TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hackers extorted $1.14M from UCSF

247 pointsby Pick-A-Hill2019over 4 years ago

29 comments

abeppuover 4 years ago
This article makes the point that law enforcement agencies take the stance that paying a ransom further encourages this behavior from hackers.<p>In the case of state or public institutions like this, would it be advisable for legislatures to make it illegal for state entities to pay ransoms, and then very publicly announce these laws? I.e. can&#x2F;should we make credible, public commitments in advance to not pay ransom, or to remove that choice from the organization-level administrators? Would this make these organizations less appealing targets?<p>&quot;Sorry, we are not authorized to pay you any ransom due to SB-XYZ. If you can get several hundred thousand signatures from CA residents to petition for a referendum to overturn this law, we may be able to pay you a ransom after ... well not the upcoming election but maybe the one after that.&quot;
评论 #24861910 未加载
评论 #24860388 未加载
评论 #24862014 未加载
评论 #24861382 未加载
评论 #24860531 未加载
评论 #24861230 未加载
评论 #24863950 未加载
评论 #24861563 未加载
评论 #24864615 未加载
评论 #24864734 未加载
评论 #24863181 未加载
评论 #24861609 未加载
评论 #24861436 未加载
评论 #24860929 未加载
评论 #24870137 未加载
评论 #24860592 未加载
评论 #24865161 未加载
coderintheryeover 4 years ago
Previous discussion here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23659590" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=23659590</a><p>And discussion from years back when they outsourced all of their IT: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12870150" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12870150</a>
ttulover 4 years ago
Email your congressman&#x2F;woman: Paying extortion fees cybercriminals should be illegal - and severely so. With the stroke of a pen, a law making the practice illegal would immediately allow every institution and corporation in America to say, &quot;We cannot pay your fee no matter how hard you press us, as we would face jail time if we did so.&quot;<p>Would gangs still try to extort people? Of course. But large institutions would no longer be a target, because their internal controls would prevent the payment of extortion fees. Small organizations might still pay fees, but the potential take for gangs would be reduced remarkably.
评论 #24861138 未加载
评论 #24861370 未加载
评论 #24863457 未加载
评论 #24861130 未加载
评论 #24865991 未加载
jrochkind1over 4 years ago
&gt; And an anonymous tip-off enabled BBC News to follow the ransom negotiations in a live chat on the dark web.<p>So, that &quot;anonymous tip-off&quot; was obviously from the hackers, right? I guess the other option is a &quot;whistleblower&quot; at UCSF (would anyone else know about it?), but the hackers have a lot to benefit from everyone knowing about it, so next victim thinks &quot;Gee, respected institutions like UCSF are willing to pay the ransom and didn&#x27;t have the capability to recover otherwise, we should probably just pay the ransom too&quot;.
评论 #24860203 未加载
评论 #24860491 未加载
评论 #24860092 未加载
TacticalCoderover 4 years ago
So the bad guys used a public ledger (Bitcoin) to get paid? Why aren&#x27;t the hackers asking for cryptocurrencies using zero-knowledge proofs like ZCash or Monero? Bitcoin? What&#x27;s their plan next?<p>I&#x27;m not saying you can&#x27;t get away with this (there are coin &quot;mixers&quot; and decentralized exchanges) but still, this leaves lots of traces left and right.<p>For example we saw a lot of people getting busted recently while they thought they were smart using cryptocurrencies, including a money launderer ring... And they were using mixers, decentralized exchanges, people located overal several countries&#x2F;continents and whatnots if I recall correctly. Yet: all busted.<p>For all we known in six months the headline could be: &quot;Hackers who extorted 1.14M USD from UCSF arrested by Interpol&quot;<p>Besides that: what happened to offline backups? How exactly are hackers coming for cloned, unplugged, HDDs&#x2F;SSDs stored on shelves &#x2F; bank safes? (I know several companies doing just that as offline backups)<p>I hope this serves as a wake up call to companies&#x2F;institutions either not doing backup properly or outsourcing to incompetent companies not doing backups properly (the latter being not really excusable).
评论 #24864831 未加载
评论 #24863280 未加载
评论 #24866392 未加载
stygiansonicover 4 years ago
Seems like randomware negotiation has become a professional service. See: <a href="https:&#x2F;&#x2F;www.prnewswire.com&#x2F;news-releases&#x2F;groupsense-launches-ransomware-negotiation-services-301139570.html" rel="nofollow">https:&#x2F;&#x2F;www.prnewswire.com&#x2F;news-releases&#x2F;groupsense-launches...</a><p>The negotiations here were similar to the ones CWT had, albeit a little less courteous: <a href="https:&#x2F;&#x2F;www.reuters.com&#x2F;article&#x2F;us-cyber-cwt-ransom&#x2F;payment-sent-travel-giant-cwt-pays-4-5-million-ransom-to-cyber-criminals-idUSKCN24W25W" rel="nofollow">https:&#x2F;&#x2F;www.reuters.com&#x2F;article&#x2F;us-cyber-cwt-ransom&#x2F;payment-...</a>
VectorLockover 4 years ago
US Treasury announced recently &quot;Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments.&quot;<p>I wonder if these will reduce these kind of payments in the future, which seemed to really be ramping up.<p><a href="https:&#x2F;&#x2F;home.treasury.gov&#x2F;system&#x2F;files&#x2F;126&#x2F;ofac_ransomware_advisory_10012020_1.pdf" rel="nofollow">https:&#x2F;&#x2F;home.treasury.gov&#x2F;system&#x2F;files&#x2F;126&#x2F;ofac_ransomware_a...</a>
brongondwanaover 4 years ago
Filesystems that make this possible are the real crime against sanity. Most of the data would be stored on network shares, and the ransomware pulls the files, encrypts them, stores them back to the network share overwriting the original copy. Madness. Yes disk space isn&#x27;t cheap, until you see the alternative.<p>We have a basic network filestore at Fastmail, it&#x27;s not even a key part of our offering, but it stores up to 30 old copies and if you keep overwriting it does exponential backoff so you have the oldest copy in the past 2 weeks, plus one from a week ago, plus one from 3 days ago, etc up until a bunch of very recent copies. Ransomware would have to be running for 2 weeks to wipe out all the original files - and during that time the massive increase in disk usage would alert operations to something going on!<p>Likewise our email server software does integrity checks during replication between machines and won&#x27;t perma-delete anything for a week after it gets expunged - and message content is immutable after writing, so changing anything is creating a new record and expunging the old one.<p>It costs extra space - but being safe against a client virus like this encrypting all the data on network shares isn&#x27;t rocket science, and the network filesystem vendors who don&#x27;t default to data safety are as much to blame as anybody for this still being a problem in $CURRENT_YEAR.
scott-smith_usover 4 years ago
It really bugs me when I hear of institutions paying these ransoms.<p>Regardless of the damage, I&#x27;d just take the bullet, fix my security, and not pay. Be consistent in this, and keep it up for a while. Long term: no more extortion for anyone.
评论 #24860548 未加载
评论 #24860704 未加载
评论 #24860524 未加载
评论 #24860826 未加载
评论 #24860764 未加载
diebeforei485over 4 years ago
Well, didn&#x27;t they fire tech staff and outsource the work? Sounds like it might not have been the best decision in hindsight.
tmpz22over 4 years ago
So they outsourced all their IT to save money then got randomwared.
naveen99over 4 years ago
Enterprises generally go too far in the direction of restricting data access and copies of data, making themselves more fragile. They should outsource custodianship of data or do like what aws etc do, proper backups and fail tolerance.
SommaRaikkonenover 4 years ago
Hi, I&#x27;m not sure if my comment will be read since there are a lot of them already, but what would the best move be for a medium-sized company in this situation?<p>Hypothetically, the fees won&#x27;t be as astronomical like in UCSF&#x27;s case but the importance of the data being held in ransom will still be the same. Should they take the risk of getting their financial&#x2F;healthcare&#x2F;IT data uploaded to the public if they don&#x27;t pay the fee?
aborsyover 4 years ago
Can’t NSA (or FBI) track down these attackers, or help decrypt the data?<p>At least then it makes a useful service for the public, also clears doubts on its crypto capabilities.
评论 #24863331 未加载
Woodiover 4 years ago
And what about backups ? Is it cheaper to pay ransom then reinstall and copy data ? And then cut off f* internet until some security is in place ??<p>If that ransomware uses something like flash for persistence why not ask some jury to enforce hardware manufacturers to stop enabling worse and worse viruses ? Floppies, cd autoplay, usb, firewire, thunderbolt, 5G networking - everything exploitable right from the factory.
评论 #24862220 未加载
DevX101over 4 years ago
Attacks like this make me think there&#x27;s a real ($1+ billion opportunity) business in making an tech-first insurance company for security incidents.<p>Write insurance policies to major companies. But as a pre-condition for getting under-written you have to submit to periodic security review by legit security pros. Failure to adhere to security recommendations means your policy gets dropped.
评论 #24860879 未加载
评论 #24860850 未加载
评论 #24860916 未加载
silexiaover 4 years ago
Establish a global death penalty for this crime.
spzbover 4 years ago
Story is from June
gowldover 4 years ago
These are acts of war by foreign entities against US citizens, hospitals, and governments. The lack of military response is dumbfounding and unacceptable.<p>The NSA is recording every byte of data crossing our borders, and also much internal traffic, and they are unable or unwilling to track down these perpetrators?
评论 #24860602 未加载
atishay811over 4 years ago
A more capitalist solution to the random ware problem could be ransomware insurance ideally mandated. You get hit and the company pays. But your premium rises the next time and till forever. You can get premium incentives to do audits and update software. Lower premiums show up in the balance sheet as profit and therefore there is immediate incentive to act on security issues. The insurance company has enough incentive to track the victim that some action might get taken.
jeffbeeover 4 years ago
Pretty remarkable that this data was worth at least a million dollars to UCSF, but it apparently wasn&#x27;t worth paying for backups, or hiring IT staff who aren&#x27;t idiots.
评论 #24860235 未加载
评论 #24860291 未加载
评论 #24864316 未加载
评论 #24860166 未加载
fortran77over 4 years ago
Well, they extorted it from Taxpayers. What does UCSF care?
hankchinaskiover 4 years ago
now the question is, did they have an insurance in place? who will be held (legally and financially) accountable for the incident?
tinyhouseover 4 years ago
What a shame the keep paying those hackers.
评论 #24860715 未加载
arcticbullover 4 years ago
I for one love to see Bitcoin getting so much widespread adoption. That&#x27;s the real story here.
naveen99over 4 years ago
Maybe single source of truth has some downsides, like single point of vulnerability.
stevebmarkover 4 years ago
It&#x27;s hard to empathize with a corrupt entity that makes billions a year from swindling students and patients, all while maintaining a non-profit status. Par for the course with universities and large hospitals. Profit focused corruption leads them to not paying a good IT team.
sam1rover 4 years ago
This is from June...
brian_herman__over 4 years ago
I misread this as US CHESS Federation.
评论 #24860912 未加载