You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

Breaking news and updates daily. Subscribe to our Newsletter
Advertisement

Hackers hacking hackers: Everest ransomware leak site defaced

It seems that hackers aren’t even safe from cyber attacks after the Everest ransomware gang had its site defaced by unknown threat actors.

Hackers hacking hackers: Everest ransomware leak site defaced
expand image

The leak site, which has now been taken down, no longer displayed the group’s claimed leaks and breaches and instead had the message “Don’t do crime CRIME IS BAD xoxo from Prague.”

While senior threat intelligence researcher at Flare, Tammy Harper, has since said the site is back online, the threat actor behind the website defacement has not been identified.

However, Harper said that the threat actor may have taken advantage of Everest’s use of a WordPress template for the site.

“It is worth mentioning that Everest was using a Wordpress template for their blog. I would not be surprised if that was how this happened,” she said on LinkedIn.

Cyber Daily has still been unable to access the Everest ransomware site using the address Harper provided, indicating it may have been taken back down.

Everest ransomware is a Russian-linked group that first emerged in 2020. While it originated as a data-theft-only corporate extortion operation, it soon migrated to ransomware and encryption.

The group was most notably behind the breach of cannabis retail chain Stiiizy, resulting in over 420,000 customers’ data being exfiltrated.

The US government has also attributed breaches of the Brazilian government and the US space agency NASA to Everest.

Back in January, Everest also claimed a cyber attack on Australian applied behavioural science firm Evidn.

The group claimed to have exfiltrated 50 gigabytes of data from the Queensland-based organisation but provided no proof of the breach. However, it did give a two-week ransom payment deadline.

Evidn is based in Queensland’s Fortitude Valley and offers a range of applied behavioural science services, including profiling and analysis, change programs, and skills training. The company’s clients include the Great Barrier Reef Foundation, Wine Australia, and Bundaberg Regional Council here in Australia, as well as the University of Virginia and Princeton University in the United States.

The company also works with Queensland’s state government.

According to the Queensland government’s Department of Housing and Public Works, “Evidn supports the Queensland government’s procurement priority, ‘Delivering for Queensland’ through its engagement with over 1,300 stakeholders over 10 agricultural industries in over 10 Queensland regions alone, designing tailored programs to create positive practice change, drought resilience, sustainable farming and improved industry cohesion.”



Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.