Personal Ransomware Exposure

Note: This post is a supplement to the podcast episode with the same title located at https://soundcloud.com/user-98066669/226-personal-ransomware-exposure.

When we think about ransomware victims, I suspect most of us think about companies having their data encrypted and being extorted for Bitcoin payments in order to obtain the decryption tool which will unlock their documents. With more companies possessing proper backups due to the awareness of this criminal activity, we are now seeing ransomware groups focus more on exposure of data instead of decryption. This presents a new problem for all of us. It is now OUR data which is often exposed to the world when companies refuse to pay the ransom.

To be clear, I never support or encourage ransomware payments. However, I do support resistance when companies and government institutions demand our information and then store it insecurely. On my show, I talk a lot about my methods to sanitize my personal information when requested because I know it is likely to appear online due to poor privacy policies or accidental exposure. Let's take a look at some recent ransomware data dumps which are now publicly available and may be leaking YOUR personal details.

Accountants often demand to store copies of IDs and tax forms on your behalf. My account/attorney rolls his eyes when I insist on storage within encrypted containers and transmission only via encrypted email. I believe this is all justified. Clients of a California law firm now have all of their data exposed within a ransomware dump made public last week by a group called "Clop".

This includes tax forms displaying names, DOBs, and SSN, as seen below.

This is the main reason I insist that my attorney either store data within a secure encrypted container or allow me to be responsible for storage of my own docs.

Employers demand tax forms from us to legally pay us, but then store them with the same security as the rest of their daily documents. The following is one of many employee tax forms collected by a nutritional foods company which was hit with ransomware this year by a group called "Clop" which is now publicly available.

This is one of the many reasons I conduct all business in the name of an LLC and only provide EINs issued by the IRS for all transactions.

Universities and colleges demand our personal details and then include them within documents stored insecurely. The following Miami university breached document publicly discloses full name, address, DOB, ethnicity, phone, cell, email, and relatives. I suspect people search websites will soon start including ransomware dumps within their infrastructure.

A Colorado school went further by releasing class schedules and grades after they were hit with ransomware.

Digging into the files further identifies every student's overall GPA which allows the public to now monitor his progress as a student.

I have no secure options for this problem. We have no control over school storage of our data.

All of the forms your doctor or dentist makes you sign are rarely securely stored. The following redacted partial form was released after a dentist office refused to pay a ransom to a group called "Conti" and terabytes of data were exposed online.

This is the reason I always resist signing unnecessary paperwork and scrutinize HIPAA release forms. We cannot refuse everything, but we can minimize our exposure.

The apartment or home you have leased includes numerous contracts. When the property management company, in this case a business in Canada, gets hit with ransomware and ignores the extortion demands, all documents get released publicly.

This is one of many reasons I title any home ownership or lease within the name of a trust or LLC.

Physicians, surgeons, and dentists often capture digital photographs of various conditions. A hospital suffered a ransomware breach by a group called "Vice Society" and did not pay the criminals. As a result, all of their stolen data was published to the internet, including images of their patients' illnesses, including the following redacted image.

This is one reason I SOMETIMES ask doctors to either avoid unnecessary images or delete them after any procedure is complete.

If the images present within the data dump were not enough, a Word file titled "Login and Passwords" is included for access to third party services. I may or may not have confirmed that all of the passwords still work. This is why I never recommend storing passwords locally in an unprotected document, and only recommend locally-stored secure password managers with encrypted data.

Since my company often assists clients with ransomware attacks, I find the chat logs between businesses and the criminals especially valuable. Many of these logs are stored within the victim computers and become part of the data dump through the offender's website. The following is a partial display of a chat between a dermatologist office and the criminals who attacked their network. These can be a great source of education before engaging with ransomware criminals.

Many ransomware data leaks contain full Outlook PST files which include every incoming and outgoing email associated with a specific email address. The following is a partial list of these files, each several gigabytes in size, downloaded from a ransomware publication after a city refused to pay the extortion. The content of these files is incredibly sensitive.

This is why I consider every email I send to be public information. I never send anything I would worry about becoming publicly available. I reserve sensitive conversations for E2EE ephemeral messaging.

The next time a business demands your personal data or a copy of your ID, consider this post. When they ignore your resistance to provide personal details which are not required for the business being conducted, explain your concern through these examples. When your friends and family call you paranoid or difficult for wanting to keep your information private, know that you are not alone. If you would like much more information about the ways I protect the privacy and security of my clients, please check out my book Extreme Privacy.

The Privacy, Security, & OSINT Show – Episode 226

EPISODE 226-Personal Ransomware Exposure

This week I discuss the personal impact of published ransomware data and the OSINT potential for researchers. You might have more to lose than the companies being targeted by criminals, but there might be huge gains if your investigative target is within a leak.

Direct support for this podcast comes from sales of my books, services, and online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

Ransomware Landscape

UPDATES:

None

PERSONAL RANSOMWARE EXPOSURE:

https://inteltechniques.com/blog/2021/07/23/personal-ransomware-exposure/

OSINT:

edteebo2w2bvwewbjb5wgwxksuwqutbg3lk34ln7jpf3obhy4cvkbuqd
site:https://app.hacknotice.com "onion"


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J


DIY Pegasus Spyware Scan

You have probably heard the news that Pegasus, the spyware created by NSO Group, is still potentially infecting targeted fully-patched Android and iOS phones. The new interest in this software comes after a list of over 50,000 phone numbers believed to have been identified as those of people of interest by clients of NSO since 2016 was leaked to several media outlets. The leak itself provides no evidence of any infection or compromise, but that shouldn't stop websites from panic-brokering in order to sell ad clicks. One of the main announcements came from The Guardian, which delivers 22 trackers to your browser if you want to read their version of the story.

I highly doubt you have Pegasus on your device, but countless people have been asking me about ways to scan for potential infection. The following could be executed on a Mac computer to check an iPhone.

Make sure you have Brew installed. If you do not, execute the following within Terminal:

/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"

After you have Brew installed, execute the following commands within Terminal.

brew install python3
brew install python3 libusb
pip3 install mvt

You now have the MVT tool which can scan for CURRENT Pegasus infection.However, it cannot scan a mobile device directly. You must generate an iOS backup through the Finder app by connecting your device via USB, selecting the device within Finder, then choosing "Back Up Now".

Since I encrypt my device backups, I must first make a decrypted version. If you do not encrypt your backups. Skip this step. Enter the following within Terminal but do not execute.

mvt-ios decrypt-backup -p THE.PASSWORD.TO.YOUR.DEVICE.BACKUP -d ~/Desktop/decrypted/

Open Finder and navigate to your home directory, then locate Library/Application Support/MobileSync/Backup. Find the randomly generated folder in this directory and drag and drop it into Terminal at the end of your previous command. The entire command should now be similar to the following.

mvt-ios decrypt-backup -p PASSWORD -d ~/Desktop/decrypted/ /Users/YOURUSERNAME/Library/Application\ Support/MobileSync/Backup/5587346598736592834765928345932

This command will decrypt your backup and store it on your Desktop. The following command will scan this backup.

mvt-ios check-backup ~/Desktop/decrypted/ --output ~/Desktop/results/

You now have a folder on your Desktop with the results. Look through it for any files which end in "_detected.json". These COULD indicate infection, but the content would need to be scrutinized.

Android users have a bit more hassle. See the official MVT docs at https://mvt.readthedocs.io/en/latest/ios/records.html if you want to check your own system.

I highly suspect that you do not have any infection, but these steps could set your mind at ease if you believe you were targeted by this software between 2016 and today. All of my devices were clean.

The Privacy, Security, & OSINT Show – Episode 225

EPISODE 225-Lessons Learned This Week

This week I discuss the recent CTemplar data loss, Mint Mobile's breach, and another Crypto Investment attack. We can all benefit from the lessons learned during these events.

Direct support for this podcast comes from sales of my books, services, and online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

None

UPDATES:

None

LESSONS LEARNED THIS WEEK:

CTemplar Data Loss
Mint Mobile Data Breach
AltoIRA Data Breach

OSINT:

None


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J


The Privacy, Security, & OSINT Show – Episode 224

EPISODE 224-Employment Privacy & Security

This week I discuss privacy concerns surrounding employment, plus the latest news and updates.

Direct support for this podcast comes from sales of my books, services, and online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, endorsements, Patreon, donations, or commercial influence on this show.


SHOW NOTES:

INTRO:

History of Employment Privacy

UPDATES:

Audacity

EMPLOYMENT PRIVACY & SECURITY:

Scope
Intuit/Equifax Deal
LinkedIn Scrape
Traditional Employment
Address
Phone
Credit Freeze
Resumes
Recruiters
Background checks
Photos
LinkedIn
Copies of ID
Birthday
Company Email
Company Equipment
Your Equipment
Mobile Devices
Video Collaboration
General Advice
Book

OSINT:

None


Free Workbooks: https://inteltechniques.com/links.html

Affiliate Links:
ProtonVPN: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=282
ProtonMail: https://go.getproton.me/aff_c?offer_id=26&aff_id=1519&url_id=267
SimpleLogin Masked Email: https://simplelogin.io?slref=osint
Silent Pocket: https://silent-pocket.com/discount/IntelTechniques
Amazon: https://amzn.to/3eCjp7J