Hackers Blackmail Belgian Hosting Firm AlfaNet

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

According to the hackers, AlfaNet provides hosting services for 13,000 websites. The cybercriminals threaten to leak data and attack some of the websites if the company doesn’t pay up.

“We have hacked their database and we have stolen all of their customer data. Alfanet has two more days to pay us 15,000 Euros. Unfortunately, so far, they did not reply to our emails. We hope that they will decide to protect their customers before the deadlines expires on Friday evening,” the hackers said.

“If no money is received on Friday evening, we will post their entire database and we will directly attack some of their customers,” they added.

To prove their point, they’ve  leaked some customer data samples and some database information.

We’ve reached out to AlfaNet to see what they plan on doing. So far, they haven’t responded to our inquiry, but we’ve received confirmation that they got our email.

It’s worth noting that Rex Mundi is usually not bluffing. They’ve leaked data stolen from the systems of numerous companies that have refused to give in to their demands. The list of targeted companies includes Numericable, Habeas, Websolutions.it, Buy Way and Hoststar. Many of their targets are Belgium-based organizations.

Experts advise companies that find themselves in this situation not to pay up until the breach has been properly investigated. Security expert and malware researcher  Bart Blaze believes that the best thing they can do is contact authorities – police and even the local CERT.

According to the expert, in most cases, cybercriminals will sell the stolen data regardless of whether the company pays up or not.

As for damage control, Blaze recommends that logs be checked for any clues that might help in identifying the attackers. Another important step is notifying customers, and being as transparent as possible in the process.

It remains to be seen how AlfaNet acts. As Blaze highlights, it’s uncertain what messages have been exchanged directly between the company and the attackers.

 

The following two tabs change content below.

William Fieldhouse

I currently work full time as a penetration tester and have been involved within the IT security industry for over a decade. I also love to pioneer any forms of new technology and ideologies for future advancements. Feel free to contact me at [email protected]

William Fieldhouse

I currently work full time as a penetration tester and have been involved within the IT security industry for over a decade. I also love to pioneer any forms of new technology and ideologies for future advancements. Feel free to contact me at [email protected]

Leave a Reply