Categories: Sponsored

What to do when you are blackmailed by hackers?

Express Bug bounty – effective blackmailing countermeasure

Initially, it was enough to hack into a company’s servers, steal sensitive clients’ data and use it for own profit. However, why to bother oneself if there are easier and faster ways to receive money? Today, there is a new threat on the rise: hackers resort to blackmailing companies in return for not uncovering compromising information about them.

Disclosure: This is a Sponsored Article

Who is the victim?

NapoleonX has recently faced such a threat. The French ICO project was exposed to blackmailing by an unknown hacker who described himself as the one who “worked for several cyber-protection companies”. The hacker claimed that he had found a severe vulnerability in project’s security system, and that “my job is to find the flaws and to benefit from them”. He threatened to sell sensitive information to third parties unless being paid.

Related Post

How should a company react to such blackmail? Offer a reward for identifying the vulnerability!

The founding shareholders were not going to pay to the malefactor and immediately contacted Hacken to answer adequately. So Hacken team organized a pool of security researchers to launch an urgent bug bounty. Information about the existing vulnerability was not confirmed, and from now on everyone who will find the security flaw in NapoleonX infrastructure will be rewarded.

Significant Lessons Learned

The issue was resolved; nevertheless, there are two significant lessons to learn. First of all, a black hat hacker can be smarter than one, but they cannot be smarter than the united community of white hats. Secondly, as long as HackenProof, decentralized bug bounty by Hacken, exists, you should never go on about blackmailers.

Hacken’s mission is to prevent all hacking threats on the global IT market. Only by this way, the web will be a safer place.

Drop a line to Hacken if you have been subjected to blackmail by a hacker or have any cybersecurity issue!

Guest

The writer of this post is a guest. Opinions in the article are solely of the writer and do not reflect The Merkle's view.

Share
Published by
Guest

Recent Posts

Bitget Launches OpenAI Pre-IPO Access As Crypto Exchanges Push Into Tokenized Equity Markets

Bitget officially launched pre-IPO access to OpenAI via its IPO Prime platform which deepens their…

10 hours ago

Tether Expands Open-Source Push With New Developer Grants For AI And Payment Infrastructure

Tether's presence in decentralized tech space is growing due to the launch of its developer…

1 day ago

Huma Finance Exploit Hits Legacy Contracts As Platform Maintains Stability And Accelerates Transition To V2 System

While challenges remain, the decentralized finance sector is moving forward, and Huma Finance's exploit serves…

1 day ago

Chainlink Expands Cross-Chain Reach As Major Protocols And Institutions Deepen Adoption 

Chainlink is continuing its mission to be the most widely integrated infrastructure in crypto, adding…

2 days ago

Sui Network Hit Again: DeepBook Exploit Adds To Growing List As Token Defies Pressure With Bullish Breakout

A vulnerability in one of the core DeFi protocols on Sui Network exposes the ecosystem…

3 days ago

Polygon Raises Network Capacity To 140M Gas

Polygon has made a big move in cementing its mission as one of the leading…

4 days ago