Despite Paying Ransom to Attackers, Dolly.com's Data Gets Released Anyway

The intruders successfully breached sensitive data from the company and its customers, such as high-level account credentials, credit card details, customer locations, and more. This intrusion presents a substantial threat to Dolly.com and its users.

Nov 10, 2023 - 16:00
  Source
 0  57
Despite Paying Ransom to Attackers, Dolly.com's Data Gets Released Anyway

Dolly.com, an on-demand moving and delivery service, reportedly fell victim to a ransomware attack and appears to have been misled by the cybercriminals involved. Despite making a payment to resolve the situation, the company faced further complications.

In this incident, the attackers, known for their unreliability, accused Dolly.com of not paying enough ransom and proceeded to leak the stolen data. Additionally, they publicly shared a conversation with the company on a well-known criminal forum, often frequented by ransomware groups and data thieves.

The Cybernews research team believes that Dolly.com, which operates in 45 US cities by linking those needing moving services with helpers, was attacked around late August or early September. A communication dated September 7th indicated that Dolly.com had agreed to pay the ransom demanded by the attackers.

As of the time of this report, Dolly.com had not responded to inquiries confirming the ransomware attack or the decision to pay the ransom. The situation underscores the risks and uncertainties involved in dealing with cybercriminals, even when trying to resolve such disruptive incidents.

Dolly data

Dolly.com, a moving and delivery platform, reportedly fell victim to a ransomware attack, during which cybercriminals obtained sensitive company and customer data. Despite paying a ransom, the company's information was not secured as promised.

The stolen data is believed to include critical details such as high-level account logins, partial credit card numbers, customer addresses, names, registration dates, and user emails. The attackers also claimed to have accessed complete credit card information.

In addition to this, entry points and admin credentials for MongoDB instances on Amazon Web Services (AWS), as well as names of 95 AWS S3 buckets belonging to Dolly.com, were reportedly compromised and deemed sensitive.

Dolly.com allegedly paid the ransom to prevent the attack from becoming public. However, the cybercriminals considered the payment insufficient and, instead of returning the data, they kept both the ransom and the stolen information. They further exacerbated the situation by uploading the data and providing download links on a criminal forum. Although these files were later removed, they were accessible for at least a week.

This incident serves as a stark reminder that ransomware operators are unreliable, and paying a ransom offers no guarantee of securing stolen data. The researchers warned that if adequate precautions are not taken, this attack could lead to further breaches and exploitation.