Article Details

Scrape Timestamp (UTC): 2025-03-18 07:30:11.841

Source: https://www.theregister.com/2025/03/18/extortionists_ox_thief_legal_threats/

Original Article Text

Click to Toggle View

Extortion crew threatened to inform Edward Snowden (?!) if victim didn't pay up. Don't laugh. This kind of warning shows crims are getting desperate. Dark web analysts at infosec software vendor Fortra have discovered an extortion crew named Ox Thief that threatened to contact Edward Snowden if a victim didn’t pay to protect its data – a warning that may be an indicator of tough times in the ransomware world for some, at least. Ox Thief at first stuck to the tried-and-tested racket, claiming on its Tor-hidden site to have stolen 47 GB of "highly sensitive files" from an organization, offering samples of those files for download so its victim could verify its claims, and then threatening to publish the material unless the org paid a ransom demand. Then it went off-script, posting a lengthy list of possible consequences that could befall the victim if it didn’t pay. Those include jail time for breaches of data leak liability laws, huge fines, class-action lawsuits, negative news coverage, reputational damage, and incident-response costs. Ox Thief’s leak site even includes case studies of "real data breach cases" that detail high-profile breaches such as Capital One's 2019 security SNAFU and Uber's 2016 security breach cover-up. The crew also threatens to contact infosec journo Brian Krebs, Have I Been Pwned founder Troy Hunt, the Electronic Frontier Foundation (EFF), the European Center for Digital Rights' privacy advocacy group NYOB, and even Edward Snowden if the victim doesn't meet the ransom demand. They are outlining in painful detail threats to fast-track the legal, governmental, and press consequences We’ve seen this sort of thing before, for example from the likes of ransomware gang ALPHV which in 2023 filed an SEC complaint against fintech firm MeridianLink for failing to notify the American financial regulator of a significant security breach. Fortra’s domain and dark web monitoring services senior manager Nick Oram thinks Ox Thief’s tactics are a new and noteworthy escalation. "While ransomware groups adopt a variety of tactics to increase their success, this is the first time they are outlining in painful detail threats to fast-track the legal, governmental, and press consequences associated with a breach," Oram said in a briefing shared with The Register. "Ox Thief’s' approach marks a concerning evolution in ransomware tactics, leveraging legal liability and media scrutiny to pressure victims into compliance," he added. "By explicitly outlining potential fines, class action lawsuits, and government penalties, the group is attempting to reframe the cost-benefit analysis of paying versus resisting extortion." Ox Thief may also be trying to do something about its own costs: Oram thinks ransomware payments are falling, leading crims to try new tactics in pursuit of a payday. "Understanding these evolving methods helps organizations better prepare, strengthen defenses, and refine response strategies to mitigate both technical and reputational risks," Oram said. Crew claims collide Threat intel analysts spotted Ox Thief earlier this month, after the extortionists claimed to have compromised Broker Educational Sales & Training (BEST), a company that provides continuing education programs for insurance and financial professionals. The crooks bragged about stealing employee personal data, client and company information, financial reports, insurance documents, contracts, and other information from company databases. No information is available on the ransomware, if any, used in the attack, so it could be purely extortion. To be clear: The Register has not independently verified Ox Thief's claims, or its alleged data theft. Complicating matters further, threat intelligence outfit FalconFeeds recently noted that Medusa ransomware affiliates also claimed to have infected and stolen data from BEST in December 2024. It's possible the two intrusions are related, or that Ox Thief came into possession of the purloined files. Or perhaps this mess is Medusa again changing its tactics, as we reported last week after US authorities reported an instance of “triple extortion” that saw one of the gang’s affiliated orgs demand a third payment. BEST did not immediately respond to The Register's questions about the alleged digital break-ins. We will update this story if the education firm responds with substantial information.

Daily Brief Summary

CYBERCRIME // Ox Thief Extortion Crew Threatens Victim with Legal and Media Fallout

Ox Thief, an extortion group, claimed to have stolen 47 GB of sensitive data from an unnamed organization, threatening to publish if a ransom wasn't paid.

The group offered data samples for verification and listed severe potential consequences for non-compliance, such as fines, lawsuits, and reputational damage.

In an unusual tactic, Ox Thief threatened to contact high-profile figures, including Edward Snowden and journalists, to escalate legal and media repercussions.

The extortion strategy includes detailing potential legal outcomes and government penalties, pressuring victims to evaluate the costs of non-payment.

Fortra’s Nick Oram highlighted this as a new escalation in ransomware tactics, emphasizing the strategic use of legal threats and media exposure.

There's speculation about declining ransomware payments leading criminals like Ox Thief to innovate in their extortion methods.

The outcome for the victim company, Broker Educational Sales & Training (BEST), and verification of Ox Thief's claims remain unclear.