Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

ION Group Paid the Ransom, Claim Hackers Responsible for Disruptive Breach

Share

The hackers who claimed responsibility for a disruptive breach at financial data firm ION say a ransom has been paid, although they declined to say how much it was or offer any evidence that the money had been handed over. 

ION Group declined to comment on the statement. Lockbit communicated the claim to Reuters via its online chat account on Friday but declined to clarify who had paid the money — saying it had come from a “very rich unknown philanthropist.”

The Lockbit representative said there was “no way” it would offer further details.

The FBI did not immediately reply to a request for comment. Britain’s National Cyber Security Agency, part of Britain’s GCHQ eavesdropping intelligence agency, told Reuters it had no comment.

The ransomware outbreak that erupted at ION on Tuesday has disrupted trading and clearing of exchange-traded financial derivatives, causing problems for scores of brokers, sources familiar with the matter told Reuters this week.

Among the many ION clients whose operations were likely to have been affected were ABN Amro Clearing and Intesa Sanpaolo, Italy’s biggest bank, according to messages to clients from both banks that were seen by Reuters.

ABN told clients on Wednesday that due to “technical disruption” from ION, some applications were unavailable and were expected to remain so for a “number of days.”

It was not clear whether paying the ransom would necessarily speed the clean-up effort. Ransomware works by encrypting vital company data and extorting the victims for payoffs in exchange for the decryption keys. But even if hackers hand over the keys, it can still take days, weeks or longer to undo the damage to a company’s digital infrastructure.

There were already signs that Lockbit had reached some kind of an agreement over ION’s data. The company’s name was removed earlier Friday from Lockbit’s extortion website, where victim companies are named and shamed in a bid to force a payout. Experts say that is often a sign that a ransom has been delivered.

“When a victim is delisted, it most commonly means either that the victim has agreed to enter negotiations or that it has paid,” said ransomware expert Brett Callow of New Zealand-based cybersecurity company Emsisoft.

Callow said there was an outside chance that there was some other explanation for Lockbit publicly backing off.

“It may mean that ransomware gang got cold feet or decided not to proceed with the extortion for other reasons,” he said.

Ransomware has emerged as one of the internet’s most expensive and disruptive scourges. As of late Friday, Lockbit’s extortion website alone counted 54 victims who were being shaken down, including a television station in California, a school in Brooklyn and a city in Michigan.

© Thomson Reuters 2023


Affiliate links may be automatically generated – see our ethics statement for details.