Security

Cyber-crime

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems


The AlphV/BlackCat ransomware group said it plans to "go direct" to the clients of a firm it allegedly attacked to extort them, claiming to have infiltrated the systems of accounting software vendor Tipalti.

BlackCat claims it has had access to Tipalti's systems since September 8 and alleges that since then it has managed to exfiltrate more than 265GB of "confidential" data belonging to the company, its employees, and its clients. Tipalti said it is "thoroughly" investigating the gang's claims.

The criminals believe their chances of getting an extortion payment from Tipalti directly are slim, based on their apparent understanding that Tipalti's cyber insurance policy doesn't cover extortion and – or so it claims – an evaluation of its internal discussions suggesting they would not engage with cybercriminals.

So, instead of applying the varying degrees of extortion tactics on Tipalti, AlphV/BlackCat said it would instead extort the vendor's clients directly, threatening to start with Roblox and streaming platform Twitch.

The gang went on to say if the two clients don't meet its extortion demands, then data will be published slowly, over a period of months, to maximize the damage to the companies' public image.

BlackCat cited Roblox's previous extortion incident from July 2022 as another reason why it publicized the claim of the attack, due to the video game giant allegedly stalling negotiations repeatedly and ultimately refusing to pay on that occasion.

The gang, also known as AlphV, also used the incident to justify its plans to go further down the rabbit hole and extort Roblox's affected stakeholders individually, including the developers for the game's content hub. The gang allegedly has significant confidential data such as tax documents in their possession.

"If you are not prepared to talk figures within two hours of receiving the file lists or samples, we will immediately resort to the strategies we have mentioned earlier," it said. "There is no room to negotiate for these two companies, you either pay or you don't."

In a Tuesday update, AlphV/BlackCat said it has already contacted the first batch of victims, a group of organizations that have had the most amount of data stolen from them.

Dirk Schrader, field CISO EMEA and VP of security research at Netwrix, said the new negotiation tactics on display aren't surprising given AlphV/BlackCat's more recent stunts.

"While AlphV's tactic to try to extort an indirect victim has not been seen before, it is not a surprise," Schrader told The Register. "AlphV has previously shown that it will use all kinds of threats to achieve its main aim – earning money."

Brett Callow, threat analyst at Emsisoft, agreed that the behavior is typical of ransomware groups that continually test the effectiveness of different tactics.

"Like legitimate businesses, cybercriminals constantly experiment and a/b test in order to work out which strategies are the most effective," he said. "Some strategies – like baking cakes or filing SEC complaints – are intended to keep incidents in the headlines as that puts additional pressure on victims. In other words, they try to weaponize the press."

"Organizations – regardless of their size – will have to prepare themselves and their supply chains for this increased pressure," Schrader added. "With the evolvement of a threat, it is not sufficient anymore for organizations to be managing their own attack surfaces, namely data, identities, and infrastructure. A coordinated look at the type of data held by a partner, the accounts and privileges held by a third-party supplier, followed by a conversation about this kind of scenario is the best approach going forward."

In addition to Roblox and Twitch, Tipalti's website lists an array of other high-profile customers, including Discord, Canva, GoDaddy, and Twitter/X. The Register has contacted each but most did not respond.

Tipalti was one of the few to reply, with a spokesperson saying: "Over the past weekend, a ransomware group claimed that they allegedly gained access to confidential information belonging to Tipalti and its customers. Tipalti takes the security of our systems and data very seriously and has strong security protocols and tools in place. We are thoroughly investigating this claim."

Used car dealer Cazoo – also a Tipalti customer – responded saying it would ask questions internally and consider a response. 

X's press email predictably auto-replied with "busy now, please check back later" – what it now sends every reporter since Musk sacked the comms team shortly after the takeover. At least it's not the poop emoji anymore. ®

Send us news
4 Comments

Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media

Also: NXP China attack, Australia can't deliver on ransom payment ban (yet), and Justin Sun's very bad month

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

AlphV lays claims to the intrusion

British Library begins contacting customers as Rhysida leaks data dump

CRM databases were accessed and library users are advised to change passwords

Scores of US credit unions offline after ransomware infects backend cloud outfit

Supply chain attacks: The gift that keeps on giving

Black Basta ransomware operation nets over $100M from victims in less than two years

Assumed Conti offshoot averages 7 figures for each successful attack but may have issues with, er, 'closing deals'

Europol shutters ransomware operation with kingpin arrests

A few low-level stragglers remain on the loose, but biggest fish have been hooked

US readies prison cell for another Russian Trickbot developer

Hunt continues for the other elusive high-ranking members

23andMe responds to breach with new suit-limiting user terms

Also: 'well-known Bay Area tech' firm's laptops stolen and check out some critical vulns

Yet another UK public sector data blab, this time info of pregnant women, cancer patients

NHS Trust admits highly sensitive data left online for nearly three years

Hershey phishes! Crooks snarf chocolate lovers' creds

Stealing Kit Kat maker's data?! Give me a break

EU lawmakers finalize cyber security rules that panicked open source devs

PLUS: Montana TikTok ban ruled unconstitutional; Dollar Tree employee data stolen; critical vulnerabilities

Okta data breach dilemma dwarfs earlier estimates

All customer support users told their info was accessed after analysis oversight