• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Bitcoin • Cryptojacking • Cybersecurity • Ransomware  /  Hackers steal e-commerce databases, demand Bitcoin as ransom.
Ransomware attacks rise on e-commerce servers — Bitcoin expected as ransom.
16 July 2020

Hackers steal e-commerce databases, demand Bitcoin as ransom.

Written by Seqrite
Seqrite
Bitcoin, Cryptojacking, Cybersecurity, Ransomware
Estimated reading time: 2 minutes

E-commerce platforms have always been a favourite target for hackers. The recent months have brought into attention a new campaign by malicious hackers to penetrate insecure servers of e-commerce platforms, steal their databases and then demand Bitcoin to return the stolen data.

Recent reports state that more than 20 databases from e-commerce websites are being offered for sale on a website. Over 1.5 million rows of records are on sale but the amount of data that has been stolen is likely to be higher.

E-commerce databases at major risk!

E-commerce databases are at a higher propensity for being attacked because of the sheer amount of information contained in these data sets. The information is likely to include data such as bank account details, credit card pins and other personal financial data that hackers can sell for substantial sums. These details can be used to cause a further round of damages such as financial frauds. The threat actors are also able to leverage these databases as a ransom to get Bitcoin.

The countries-of-origin of these e-commerce platforms are quite varied. While half the databases were located in Germany, other databases were from Brazil, United States, Italy, India, Spain and Belarus. These websites mostly ran popular e-commerce platforms such as Shopware, JTL-Shop, PrestaShop, OpenCart, Magento V1 and V2.

Once these databases are stolen, the victims receive a ransom note from the perpetrators which state that if the lost databases are to be recovered and to prevent them from being leaked, the victims will have to send a specified amount of Bitcoin on a Bitcoin address. They will have to provide proof of the payment as well on email.

To provide further persuasion, the ransom note warns that if the victims are doubtful whether the attackers are truly in possession of their databases, they can be sent proof. The filenames of the databases are also provided to the victim to make it clear that they possess the databases. The threat ends on a menacing note that if the payment is not received in the next 10 days, the databases will be made public or used for other nefarious means.

What strategy should be followed to combat ransomware?

Investigations also found that some of the wallets owned by the attackers received more than 100 transactions which amounted to a total of 5.8 BTC (approximately USD 53,000). In such a ransomware situation, most enterprises panic and pay the ransom in the hope of getting their data back. However, as we have explained previously, this is not a good strategy as there is no guarantee that, i) the data will be returned safely, ii) there will not be another attack and another ransom demand.

Powered by Artificial Intelligence, Seqrite’s state-of-the-art patented Anti-Ransomware technology is a powerful solution for e-commerce enterprises to detect and block ransomware attacks in real-time. Through a combination of advanced algorithms and behavioural detection techniques, Anti-Ransomware technology can be effective against complex and sophisticated ransomware.

While Seqrite’s Anti-Ransomware technology also backs up important files which are commonly used on endpoints such as Word documents, PowerPoint presentations, it should not be used solely as a backup solution. Enterprises should combine Seqrite’s Anti-Ransomware technology with a complete backup solution to ensure the best protection against ransomware.

 Previous PostSnake Ransomware brings impending doom to enterprise networks
Next Post  Blue Mockingbird’ threat group targets servers in India for Cry...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    April 4, 2021
  • Protect enterprise endpoints against their use for illicit activities

    Defend your business systems from being used for illegal purposes

    March 23, 2021

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form New Spear Phishing Campaign using Army Welfare Education Society’s Scholarship form March 22, 2021
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017
  • Nation-states shoot from somebody else’s shoulder Nation-states shoot from somebody else’s shoulder March 10, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • How to avoid dual attack and vulnerable files with double extension?

    How to avoid dual attack and vulnerable files with double extension?

    April 9, 2021
  • Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    Cryptocurrency Malware: Bitcoin Mining threats you need to know about

    April 4, 2021
  • Zloader: Entailing Different Office Files

    Zloader: Entailing Different Office Files

    March 23, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (10) Bitcoin (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (284) cyber security (26) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (103) Enterprise security (14) EPS (9) Exploit (12) firewall (11) GDPR (10) IoT (10) malware (59) malware attack (23) malware attacks (12) MDM (25) Network security (18) Patch Management (12) phishing (17) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite Workspace
  • Unified Threat Management
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.