@sig_ug For reals, back when the source for one of the first RW was being passed around Alphabay forums (for testing... seriously, it's all logged) there were camps that simply wiped, period, and those who didn't. Short-term quick hitters v long term big payout models, I think. Wish there's data to see which one is more profitable on average, 10 years later.
My guess is that if you can properly ascertain data value, you can make $$$ and the breach won't ever be known. Skids HnR.
jimz@infosec.exchange
@jimz@infosec.exchange
Posts
-
When people keep advising victims not to pay ransom because threat actors can't be trusted to really delete all the data, my inner researcher kicks in and wants to know how often that really happens. -
The way things are these days, you'd hope that immigration law firms would be especially careful to secure clients' files.@PogoWasRight DocketWise? USCIS has a copy of everything there already. All of the non-bespoke immigration law software are for practice-management and form-filling. Those of us who spent all our time interfacing with ICE/BIA/CBP etc treated our job like crim law if we can, in-house IT work done gratis and all. There just aren't many lawyers who codes/homelabs on the side and aren't in IP/in house work, since that's a six figure skillset for mostly five figure salaried work.