it encrypts victims systems. Then it threatens to publish sensitive data unless the payment is made.

In some cases, the group appointed organizations or individuals on its website to increase pressure. Although they may not work as open as groups like Lockbit or Cl0p, its methods are still effective.

TRM -ETHES -A FOUNDER Could be connected to the now unfulfilled Blackcat (Alphav) groupwhich disappeared earlier this year after suspicion of an exit fraud. Both groups use programming language rust, triggering similar websites to leak stolen data and seem to share some cryptocurrency infrastructure.

TRM said Approximately $ 18.8 million in earnings of a group remains in wallets Not related to any known service.

When the embargo transmits money, he often uses multiple wallet addresses, high risk exchange, and even sanctioned platforms. Between May and August, TRM followed About $ 13.5 million moving through various virtual assets providerswith more than a million dollars passing through Cryptex.net.

On August 7, Koi Security reported that the Cyber crime group named Greedybear stole over $ 1 million in the Crypto currency. How? Read the whole story.




Source link

Leave a Reply

Your email address will not be published. Required fields are marked *