Telefonica Victim Of $600,000 Bitcoin Ransomware Attack



Wanna Crypt

Spanish telecoms giant Telefonica was confronted with 85 percent of their systems shut down after ransomware criminals infiltrated its systems demanding $550,000 in Bitcoin. Telefonica is a multinational corporation, subsidiaries of which include major European mobile operator O2, Movistar and Vivo.

As local news resource El Mundo and others report, the attack, which occurred earlier Friday, has resulted in most staff abandoning their positions and nine out of 10 company machines infected. Hackers are demanding a payment of $300 per machine, roughly equal to 300 Bitcoins currently worth around 510,000 euros. 

“The origin of the infection is not confirmed at the moment, but sources close to the company point out that it is being treated as an attack originating in China,” El Mundo writes.

Telefonica’s chief data officer Chema Alonso meanwhile took to Twitter to state that the attack had been “overblown” by the media.“Our colleagues are working on it right now,” he said, adding that the problem had “unfortunately affected other organizations” and that the company was working with the victims.

There is much more detail this this more recent post 


 

Don't be a victim! Get your Ransomware Hostage Rescue Manual.

Ransomware Hostage Rescue ManualGet the most informative and complete hostage rescue manual on Ransomware. This 20-page manual is packed with actionable info that you need to prevent infections, and what to do when you are hit with malware like this. You also get a Ransomware Attack Response Checklist and Prevention Checklist. You will learn more about:

  1. What is Ransomware?
  2. Am I Infected?
  3. I’m Infected, Now What?
  4. Protecting Yourself in the Future
  5. Resources

Don’t be taken hostage by ransomware. Download your rescue manual now! 

Get Your Manual

Or cut & paste this link in your browser:  http://info.knowbe4.com/ransomware-hostage-rescue-manual-0


Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews