Delivery leader Dolly.com recently faced a cyber onslaught, highlighting the treacherous landscape of online security. 

The alleged payment to suppress stolen customer data backfired. Instead of keeping its promise to not leak the information, the hackers reportedly published them.

Dolly.com's Ransomware Ordeal

Dolly.com Hackers Leak Data Despite Receiving Ransom
(Photo: Dolly.com) Delivery platform Dolly.com suffered from a ransomware attack recently. Despite paying the hackers with a ransom, the customer data got leaked in an instant.

The Cybernews research team uncovered evidence suggesting that Dolly.com fell victim to a ransomware attack. The platform, operating in 45 US cities, connects users with "Dolly helpers" for moving assistance. 

Attackers, exploiting a notorious Russian-language forum, exposed the breach details, including sensitive information like high-level account logins, credit card details, customer addresses, names, registration dates, user emails, and system data.

Related Article: ICBC Ransomware Attack: Financial Authorities on High Alert Amid US Treasuries Disruption

Payment Predicament

Communication between the attackers and Dolly.com, dated Sept. 7, revealed the company's agreement to pay the ransom. Unfortunately, the cybercriminals, dissatisfied with the amount, not only reneged on their promise to delete the stolen data but also took the opportunity to publicize the breach and engage in a data auction on a criminal forum. 

It was said in the report that the compromised data, including AWS S3 bucket names and admin credentials, was exposed for at least a week.

Insufficient Ransom Forced Hackers to Leak Data

Dolly.com's attempt to keep the attack under wraps failed miserably. The attackers, deeming the ransom insufficient, not only retained the money but also divulged the pilfered data. Although the downloadable files were eventually removed, the incident serves as a stark reminder that appeasing ransomware operators is a precarious gamble.

How to Protect Yourself From Ransomware Hack

The incident emphasizes the inherent untrustworthiness of ransomware operators. To address such cybersecurity challenges, breached companies should:

  • Conduct a thorough retrospective investigation of logs to validate hacker claims.

  • Reset all internal tokens and sensitive variables exposed during the breach.

  • Promptly inform users of the security breach and its potential implications.

  • Undertake a comprehensive audit of the organization's security posture to prevent future incidents.

To wrap it up, the Dolly.com ransomware attack serves as a cautionary tale and this highlights the importance of robust cybersecurity measures and the unpredictability of dealing with cybercriminals. 

As businesses navigate the digital landscape, vigilance, and proactive security measures are imperative to safeguard against evolving threats.

Meanwhile, another notorious group of cybercriminals behind LockBit ransomware has leaked a "tremendous" amount of confidential files.

According to Tech Times, the hackers were tasked to never expose the data to the public server. However, when their negotiation failed after Boeing ignored their warnings, they decided to ditch the deal and leaked the 43 GB of data.

The two cybersecurity cases only meant that the data leak would be up to the hackers. Some hackers might comply if you pay them a ransom while others will not listen to you even though you hand them the payment.

Read Also: FBI Most Wanted Russian Hacker 'Wazawaka' Unfazed by US Sanctions, Claims 'Better' Life

Joseph Henry

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion