Ironically, cybersecurity companies are the organizations most exposed to hacking incidents. Such is the case of Cygilant, a signature dedicated to detecting cybersecurity threats that has been the victim of a ransomware infection. Through a statement, Chief Financial Director Christina Lattuca acknowledged that the firm was aware of a recent encryption malware infection affecting some of the company’s systems.
In the document, the company mentions: “Our Cyber Response and Defense Center has already taken appropriate steps to stop the infection. We are working in conjunction with external specialists and relevant authorities to determine the impact of that attack.”
Nothing is yet known about those responsible for the attack or the ransomware variant used, although some members of the cybersecurity community attribute the incident to NetWalker, a ransomware-as-a-service group that makes its tools and capabilities available to anyone willing to pay the price.
It has become customary that threat actors are not limited to encrypting compromised information, as they now also steal data and publish it on hacking forums, so company executives feared this would be the case. Cygilant’s fears were confirmed soon after, when some screenshots of files and directories of the company’s internal network were posted on a dark web site. At the time of publication the data had been deleted from that forum, although it is ignored whether the company paid the ransom.
Brett Callow, of security firm Emsisoft, claims that these hacking groups usually delete the information exposed after companies pay the ransom, although there are other scenarios: “Sometimes criminals delete this information temporarily in order to negotiate a ransom, so it is not yet possible to confirm whether Cylantgi has already made any payments.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.