The French Ministry of Justice would fall victim to the blackmail program. In any case, this is what youtuber and artificial intelligence engineer Defend Intelligence claims on Twitter with supportive images. According to its sources, the data has been compromised and hackers threaten to publish it on February 10, 2022 if the required ransom is not paid by the authorities.
For many years now, blackmail programs have become weapons of mass destruction by hackers, capable of bringing institutions and businesses to their knees and damaging infrastructure vital to the country’s economy. In France alone, the number of attacks increased by 32% in 2021, according to a study published by the Ministry of the Interior in November 2021.
Ironically, The Ministry of Justice was the victim of a blackmail attack this Thursday, January 27, 2022. We owe this information to youtuber and the artificial intelligence engineer Defend your intelligence, who has just published a the whole chain of this case on Twitter.
As he says on social media, the Ministry of Justice has been the target LockBit ransomware. We also see on the websites of malware operators that the facility is one of the recent targets. The pirates demand payment of ransom as punishment disclosure of information compromised through hacking of the Department of Justice website.
Criminal records published online for lack of payment?
What could be the potential damage of this cyber attack? So far, it is impossible to know the content of the stolen data. As Defend Intelligence suggests, the worst thing would be if confidential information from citizens were disseminated online. We are talking here about criminal records, monitoring, complaints and so on. “Ideally, the leaked information would be public information from lawyers, bailiffs, courts, etc., explains Defend Intelligence.
At the time of writing, CERT, the government’s computer attack monitoring, alerting, and response center, has not issued an official statement on the subject. We will update this article as soon as we receive more information. In any case, it is unclear how the hackers got to the Ministry of Justice website.
LockBit, a reference to tightening programs
As for LockBit ransomware, maybe this name means something to you. This malware has gained popularity among hackers since 2019. Its operation is still simple: you access and conceal access to information to make it unusable. Next, demand the payment of a ransom (often in cryptocurrencies) to get back the pleasure. Very quickly, this blackmail program was used massively against large corporations and governments.
Since then, this blackmail program, like many others, has evolved into one allows hackers to gather informationin addition to encrypting access. In fact, attackers can threaten their targets by releasing recovered sensitive information online. Again, one reason encourages them to get to know each other.
Read also: Ransomware hackers are ruthless in forcing victims to pay more
Ransomware harms businesses and the government
In the most recent examples, we recall a blackmail program launched by a Russian DarkSide hacker group that paralyzed one of the most important oil pipelines in the United States. A cyber attack that caused the government to declare a state of emergency and consider blackmail attacks as terrorism.
Shortly after this incident, the United States pledged $ 10 million in all information that would lead to the arrest of members of the DarkSide group. As for the attack on Kaseya, it has established itself as the largest cyber attack in history. more than $ 70 million in ransom as Bitcoin. Until recently, the French arms group Thalès was the target of blackmail programs. In the absence of payment, the data leaked, but the company minimizes the impact of the attack.