Grief ransomware operators claim to have compromised computer systems at US National Rifle Association (NRA) and added it to their leak site.
Grief ransomware operators announced to have hacked US National Rifle Association (NRA) and threaten to leak the stolen data.
The NRA was added to the list of compromised organizations on the leak site of the group, that gang also published a set of documents as proof of the hack. The analysis of the sample doesn’t allow to determine whether the gang breached the organization or one of its branches.
Researchers link the Grief ransomware to the DoppelPaymer operations that is considered part of the Evil Corp.
Evil Corp has recently launched a new ransomware called Macaw Locker to evade US sanctions that prevent victims from making ransom payments.
The Evil Corp cybercrime group (aka the Dridex gang Indrik Spider, the Dridex gang, and TA505) has been active in cybercrime activities since 2007. The group started its operations by developing and distributing the infamous Dridex banking Trojan, then it switched to ransomware operation by infecting victims’ computer networks with the BitPaymer ransomware.
In 2019, the U.S. Department of Justice (DoJ) has charged Russian citizens Maksim V. (32) and Igor Turashev (38) for distributing the infamous Dridex banking Trojan, and for their involvement in international bank fraud and computer hacking schemes.
The US Government announced sanctions for ransomware negotiation firms that will support victims of the Evil Corp group in the ransom payments.
Due to these sanctions, Evil Corp launched several ransomware operations that employed different strains of ransomware, such as WastedLocker, Hades, Phoenix Locker, and PayloadBin.
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, NRA)
The post Grief ransomware gang hit US National Rifle Association (NRA) appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.