Ransom Scam Moves To Webmail; Highlights Risk Of Giving Others Your Data

from the your-money...-or-an-empty-inbox dept

Stories of malicious hackers attacking people with ransomware are pretty common. Basically, they get you to download an app that gives them control of your hard drive and they either lock up your content or threaten to delete it unless you pay. However, it seems that the latest round of attacks is even easier. Rather than getting access to your computer, they’re just getting access to your webmail, deleting all of the messages other than the one demanding ransom, and waiting for you to login. Considering just how much some people rely on email, and their willingness to trust all that email to a single webmail hosted solution, this could present a pretty serious problem for many people. What’s particularly interesting here is that one of the benefits discussed when it comes to webmail or other web-hosted apps is the fact that the content is available from anyone on any machine. However, that same accessibility can work against it as well, because others can more easily access it as well. And, even though it’s accessible anywhere at any time, it may mean that users are even less likely to back it up and have alternate sources to get or use their email system. While some are already working on such solutions, it seems like it’s only going to become more valuable to have ways to backup and secure the data that you’ve trusted to various online service providers so that if their security (or business!) fails, you still have access to your data.


Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Ransom Scam Moves To Webmail; Highlights Risk Of Giving Others Your Data”

Subscribe: RSS Leave a comment
12 Comments
Baal says:

Be a smart user

Here’s an idea for those who rely on web based aps like email. Change your password often and use complex passwords with upper, lower cased letters with numbers and symbols if the site allows it. Doing this on a frequent basis will keep it some what secure, provided you don’t give your information away to people phiishing for it.

Wizard Prang (user link) says:

Re: Be a smart user

Also… do NOT use the same password for everything!

One idea is to use one for low-security sites such as forums, another for medium-security sites such as retailers where no financial info is available, and a high-security password for banks and credit cards.

That way an unscrupulous form operator can’t get into your bank account.

Paul says:

Wha?

Ok, lets say a hacker takes over my gmail account and starts deleting all my emails except for the one demanding ransom. Wouldn’t the logical response be to immediately change my password to prevent further unauthorized usage?
If the ransom is to get back the deleted emails, well if they were important you should have had backups somewhere. If the data in your emails is sensitive and the unauthorized user is threatening to use the information somehow then the damage is already done and shame on you for using webmail for sensitive documents.

misanthropic humanist says:

can't see how this works

This doesn’t add up. There are no webmail servers I know of that allow the option to encrypt existing, received mail in situ.
To do such a thing you would have to have a properly privilaged shell account on the machine in question. At which point you would have
the option to hold everyone on the server to ransom.

The only methods available to someone who “hacked” your account by obtaining the password is possibly to irrevocably delete the mails, which isn’t much of a plan to hold a ransom is it? In other words, it has nothing to do with protecting your passwords and everything to do with the security at the system level which is out of your control.

Nobody who has done this would ever risk “returning to the scene of the crime” to fix the problem (remember, the notion that they would give you a password to restore your data is bogus since that capabiliy does not exist), ergo – you are never going to get your data back anyway and it would be foolish to pay the ransom with that belief.

Leave a Reply to Paul Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...