[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Utopian Visionaries Who Won’t Leave People Alone

No - no - no Ain'T going To get away with iT

Pete Buttplug's Butt Plugger Trying to Turn Kids into Faggots

Mark Levin: I'm sick and tired of these attacks

Questioning the Big Bang

James Webb Data Contradicts the Big Bang

Pssst! Don't tell the creationists, but scientists don't have a clue how life began

A fine romance: how humans and chimps just couldn't let go

Early humans had sex with chimps

O’Keefe dons bulletproof vest to extract undercover journalist from NGO camp.

Biblical Contradictions (Alleged)

Catholic Church Praising Lucifer

Raising the Knife

One Of The HARDEST Videos I Had To Make..

Houthi rebels' attack severely damages a Belize-flagged ship in key strait leading to the Red Sea (British Ship)

Chinese Illegal Alien. I'm here for the moneuy

Red Tides Plague Gulf Beaches

Tucker Carlson calls out Nikki Haley, Ben Shapiro, and every other person calling for war:

{Are there 7 Deadly Sins?} I’ve heard people refer to the “7 Deadly Sins,” but I haven’t been able to find that sort of list in Scripture.

Abomination of Desolation | THEORY, BIBLE STUDY

Bible Help

Libertysflame Database Updated

Crush EVERYONE with the Alien Gambit!

Vladimir Putin tells Tucker Carlson US should stop arming Ukraine to end war

Putin hints Moscow and Washington in back-channel talks in revealing Tucker Carlson interview

Trump accuses Fulton County DA Fani Willis of lying in court response to Roman's motion

Mandatory anti-white racism at Disney.

Iceland Volcano Erupts For Third Time In 2 Months, State Of Emergency Declared

Tucker Carlson Interview with Vladamir Putin

How will Ar Mageddon / WW III End?

What on EARTH is going on in Acts 16:11? New Discovery!

2023 Hottest in over 120 Million Years

2024 and beyond in prophecy

Questions

This Speech Just Broke the Internet

This AMAZING Math Formula Will Teach You About God!

The GOSPEL of the ALIENS | Fallen Angels | Giants | Anunnaki

The IMAGE of the BEAST Revealed (REV 13) - WARNING: Not for Everyone

WEF Calls for AI to Replace Voters: ‘Why Do We Need Elections?’

The OCCULT Burger king EXPOSED

PANERA BREAD Antichrist message EXPOSED

The OCCULT Cheesecake Factory EXPOSED

Satanist And Witches Encounter The Cross

History and Beliefs of the Waldensians

Rome’s Persecution of the Bible

Evolutionists, You’ve Been Caught Lying About Fossils

Raw Streets of NYC Migrant Crisis that they don't show on Tv

Meet DarkBERT - AI Model Trained On DARK WEB

[NEW!] Jaw-dropping 666 Discovery Utterly Proves the King James Bible is God's Preserved Word

ALERT!!! THE MOST IMPORTANT INFORMATION WILL SOON BE POSTED HERE


Status: Not Logged In; Sign In

Business
See other Business Articles

Title: FBI Gives Hollywood Hacking Victims Surprising Advice: "Pay the Ransom"
Source: The Hollywood Reporter
URL Source: http://www.hollywoodreporter.com/ne ... sing-advice-pay-ransom-1001515
Published: May 12, 2017
Author: Tatiana Siegel
Post Date: 2017-05-12 13:29:08 by cranky
Keywords: None
Views: 2448
Comments: 8

Netflix isn't alone: Agencies and others are balancing demands for money against the fears of stolen data ending up online.

Phones are the lifeblood of a talent agency like UTA, but on April 11, its IT department discovered an intruder lurking in the voicemail system and computer network and quickly decided to shut them down, sending agents to conduct business on their iPads. Soon thereafter a demand from a hacker arrived: Pay a ransom or watch the agency's most confidential data get posted online.

It turns out UTA was lucky — an outside cybersecurity firm was brought in and, after conducting a forensic analysis, determined that nothing valuable had been pilfered. But the episode was one of at least a half-dozen extortion attempts against Hollywood firms over the past six months alone, say sources in the cybersecurity industry. Mirroring the audacity of the famed Bling Ring, the recent spate of strikes has left executives throughout the entertainment industry on edge, fearing that they — and all of their emails, contracts, celebrity addresses, banking information and salaries — might be the next Sony or Netflix, which saw 10 episodes of the upcoming season of Orange Is the New Black posted to The Pirate Bay six weeks ahead of the series' June 9 launch.

Others targeted with extortion plots include ICM and WME, the latter more significantly. Says USC cybercrime expert Michael Orosz: "A hacker breaks in through various means, steals data and then holds the company over the barrel. This is becoming more and more common because it's easy to do. It's basically low-hanging fruit."

The frequency of the attacks has overwhelmed the FBI's Los Angeles field office, which has been unable to properly investigate all of them. The FBI's surprising advice, according to industry sources: Pay the ransom. After all, the hackers aren't asking much more than a Cannes hotel tab. In all of the Hollywood extortion cases, the hackers demanded less than $80,000. A law enforcement source says that in California, losses would need to exceed $50,000 for the U.S. Attorney's office to prosecute, thus keeping the FBI from pursuing most of these cases.

But an FBI spokesperson in the L.A. office denied that the agency is telling companies to cough up the bitcoins in cases of ransomware. "The FBI does not encourage payment of ransom as it keeps the criminals in business," says Laura Eimiller. "Of course, the individual victim must weigh their options."

"If your system is wiped and you didn't pay, then there's no way to recover it and you basically shut down your entire business, so the FBI will say it's easier to pay it than it is to try to fight to get it back," says Hemanshu Nigam, a former federal prosecutor of online crime in L.A. and onetime chief security officer for News Corp. "And if one company pays the ransom, the entire hacking community knows about it."

So far, at least one Hollywood company has paid the ransom, according to a source. Others are waiting to see if anything valuable was taken, something not evident unless a victim runs a forensic analysis, which typically costs far more than the ransom demand.

Netflix recently learned the consequences of not paying. Sometime in late 2016, a hacker collective known as TheDarkOverlord breached the network of postproduction facility Larson Studios and made off with a trove of unaired shows including Orange Is the New Black, CBS' NCIS: Los Angeles, Fox's New Girl and IFC's Portlandia. It wasn't until late January that the FBI began to contact the affected parties, which also included ABC, NBC, FX, National Geographic, E!, Disney Channel and Lifetime, to let them know the agency was investigating a possible hack and that their property may have been stolen. But more than a month passed without incident, eliciting relief from the networks. Then, in March, TheDarkOverlord made its first overture to the victims, demanding a ransom of 50 bitcoin (roughly $60,000) by an April 30 deadline or else the content would be released.

Netflix never responded to TheDarkOverlord, and two days before the deadline, the hackers posted on Twitter, "To those of you carefully watching this feed, allow the events that are but mere moments away to influence your choises [sic]." Twenty minutes later, the account tweeted a link to download the first episode of season five of Orange Is the New Black on Pirate Bay.

THR has been in contact with TheDarkOverlord, who said more content will be released because none of the affected parties has paid the ransom. "We're motivated by our desire to acquire internet money," TheDarkOverlord told THR via an encrypted conversation in a private chat room. "Contrary to what others have declared, we're motivated only by the benefit of financial gain." The group would not say whether it had infiltrated other Hollywood entities.

Although more than two years have passed since the epic Sony hack, the phenomenon appears to be alive and well in Hollywood, albeit barely reported. TheDarkOverlord hit might be the first breach since Sony to generate headlines, but that doesn't mean the problem is rare or insignificant. One source, who declined to be named because it would violate a confidentiality agreement, called hacking one of the biggest threats facing the industry.

That's partly because few appreciate the scope of the problem. After all, Hollywood is an interconnected ecosystem, where valuable and confidential data is uploaded or shared with partners at a wide variety of organizations that in turn have varying degrees of security, says Orosz. A studio may have a solid firewall, but what about the management company it negotiates deals with, or the law firm or the publicity outfit? Last year, a hacker posing as an Interscope executive convinced a record label and management company to send copies of Lady Gaga's master audio files, according to The New York Times. (Lady Gaga's reps did not respond to a request for comment.)

Netflix probably has the resources and in-house expertise to thwart a network intruder, but few third-party vendors can match the tech brawn of a multibillion-dollar corporate giant. "Part of being data-security responsible is understanding that there's a supply chain," explains Orosz, "and everybody collectively needs to do their part to ensure that they are not the weakest link."

Privately, many of the networks victimized by TheDarkOverlord hack were quick to point fingers at Larson Studios, a postproduction facility widely used by television shows. In its only public statement on the matter, Netflix deflected blame to Larson: "A production vendor used by several major TV studios had its security compromised, and the appropriate law enforcement authorities are involved."

Experts say UTA handled its attack correctly, moving swiftly to contain the threat by getting everyone off their devices to prevent the malware from spreading. "To me, it's the first time that I actually saw an amazingly positive sign that these agencies are realizing the risks of cyberattacks in how badly it can hit their bottom line and their reputation," says Nigam. "Watching what UTA did was something that people should pay a lot of attention to in terms of this is a good example of how you respond to an attack."

The fact is, the next major breach likely has already occurred. Often the first time a company learns it has been hacked is with the arrival of a ransom note, and that can be long after its data is stolen. Hackers, typically located in foreign countries, are constantly sweeping for data, and it may take weeks or months for them to examine a cache and realize what they have.

TheDarkOverlord sees itself as a professional venture, not unlike the Hollywood companies it is trying to extort. "We're a professional business entity, and we behave as such," TheDarkOverlord told THR. "We're in this racket to create mutually beneficial long-term business relationships. A majority of our clients find our services very beneficial."

The group didn't clarify what it means by "clients," but it seems to imply that it offered investors a black market opportunity to share the profits from its extortion plots. A Times report linked the group to extortion against entities including an investment bank, a glue manufacturer, health care providers and a cancer charity.

But there are a lot of people out there who are especially interested in messing with Hollywood. At Sundance in January, hackers launched a DDoS attack that shut down the box office. Around the same time, a separate but likely related attack is believed to have disrupted Wi-Fi service for nearly all of Park City's Main Street businesses, bringing many festival events to a standstill. The FBI never confirmed whether it was investigating, telling THR that it had no update beyond that it was reviewing the incident.

"Technology continues to march at an unrelenting pace, and things are becoming much more sophisticated. What has resulted is we humans start to lose track of the environment that we are all interfacing with," says Orosz. "Hollywood is fast-paced, but no matter how fast or critical your timelines, part of that responsibility is taking care of your data security. So far, it doesn't appear to be costing business too much, but it will."

Click for Full Text!

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 6.

#1. To: cranky (#0)

Others targeted with extortion plots include ICM and WME, the latter more significantly. Says USC cybercrime expert Michael Orosz: "A hacker breaks in through various means, steals data and then holds the company over the barrel. This is becoming more and more common because it's easy to do. It's basically low-hanging fruit."

This is falling off a log stoopid. ANY company with confidential client data or valuable data like a unseen season of a popular show on file is a fool if it is on file on any computer with a modem.

If your computer has no modem,there is no way it can be hacked into by outside sources.

I have a friend with a small auto repair shop,and even he keeps all his receipts,work files,and finances related to his business on a small computer he bought to use SOLELY for storing that information securely. It has never been hooked to a phone line since he took it out of the box new,and it will never be connected to a phone line as long as he owns it. He backs up the data every month on a portable hard drive,and stores that separetely.

He had grief with the IRS a number of years ago and because of inadequate records he had to pay fines on projected income he hadn't earned,and that will never happen to him again.

sneakypete  posted on  2017-05-12   14:30:15 ET  Reply   Untrace   Trace   Private Reply  


#2. To: sneakypete (#1)

If your computer has no modem,there is no way it can be hacked into by outside sources.

Not really.

It was done by the commies back in the late sixties/early seventies when they 'broke into' (as we said back then) a dod ibm 360 mainframe (a 360/60, iirc) by renting a room in an office building facing the side of the pentagon where the cpc was. Then they aimed a device capable of picking up the blocks of bits and bytes that were flowing down the fifty-eight pair bus and tag type channel cables.

The solution was to lead line the walls of the pentagon, I was told.

An israeli ibm computer was broken into back in the sixties by someone who somehow managed to get a tape jockey in the data center to mount a 3420 tape.

In the ibm operating systems I'm familiar with, there are three ways to get work into the system: the mount command, the logon command and the start command, none of which need any network connectivity and all should be tightly controlled by a security system (racf, top secret or acf2, when last I heard).

cranky  posted on  2017-05-12   15:17:55 ET  Reply   Untrace   Trace   Private Reply  


#4. To: cranky (#2)

I am sure all that is true,but all of it required efforts nobody is going to make to get into your home computer to steal your passwords. Especially if the home computer is shut down and password protected by a strong password.

In short,anyone who doesn't keep their financial records and other sensitive data on a device that has no connectivity with any other electronic device that broadcasts or receives electronic signals is a fool.

I still have a hard time believing all these people I see with smart phones making cash transfers using their phones with no more security than the tiny anti-software programs designed for cell phones.

sneakypete  posted on  2017-05-12   16:53:08 ET  Reply   Untrace   Trace   Private Reply  


#6. To: sneakypete (#4)

Especially if the home computer is shut down and password protected by a strong password.

That's a good start.

But at the very least, I'd encrypt my hard drive(s) and i don't keep any user data on the c drive.

cranky  posted on  2017-05-12   20:48:59 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 6.

#7. To: cranky (#6)

But at the very least, I'd encrypt my hard drive(s) and i don't keep any user data on the c drive.

Smart move. If you have business information or something else that critical and sensitive you may want to put it on removable hard drives and then lock them in a safe.

All I have on mine is stuff that isn't worth anyone's time,so I'm satisfied with my security.

sneakypete  posted on  2017-05-13 10:37:19 ET  Reply   Untrace   Trace   Private Reply  


End Trace Mode for Comment # 6.

TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com