Article Details
Scrape Timestamp (UTC): 2025-11-13 20:07:01.403
Source: https://www.theregister.com/2025/11/13/ransomed_cto_refuses_extortion_demand/
Original Article Text
Click to Toggle View
Ransomed CTO falls on sword, refuses to pay extortion demand. Checkout.com will instead donate the amount to fund cybercrime research. Ransomware is a huge business, because affected orgs keep forking over money to get their data back. However, instead of paying a ransom demand after getting hit by extortionists last week, payment services provider Checkout.com donated the demanded amount to fund cybercrime research. And - perhaps even more unusual than refusing to pay the extortionists' demand - Chief Technology Officer Mariano Albera said that his company takes "full responsibility" for the security incident, and apologized for the circumstances that allowed the breach to happen. "We are sorry. We regret that this incident has caused worry for our partners and people," Albera said in a Wednesday blog. "We will not be extorted by criminals," he added. "We will not pay this ransom." The CTO said ShinyHunters contacted his company last week, claimed to have stolen data, and demanded a ransom. Albera didn't specify how much money the criminals wanted in exchange for files, and Checkout.com declined to comment on this when contacted by The Register. In other ransomware news… Ransomware remains a profitable biz, albeit a criminal one, according to Check Point Research's Q3 report. The firm tracked a record-high 85 active extortion groups last quarter with 14 new groups emerging in Q3. It also counted 1,592 new victims - keep in mind, these are orgs posted on data leak sites, so don't always provide a complete or accurate picture of the problem - which represents a 25 percent increase year-over-year. While Qilin led the quarter and averaged 75 victims per month posted on its name-and-shame site, LockBit came in second after reappearing in September, after a law enforcement takedown, with a new LockBit 5.0 variant. Both of these crews are also allegedly part of the DragonForce "cartel," although the researchers found "no evidence of real collaboration." After launching its own internal investigation, the payment services firm determined that the crooks had broken into a "legacy third-party cloud file storage system" that wasn't properly decommissioned and was used in 2020 and prior years. Again, no word on which third-party storage system ShinyHunters breached to gain access to Checkout.com's data, but this is the crime gang that broke into Snowflake customers' databases last year. More recently, the crew breached dozens of orgs' Salesforce databases. According to Albera, Checkout.com used this compromised cloud database "for internal operational documents and merchant onboarding materials" in 2020 and prior years, and the intrusion affected less than 25 percent of its existing merchant base. "This incident has not impacted our payment processing platform," he wrote. "The threat actors do not have, and never had, access to merchant funds or card numbers." In addition to apologizing to its customers and partners for the security snafu, the company is in the process of contacting impacted customers and is "working closely with law enforcement and the relevant regulators." Plus, instead of caving to the crims' demand, Albera said the company will donate the ransom amount to Carnegie Mellon University and the University of Oxford Cyber Security Center to support cybercrime research. "Security, transparency and trust are the foundation of our industry," he wrote. "We will own our mistakes, protect our merchants, and invest in the fight against the criminal actors who threaten our digital economy." While we anticipate a full post-mortem in the coming weeks after Checkout.com finishes its investigation, we commend the company and its execs for taking ownership, apologizing, and not funding the criminals' business (although we do understand that choice - to pay or not to pay - depends on several factors including the victim org's sector and can ultimately become a life or death decision). But after all of the lies, damned lies, and marketing BS that we typically see after a ransomware attack or any other security incident, it's refreshing to read a bit of truth and transparency from Checkout.com, and we hope other companies take note.
Daily Brief Summary
Checkout.com faced a ransomware attack by ShinyHunters, who claimed to have stolen data and demanded a ransom. The company chose not to pay the extortionists.
Instead of succumbing to the ransom demand, Checkout.com will donate the equivalent amount to cybercrime research initiatives at Carnegie Mellon University and the University of Oxford.
The breach involved a legacy third-party cloud file storage system used for internal documents and merchant onboarding, affecting less than 25% of its merchant base.
Checkout.com's payment processing platform remained secure, with no access to merchant funds or card numbers compromised during the incident.
The company is actively engaging with law enforcement and regulators while notifying affected customers to ensure transparency and accountability.
This incident underscores the importance of decommissioning outdated systems and maintaining robust security practices to prevent unauthorized access.
Checkout.com's response, emphasizing transparency and responsibility, sets a precedent for handling cyber incidents without funding criminal activities.