Friday, November 15, 2024
HomeCyber Security NewsA Ransomware Gang Claims to Have Hacked the Security Camera Company Amazon...

A Ransomware Gang Claims to Have Hacked the Security Camera Company Amazon Ring

Published on

There has been a recent cyber attack on Amazon’s popular security camera company, Ring, which was attributed to a ransomware group ALPHV that uses the BlackCat malware

This group has now claimed responsibility for the attack and is now threatening to leak the data from the company.

There are at least two thousand police departments around the country that have partnered with Amazon to make sharing footage with law enforcement as easy as possible for their users.

- Advertisement - SIEM as a Service

It is no secret that the cameras and the footage they take, often posted online, have become so popular. In response, Amazon launched a television show called “Ring Nation,” which is a variety show around Ring cameras that includes mostly bloopers recorded by the cameras.

It is important to note that after the news of the data breach broke out, in a statement issued to Motherboard, Ring said it did not have evidence that any of its systems had been compromised but that a third-party vendor had been infected with ransomware.

A Ransomware Gang Claims to Have Hacked Ring

As part of the attack, ALPHV raised the alarm, saying that its malware, BlackCat, had been used to carry out the attack. Affiliate groups of victims who refuse to pay the ransom have access to a searchable database created by the BlackCat malware authors.

ALPHV has a dedicated “leak site,” as do many other groups of this kind, where its members selectively release data they have stolen during an attack. This week, ALPHV posted a message on its page for Ring that states:- 

“There’s always the option to let us leak your data…” 

But after the post, the threat actors have not posted anything about it.

No Customer Data Has Been Affected

The fact that companies initially deny that a hack has compromised customer data is not uncommon, but in reality, the data has been compromised due to a security breach.

A privacy and security practice of Ring has drawn controversy in the past since third parties are used to collect and share information about its users and its own privacy practices.

Although Ring claims that it prioritizes the security and privacy of its customers, we have seen numerous instances where these claims have failed to live up to the claims and have resulted in harming the customers and community members who use Ring.

As of now, Ring has not confirmed whether or not the hackers were able to access any of its users’ data, so there is not yet any guidance for Ring users on how to deal with the situation.

Almost all Ring doorbells and security cameras are compatible with E2EE (end-to-end) encryption, which is available in most regions. Therefore, neither any government entity, hackers, nor even its parent company, Amazon, will be able to access the footage that has been uploaded.

Network Security Checklist – Download Free E-Book

Related Read

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...

Black Basta Ransomware Leveraging Social Engineering For Malware Deployment

Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Chinese SilkSpecter Hackers Attacking Black Friday Shoppers

SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce...

Cybercriminals Launch SEO Poisoning Attack to Lure Shoppers to Fake Online Stores

The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to...