Ransomware group Ransomed.vc has claimed that it has successfully breached Sony Group and is threatening to sell a series of data. According to Australian publication Cyber Security Connect, Ransomed.vc, a new outfit of hackers that’s only been operating since September has hacked Sony's files and unearthed screenshots of the company's internal log-in page. This internal PowerPoint presentation includes test bench details and some 6,000 files.
The group has declared its intention to monetize the stolen data. “We have successfully compromised [sic] all of Sony systems,” the group claimed. “We won’t ransom them! We will sell the data. Due to Sony not wanting to pay. DATA IS FOR SALE.”
Reports suggest that the leaked documentation contains some unknown “build log files,” Java resources and HTML data. Many of the files are reportedly in Japanese. Ransomed.vc has not listed a price for the data but has shared contact details for Sony to get in touch and listed a “post date” of September 28, possibly when Ransomed.vc plans to out the information.
Read More: Fallout 3 Remaster, Oblivion, Ghostwire Tokyo Sequel And More From Xbox FTC Leaks
Sony Becomes Victim Of A Massive Breach By A RansomeWare Group
According to Video Game Chronicles, Ransomed.vc is a ransomware operator and a ransomware-as-a-service organisation and claims to be a “secure solution for addressing data security vulnerabilities within companies." “In cases where payment is not received, we are obligated to report a Data Privacy Law violation to the GDPR agency!” the group says. A major chunk of Ransomed.vc’s members reportedly operates out of Ukraine and Russia. The claims by the RANSOMEDVC ransomware gang remain unverified at this point. But the group has been linked to several high-profile cyberattacks, including an attack on the Hawaiian government’s website this month.
This is not the first time Sony's data has been compromised on this scale. In 2011, the company’s PlayStation Network suffered a major breach that saw 77 million registered accounts being compromised.