Cloud Services Firm Stops Ransomware Attack, But Pays Anyway

Blackbaud, a major supplier of financial and fundraising technology to the non-profit sector, said it stopped a ransomware attack from encrypting files, but paid the attackers to delete stolen customer data.

“Because protecting our customers’ data is our top priority, we paid the cybercriminal’s demand with confirmation that the copy they removed had been destroyed,” Blackbaud said in a customer advisory.

The company said it discovered and stopped the ransomware attack in May of this year, but discovered the attackers had removed “a subset” of customers’ data.

The data affected was from Blackbaud’s self-hosted environment, and didn’t affect data it hosts on Amazon Web Services or Azure cloud services, the company said.

data breach, ransomware‘Sophisticated’ attack

“The subset of customers who were part of this incident have been notified and supplied with additional information and resources,” Blackbaud said.

“We apologise that this happened and will continue to do our very best to supply help and support as we and our customers jointly navigate this cybercrime incident.”

Blackbaud said its strong cybersecurity practice and advance planning had enabled it to shut down the “sophisticated” attack, adding that it has implemented changes to prevent the issue from happening again.

The company said it believed the attackers’ confirmation they had destroyed the data in part because the ransomware business model depends upon criminals not disclosing data once a ransom is paid.

Data release

In addition, Blackbaud said it worked with outside experts to monitor the internet and found no evidence that information was ever released.

Ransomware attacks initially focused on encrypting organisations’ files and then extorting ransoms to decrypt the files, but in recent months have expanded into other areas, such as stealing data and threatening to release it.

Beginning earlier this year, for instance, the DoppelPaymer ransomware gang has begun publicly releasing files stolen from contractors for the US Navy, Lockheed-Martin and SpaceX.

Some of the malware developers’ ransom demands have been in excess of $1 million (£800,000), according to computer security firm CrowdStrike.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

OpenAI’s Lightcap To Take On Expanded Role

OpenAI chief operating officer Brad Lightcap to oversee international expansion as company consolidates lead in…

17 hours ago

China Unveils Deep-Sea Cable-Cutting Device

Chinese researchers publish details on device that could wreak havoc on undersea communications cables in…

17 hours ago

Pat Gelsinger Joins Faith-Based Tech Company Gloo

Former Intel chief Gelsinger expands role at Gloo, becoming executive chairman and head of technology…

18 hours ago

MEPs Ramp Pressure For Second EU Chips Act

MEPs add to Commission pressure for second EU Chips Act amidst industry calls for renewed…

18 hours ago

Xiaomi Raises $5.5bn In Expanded Share Sale

Smartphone maker Xiaomi reportedly raises about $5.5bn in Hong Kong share sale as it invests…

19 hours ago

BYD Launches Rival To Tesla’s Model 3 At Half Price

BYD's Qin L EV sedan starts at about half the price of Tesla's Model 3,…

19 hours ago