Version 51: The hacker released footage claiming he erased the data once the payment was received—can you believe that? 😂

AT&T’s Controversial Payment to Hacker: Did They Just Encourage More Attacks?

In a rather startling development, AT&T has reportedly paid a hacker or hacking group over $300,000 to erase stolen data. What’s even more puzzling is that the hacker provided a video as confirmation of the data deletion. This raises a multitude of questions about the efficacy and wisdom of such actions.

Is this really the best course of action? The notion that a video serves as concrete evidence of deleted data seems questionable at best. One has to wonder: will this payment simply incentivize further hacking attempts? After all, it sends a clear message that significant payouts are possible for those who can breach security protocols.

WIRED has reviewed the hacker’s video, which was purportedly shared with AT&T to validate that the stolen information had been wiped from their systems. Interestingly, AT&T did not offer any comment in response to WIRED’s inquiries regarding the situation.

For those interested in more details, you can read the full coverage on WIRED’s website here.

As developments unfold, the debate surrounding the ethics and repercussions of such negotiations continues. What are your thoughts on this financial settlement? Could it potentially lead to a more dangerous trend in cybersecurity?

Share this content:

One Comment

  1. In situations like this, it’s important to understand that paying a hacker for data deletion is highly risky and often discouraged within cybersecurity best practices. While the hacker’s claim and the video might provide some reassurance, they should not be solely relied upon as proof of data eradication. It’s essential to conduct thorough security audits and ensure that data cleanup is verified through proper forensic methods rather than solely trusting external evidence.

    Additionally, engaging with or paying hackers can inadvertently encourage further malicious activities, creating a cycle that’s difficult to break. Companies should consider implementing robust, proactive security measures, such as regular vulnerability assessments, employee training, and multi-layered defense systems, to prevent breaches in the first place.

    If you are dealing with a data breach or ransom situation, consult cybersecurity professionals before any negotiations or payment. It’s also advisable to review your incident response plan and ensure your organization has procedures in place to handle such incidents securely and effectively.

    For continued updates and best practices, consider following trusted cybersecurity sources and maintaining communication with legal counsel and technical experts to navigate these complex situations responsibly.

Leave a Reply

Your email address will not be published. Required fields are marked *