Reaffirming the crucial role of security research in response to a Supreme Court Amicus Brief, with overĥ0 signatories including Congressman Jim Langevin. Launched Ransomwhere, the first website to publicly track ransomwareĭiscovered a temporary workaround to a nascent ransomware strain, saving 50 victims $27,000 Led development and deployment of CISA's first passive, opt-out vulnerability scanning program with Crossfeed, assessing all 50 states and over 2,500 countiesĪdvised the IT-ISAC on rebuilding relationships betweenĬommunity and elections industry, leading to the adoption The Stanford Empirical Security Research Group and the Stanford Internet Observatory Some of my work: Jack studied computer science at Stanford, where he worked as a researcher Including Google, Facebook, Uber, Yahoo, and the U.S. Jack is also a top-ranked bug bounty hunter, having identified over 350 vulnerabilities in companies Portfolio, advised on the next iteration of the DoD
![jack cable stamos ransomwhere jack cable stamos ransomwhere](https://network-king.net/wp-content/uploads/2021/07/Ransomwhere4.jpg)
Helped run the Hack the Pentagon bug bounty Jack joined the Defense Digital Service out of high school, where he Security Architect at Krebs Stamos Group.īefore that, Jack served as an Election Security Technical Advisor at CISA, where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide. Nothing like that.Jack Cable is a computer scientist and security researcher, currently a Fellow with Jack Cable of Krebs Stamos Group launches Ransomwhere, a crowdsourced ransomware payment tracker the site is already tracking 32M+ in ransom payments for. We’re not running AT&T’s network or Verizon’s 911 system. “We’re not looking at massive critical infrastructure,” Voccola said. Voccola added that he was not aware of any nationally important organization having been affected by the hack. “No comment on anything to do with negotiating with terrorists in any way.” “I can’t comment ‘yes,’ ‘no,’ or ‘maybe,'” Voccola said. Voccola told Reuters he has been in contact with officials from the White House, FBI and the Department of Homeland Security. Kaseya CEO Fred Voccola declined to say whether he was willing to pay the ransom demand.
#Jack cable stamos ransomwhere software#
The hack was carried out through a breach of Florida-based software company Kaseya, and most of the victims of the attack were Kaseya’s clients. However, when asked about the hack’s impact on a Swedish grocery chain, the hacker told Reuters, “It’s nothing more than a business.” Speaking to Reuters, an affiliate of REvil, also known as Sodinokibi, expressed regret over the hack impacting a kindergarten association in New Zealand, calling it an accident.
![jack cable stamos ransomwhere jack cable stamos ransomwhere](https://i2.wp.com/infosecbuzz.com/wp-content/uploads/2021/07/1-61.jpg)
REvil’s structure can make it difficult to determine who speaks for the group, but Cable said the conversations indicated it is not attached to the initial $70 million figure. Reuters reports that it too was able to get through to the cybercriminal gang, who told the outlet that its monetary demand remained unchanged at $70 million, “but we are always ready to negotiate.” He said the $70 million demand appeared to be the group’s attempt at making the best of an awkward situation.Ĭable told Reuters that he was able to contact the hackers by obtaining a cryptographic key to the gang’s payment portal.
![jack cable stamos ransomwhere jack cable stamos ransomwhere](https://cisoseries.com/wp-content/uploads/2021/07/CSH_2021-07-13.jpg)
“For all of their big talk on their blog, I think this got way out of hand,” Liska told the news outlet. However, cybersecurity expert Allan Liska told Reuters that he believed the group was likely in over its head with the scope of this massive global hack. The group had originally demanded $70 million in exchange for the data. Reuters reports an affiliate of the gang told cybersecurity expert Jack Cable of the Krebs Stamos Group they would sell a “universal decryptor” for $50 million. The Russia-linked ransomware gang known as REvil has reportedly lowered the amount of money it is willing to accept in exchange for data belonging to hundreds of companies worldwide that it is holding hostage.