“Front Desk Alert: Ransomware Gang’s Latest Tactics for Extortion”

When a hacker called the company that his gang claimed to breach, he felt the same way that most of us feel when calling the front desk: frustrated. The recording also shows how ransomware gangs are always looking for different ways to intimidate the companies they hack. I’m just trying to help you,” the hacker responds, growing increasingly frustrated. “So is that Dragonforce.com?”The hacker then threatens Beth, saying they will start calling the company’s clients, employees and partners. “Excuse me?” the hacker responds.

When a hacker contacted the company he claimed to have breached, he experienced the same frustration many of us feel when trying to reach a company’s front desk. However, this was not a typical phone call. The hacker, claiming to represent the ransomware gang known as DragonForce, shared the recorded conversation on their dark web site. The purpose? To pressure the company into paying a ransom. But instead, the call exposes a comical yet unsuccessful attempt to intimidate and extort lower-level employees.

In the call, the hacker asks to speak with the “management team.” Instead, two different employees put him on hold until Beth, from HR, answers the call.

Upon dialing HR, the hacker greets Beth with a friendly “Hi, Beth, how are you doing?” However, due to difficulties in hearing, the conversation becomes unclear. Beth informs the hacker that she is unaware of the data breach they are referencing. When the hacker attempts to explain, Beth interrogates, “Now, why would you attack us?”

The hacker responds with frustration, “Is there a reason why you chose us?” showing the gangs’ relentless desire to intimidate and coerce companies they hack.

“No need to interrupt me, OK? I’m just trying to help you,” the hacker replies, growing annoyed.

Beth continually asks for an explanation, to which the hacker threatens that the company has eight hours to negotiate before they release the stolen data. Claiming it will be used for fraudulent activities and terrorism, the hacker warns of the consequences if their demands are not met.

Unfazed, Beth asks for clarification, “So it will be on X?” before questioning whether dragonforce.com, the gang’s website, is where the data will be published.

Growing even more frustrated, the hacker threatens to contact the company’s clients, employees, and partners. They reveal they have already reached out to the media and provided a recording of a previous call with one of Beth’s colleagues, now also accessible on their dark web site.

Beth remains unfazed and even mentions that recording conversations without consent is illegal in Ohio. To which the hacker responds, “Ma’am, I am a hacker. I don’t care about the law.”

In a last-ditch effort, the hacker tries to convince Beth to negotiate, but she remains steadfast, saying, “I would never negotiate with a terrorist or a hacker as you call yourself.” Realizing there is no getting through to Beth, the hacker tries to end the call, but not before Beth asks for a good phone number to call them back.

The hacker responds, “I got no phone number,” and Beth had had enough.

Firmly, she says, “Alright, well then I’m just gonna go ahead and end this phone call now. I think we spent enough time and energy on this.”

“Well, good luck,” Beth ends the call, and the hacker responds with, “Thank you, take care.”

TechCrunch attempted to reach out to the hacked company, but they did not respond for a comment.

Read more on TechCrunch:

  • Use <p> tags for paragraphs
  • Use <blockquote> tags for quotes
  • Use <ul> or <ol> tags for lists
Avatar photo
Max Chen

Max Chen is an AI expert and journalist with a focus on the ethical and societal implications of emerging technologies. He has a background in computer science and is known for his clear and concise writing on complex technical topics. He has also written extensively on the potential risks and benefits of AI, and is a frequent speaker on the subject at industry conferences and events.

Articles: 865

Leave a Reply

Your email address will not be published. Required fields are marked *