![]() Infact the hackers group Rex Mundi publicly announced that it had stolen customer records of 650,000 French and Belgian fans and demanded a ransom of Euro 30,000 from the world famous pizza chain. ![]() The popular fast food service came under cyber attack in year 2014. ![]() Infact in 2013, hackers had managed access to its database of user details including names, email addresses and encrypted passwords. For Evernote, it was not a first cyber attack. Feedly also issued a statement saying they were working in close association with organisations experiencing similar attacks. The attackers engaged the servers with DDoS attacks so as to prevent users from accessing the service.Īs per a blogpost by Feedly, the hackers demanded money which the company refused to give. In 2014, popular RSS feed service provider Feedly and online notes and web clipping service Evernote reported Distributed Denial of Service attacks. This would somehow explain why Nokia budged to the demand. By 2006 Nokia had shipped around 100 million devices. However, the criminals escaped untouched after a botched up operation by the police who lost track of the criminals after they picked up money.In 2007, Nokia had a share of around 50% in smartphone market across the globe and Symbian was also used by other manufacturers. The report further stated that Nokia paid a multi-million dollar ransom to hackers agreeing to deliver cash to a parking lot but also tipped Finland’s National Bureau of Investigation. ![]() If the source code to Symbian (Nokia’s smartphone operating system) was leaked to public, it would have enabled hackers around the globe to infect millions of smartphones with malware without the fear of detection. Reportedly, the thief had resorted to blackmail, threatening Nokia that if money was not paid he would reveal the key to public. This news was later confirmed by local police who were investigating the case. In this article we bring to you 5 cases of cyber extortion that show the threat is real.Ī Finnish television station MTV reported that in 2007 hackers had stolen source code for part of its smartphone operating system. For them it is a continuous never-ending task just like the climb of Sisyphus, the Greek mythological king of Ephyra. They have to ensure a foolproof security system, even when their is none. The threat of network intrusion by cyber criminals keeps the security experts on their toes all the time. Infact cases have happened wherein a lone-wolf hacker or a group of hackers have barged into the networks of leading organisations, humiliating them and then demanded a ransom against the data stolen.Ĭyber extortion is a reality and it has established itself as a formidable criminal activity in the last decade. Although it is much exaggerated from reality, but it does give a sense of direction the thought process involved in “hacking world” is moving in. They hack into the most secure networks steal the most confidential data on earth and engage in cyber extortion. There criminal but genius intellect can make them rich any given day. There is nothing in the world which can stop these individuals. ![]() Perhaps, we all have seen Hollywood movies in which college dropouts hack into the networks of big organisations including government departments within fraction of seconds and bring them down on their knees. ![]()
0 Comments
Leave a Reply. |