Ransomed CTO falls on sword, refuses to pay extortion demand
Briefly

Ransomed CTO falls on sword, refuses to pay extortion demand
""We are sorry. We regret that this incident has caused worry for our partners and people," Albera said in a Wednesday blog. "We will not be extorted by criminals," he added. "We will not pay this ransom.""
"After launching its own internal investigation, the payment services firm determined that the crooks had broken into a "legacy third-party cloud file storage system" that wasn't properly decommissioned and was used in 2020 and prior years."
"According to Albera, Checkout.com used this compromised cloud database "for internal operational documents and merchant onboarding materials" in 2020 and prior years, and the intrusion affected less than 25 percent of its existing merchant base."
Checkout.com refused to pay a ransom demand and donated the amount to fund cybercrime research. The company traced the intrusion to a legacy third-party cloud file storage system that was not properly decommissioned and had been used in 2020 and earlier. The breach was attributed to the ShinyHunters group and affected less than 25 percent of Checkout.com's merchant base. The incident did not impact the company's payment processing platform. The CTO apologized, accepted full responsibility for the circumstances that allowed the breach, and stated the company would not accede to criminal extortion.
Read at Theregister
Unable to calculate read time
[
|
]