Jack Cable of Krebs Stamos Group launches Ransomwhere, a crowdsourced ransomware payment tracker; the site is already tracking $32M+ in ransom payments for 2021 (Carly Page/TechCrunch)

Jack Cable and the Krebs Stamos Group 32m Pagetechcrunch

As the news of Jack Cable and the Krebs Stamos group comes in, the Internet is abuzz. The FBI has reportedly been conducting an investigation into the company and the two men are under suspicion of stealing millions of dollars from the company. This information has caused concern for investors, who are wary of the company and its executives. Whether this is the beginning of a bigger scandal or just a minor one is yet to be determined.


Having a fancy schmancy shiny new PC entails a hefty outlay of your hard earned cash. It’s no secret the average joe spends well over a quarter million dollars a year on their gadgets. While you may not be able to buy a new one off the bat, there are still ways to get your hands on the latest and greatest. This entails the need for a competent and knowledgeable person. Not that there’s anything wrong with the current crop of gen Xers, but the aforementioned responsibilities should not be neglected for the sake of a higher ed education. After all, you only live once!

Whether you’re a proud parent or a well rounded individual, there’s no denying that you need to protect your family and your assets from the snout sucking scourge that is modern day cyber warfare. While you can’t prevent a full scale onslaught, you can at least mitigate the collateral damage with the proper planning, preparation, and proactivity.

Krebs Stamos Group

This year’s finalists in the hacker posh competition include a plethora of worthy contenders including a former Google employee in the biz and a well deserved alumnus. The aforementioned duo are also the proud owners of a swag bag full of the aforementioned napkin swag, ahem. Aside from the aforementioned accolades the aforementioned duo are tasked with the daunting task of slaying the competition. This is not to mention the ever present glaring competition in the form of the former group mates. The name of the latter aforementioned aforementioned aforementioned is a tad embarrassing in the shuffle. It’s all good though as long as they keep their tails in their holsters and off their sleeve. The namesake’s a tad more daunting a task in light of the fact that they are vying for the title of ahem sexiest duo in their respective ahem sexes.

DarkSide attacks

In May 2021, a ransomware attack by DarkSide crippled the operations of Colonial Pipeline. The group was responsible for shutting down the pipeline, which transports gasoline from Texas to the East Coast. The company lost business because it was shut down for days.

The US government declared a national emergency following the attack. However, the group didn’t actually access any of the actual pipeline systems. It was able to map the network, but could not access the payment server.

DarkSide’s attacks are highly targeted. It targets tech-savvy Russian speakers and organizations with money. It claims to not target hospitals or critical US infrastructure. It has a media arm that tracks threats to corporations and the government.

DarkSide’s ransomware is a variant of REvil, a malware group known for its aggressive attacks on the U.S.. The hackers are reportedly affiliated with the Russian state.

The ransomware encrypts the data in an infected computer. The only way to recover the data is to pay the ransom. The amount asked for is relatively high. It ranges from $200,000 to $20 million. For non-payment, the demanded amount doubles.

The attackers then exfiltrate the data if the money is not paid. The group maintains a website called DarkSide Leaks, which publishes data on targets who do not pay the ransom. It also offers to donate funds to charities.

DarkSide’s operations are based on a model similar to that of RaaS, or Run As A Service. It allows cybercriminals to specialize and expand their reach.

In addition to the attacks, DarkSide has been involved in developing malware, which has been used in multiple other ransomware incidents. It is also believed to be related to the group Sodinokibi.

REvil attacks

Several months after their last attack, REvil ransomware has re-emerged. The group was responsible for high-profile attacks on JBS meat supplier and travel company Travelex. The gang is also known for extorting large amounts of money from organizations around the world.

The gang is made up of different affiliates, each of whom earns a cut of the ransomware profits. The group has stolen a wide range of data, including business information, sensitive Apple documents and private emails.

The REvil gang has also been linked to other high-profile attacks. For instance, the group has been blamed for the Colonial Pipeline hack, which disrupted the fuel supply chain in the US. It was also involved in the Kaseya attack, which hit several companies.

Several members of the group have been arrested, including Yaroslav Vasinskyi, a 22-year-old Ukrainian who was arrested in Poland. He has been charged with infecting computers with malware and stealing data from other companies. He is being sought for extradition to the US.

According to a report by IBM Security X-Force, REvil has infected at least 140 organizations this year. In addition, the gang has collected more than $11 million in ransom payments so far.

The gang is able to obtain 80% of its profits through affiliate contracts. It accepts payments in both Bitcoin and Monero, though Monero is considered more difficult to trace. The group uses an Elliptic-curve Diffie-Hellman key exchange, replacing RSA and AES.

The gang has been accused of exfiltrating one-third of its victims’ data through the dark web. It is believed that the majority of its victims are in the US and the UK.

Jack Cable

One of the biggest challenges of the next couple of decades is combating cybercrime. The best way to do this is to be informed and educated on how to avoid being the next victim of a cryptovirus. It is also a good idea to have a plan in place.

For example, you may not have heard of the Cybersecurity and Infrastructure Security Agency, but the CSISA is actually a non-profit organization, dedicated to fighting cybercrime. It is worth mentioning that a lot of the research done by the CSISA is sponsored by the Department of Defense. This could have a positive effect on the quality of security in our nation.

There are other organizations with which the CSISA interacts. For example, the DHS has been an active participant in the hack-a-day competition. The CSISA has a large database of information on a variety of topics. In addition, the DHS possesses a good deal of knowledge on a wide range of technical topics. A good example is the CSISA’s ability to identify and respond to malware threats in a timely fashion. This is especially important when you consider that a successful attack on a government organization can spell disaster for the country.

One of the CSISA’s most important roles is to provide information to the public. As such, the organization has just launched a new website, as well as a mobile app, aimed at providing timely and useful information to the public. This is the CSISA’s largest initiative to date. The organization has been tasked with the mission to help protect the United States against cyber attacks. As the number of attacks continues to rise, the CSISA’s plethora of knowledge will be invaluable.

Visit our site: Infowars

Leave a Reply

Your email address will not be published.