Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Apeing Brussels is no way to unlock South Africa’s AI potential

      14 May 2025

      Spar Mobile is South Africa’s latest MVNO

      14 May 2025

      Big changes sweeping through IT distribution: Westcon CEO

      14 May 2025

      Cell C CEO vows to defend MVNO leadership

      14 May 2025

      R10-billion in Post Office bailouts – what the money could have been used for instead

      14 May 2025
    • World

      Microsoft to lay off 3% of workforce in organisation-wide cuts

      14 May 2025

      AI-voiced audiobooks are coming to Audible

      13 May 2025

      Apple turns to AI to tackle iPhone battery woes

      13 May 2025

      Vodafone CFO to step down

      7 May 2025

      Lights, camera, tariffs: Trump declares war on foreign flicks

      5 May 2025
    • In-depth

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025

      Social media’s Big Tobacco moment is coming

      13 April 2025

      This is Europe’s shot to emerge from Silicon Valley’s shadow

      10 April 2025

      Microsoft turns 50

      4 April 2025
    • TCS

      Meet the CIO | Schalk Visser on Cell C’s big tech pivot

      13 May 2025

      TCS | Kiaan Pillay on fintech start-up Stitch and its R1-billion funding round

      7 May 2025

      TCS+ | Switchcom and Huawei eKit: networking made easy for SMEs

      6 May 2025

      TCS | How Covid sparked a corporate tug-of-war over Adapt IT

      30 April 2025

      TCS+ | Inside MTN’s big brand overhaul

      11 April 2025
    • Opinion

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025

      ICT distributors must embrace innovation or risk irrelevance

      9 April 2025

      South Africa unprepared for deepfake chaos

      3 April 2025

      Google: South African media plan threatens investment

      3 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Ihab Moawad » Data kidnapping the latest cyber threat

    Data kidnapping the latest cyber threat

    By Ihab Moawad20 August 2015
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Ihab-Moawad-180In April, Trend Micro released a research paper about sextortion, the means through which cybercriminals obtain compromising personal images or videos of Internet users, which they then hold hostage until their demands have been met. Fast-forward to July and we have seen the hack of controversial adultery/dating site Ashley Madison, in which cybercriminals wreaked havoc as they threatened to slowly leak the data of the adulterers using the site, until it and its companion site, Established Men, were shut down.

    An article in Time calls this tactic “Hacking 2.0” — this new hacking method is not about the data, but the context. Making money from stolen data, like credit cards, is a lot of work and cybercriminals have latched onto the fact that they have a larger pay cheque to gain from those that stand to lose more than just money. Hence, a hack like Ashley Madison’s, which could — and has — destroyed reputations and families, is a gold mine for the team responsible for the hack, The Impact Team.

    Moral opinions about Ashley Madison aside, no one appreciates their personal information being kidnapped and held for ransom. But cybercriminals are cunning and they know that if they keep the sums low enough, people that stand to lose more than money would rather pay up. In this case, the Ashley Madison hackers offered users the ultimatum of paying US$19 to have all their information wiped off the site or having it leaked. But there is of course, no guarantee that you can trust a cybercriminal.

    According to Time, there is a new reality that’s making matters worse for corporate security teams. This is that in recent years there has been heavy investment in protecting financial data — spending money to fortify the most valuable data. So, while credit cards may be protected, e-mail servers may have been left in the lurch, but this will slowly change as personal data of different contexts becomes a bargaining chip for cybercriminals.

    Ashley Madison
    Ashley Madison

    Ashley Madison is just one example of an enterprise that has been targeted in this manner. Another example is the malware Cryptolocker, which forced victims to pay a sum to unscramble their data. This racket made $27m in just the first two months from small home owners and businesses. And then there was the Sony hack in December 2014, in which cybercriminals stole corporate e-mails and embarrassed the company. In Hacking 2.0, cybercriminals don’t need to steal your money, all they need is any data that is valuable to you.

    This means that executives should be working tirelessly to do an honest assessment about their enterprise’s valuable data really. Then wise investments need to be made in protecting data that might seem inconsequential if stolen in one context, but a disaster if stolen in another. The bottom line? Every company will now have to plan for ransom and extortion scenarios.

    • Ihab Moawad is regional vice-president at Trend Micro


    Ashley Madison Ihab Moawad Trend Micro
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSamsung moves to patch phones quicker
    Next Article Telkom challenges iBurst sale

    Related Posts

    Building cyber resilience to combat modern threats

    2 November 2023

    Interview | Zero Trust: The marathon businesses need to be ready to run

    13 August 2021

    Trend Micro’s Mannie Tzingakis on IT security in a pandemic

    19 August 2020
    Company News

    The art of letting go – how great IT leaders scale by creating focus

    14 May 2025

    Transform your contact centre into a strategic growth driver

    14 May 2025

    The Lesaka story: Shaping the future of financial services in Southern Africa

    14 May 2025
    Opinion

    Solar panic? The truth about SSEG, fines and municipal rules

    14 April 2025

    Data protection must be crypto industry’s top priority

    9 April 2025

    ICT distributors must embrace innovation or risk irrelevance

    9 April 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.