SHOs 0 The notorious ransomware group Akira has just thrown a major punch in the cyber-underground. 💥 On October 29th, they publicly claimed responsibility for hacking the Apache OpenOffice project. The Claim: The cybercriminals boast of stealing a whopping 23 GB of sensitive data. They're now holding it hostage, threatening to leak everything unless a ransom is paid. 🏴☠️💰 What's Allegedly in the Loot? According to their darknet post, the stolen trove includes: Employee PII: Addresses, phone numbers, birthdates, driver's license & social security numbers, and even bank card details. 👤🔐 Corporate Secrets: Financial documents, internal communications, and bug/development reports. 📄💬 "We will soon publish 23 GB of corporate documents," the group's message states. Potential Fallout: If true, this isn't just a data dump. This stolen info could fuel devastating phishing and social engineering attacks against employees of the Apache Software Foundation. 🎣⚔️ A small silver lining: The actual OpenOffice source code appears untouched, meaning user security is not directly at risk. Why OpenOffice is a Target: 🎯 Apache OpenOffice is a legendary, free, open-source suite. But its community-driven, non-profit model often means limited cybersecurity resources, making it a vulnerable target for groups like Akira. Who is Akira? 👺 Active since March 2023, they've already extorted tens of millions. Masters of double-extortion: steal data first, encrypt systems second. They attack both Windows and Linux/ESXi systems. Known for aggressive tactics, even hijacking webcams to pressure victims. Official Stance? 🤐 Radio Silence. The Apache Software Foundation has neither confirmed nor denied the breach and has declined to comment. Independent experts are still verifying the leaked data samples. P.S. A Glimmer of Hope: ☀️ Remember this? Last spring, researcher Johannes Nugroho released a free decryption tool for files locked by Akira's Linux version. Its secret weapon? Using GPU power to crack encryption keys. A small win in the ongoing war. Quote Share this post Link to post Share on other sites