{"id":41952,"date":"2023-10-10T10:22:06","date_gmt":"2023-10-10T14:22:06","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=41952"},"modified":"2023-10-11T08:43:24","modified_gmt":"2023-10-11T12:43:24","slug":"lockbit-threatens-to-leak-cdw-data-after-failed-negotiations","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/lockbit-threatens-to-leak-cdw-data-after-failed-negotiations\/","title":{"rendered":"LockBit threatens to leak CDW data after failed negotiations"},"content":{"rendered":"<p data-ar-index=\"1\">CDW, a $20 billion IT reseller, has refused to pay LockBit&#8217;s ransom demands, prompting the cybercrime gang to threaten to leak the company&#8217;s stolen data.<\/p>\n<p data-ar-index=\"2\">LockBit spokesperson LockBitSupp told The Register that the company offered a &#8220;ridiculous&#8221; amount of money, which &#8220;insulted the crooks.&#8221;<\/p>\n<p data-ar-index=\"3\">&#8220;As soon as the timer runs out you will be able to see all the information,&#8221; LockBitSupp said. &#8220;The negotiations are over and are no longer in progress.&#8221;<\/p>\n<p data-ar-index=\"4\">The countdown timer on LockBit&#8217;s victim blog shows that CDW&#8217;s data is scheduled to be published on October 11. CDW has not yet commented on the incident, which appears to have been ongoing since at least September 3.<\/p>\n<p data-ar-index=\"5\">Cybersecurity experts warn that ransomware groups are ramping up their tactics in forcing victims to pay quickly. They say that posting a company to a victim blog multiple times is a known aggressive tactic adopted by ransomware groups to hurry negotiations.<\/p>\n<p data-ar-index=\"6\">The U.K. National Cyber Security Centre (NCSC) has a longstanding stance against paying ransoms to cybercriminals, citing research that shows less than half of businesses paying ransoms recover all of their data.<\/p>\n<p data-ar-index=\"7\">Experts also note that LockBit has a history of using pressure tactics and engaging in strange behavior. For example, the group has been accused of orchestrating &#8220;fake&#8221; ransomware attacks and posting false information on its website.**<\/p>\n<p data-ar-index=\"8\">It is unclear what data LockBit stole from CDW or how the group breached the company&#8217;s network. However, experts say that the leak, if it occurs, could have a significant impact on CDW&#8217;s customers and partners.<\/p>\n<p data-ar-index=\"9\">The sources for this piece include an article in <a href=\"https:\/\/www.theregister.com\/2023\/10\/06\/cdw_lockbit_negotiations\/\" target=\"_blank\" rel=\"noopener\">TheRegister<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CDW, a $20 billion IT reseller, has refused to pay LockBit&#8217;s ransom demands, prompting the cybercrime gang to threaten to leak the company&#8217;s stolen data. LockBit spokesperson LockBitSupp told The Register that the company offered a &#8220;ridiculous&#8221; amount of money, which &#8220;insulted the crooks.&#8221; &#8220;As soon as the timer runs out you will be able [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[349,16],"tags":[388],"class_list":["post-41952","post","type-post","status-publish","format-standard","hentry","category-development","category-security","tag-privacy-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/41952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=41952"}],"version-history":[{"count":2,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/41952\/revisions"}],"predecessor-version":[{"id":41954,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/41952\/revisions\/41954"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=41952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=41952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=41952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}