Has Your Organization Been Hacked?
Nonprofit groups breathing a sigh of relief because, unlike their organizational cousins in politics, they’re not targets of Russian hacking should take another and deeper breath–and gasp.
Despite the current headlines and cable news furor over the astonishing and frightening firestorm of Donald Trump’s Tweets accusing his predecessor, President Obama, of wiretapping Trump Tower, this item appearing in Bloomberg News and the accompanying video should not be overlooked.
[ Click Here for Story and Videos ]
As Bloomberg’s Michael Riley reports:
“At least a dozen groups have faced extortion attempts since the U.S. presidential election.” “The ransom demands are accompanied by samples of sensitive data in the hackers’ possession. In one case, a non-profit group and a prominent liberal donor discussed how to use grant money to cover some costs for anti-Trump protesters.” “At least some groups have paid the ransoms even though there is little guarantee the documents won’t be made public anyway. Demands have ranged from about $30,000 to $150,000, payable in untraceable bitcoins.” “The Center for American Progress, a Washington think tank with strong links to both the Clinton and Obama administrations, and Arabella Advisors, which guides liberal donors who want to invest in progressive causes, have been asked to pay ransoms.” You’ll want to read the whole report and watch the videos. Scary stuff not so much because it involves Russian hackers the way most folks think of them in the context of the 2016 election. Scary because criminal hackers –state-sponored or private — have discovered a new and potentially lucrative target. “Lucrative” in terms of private and perhaps embarrassing information on organizational practices and donors, but “lucrative” in terms of ransom and other shakedowns. Any Agitator readers aware of other examples out there? Roger P.S. Readers curious about their own security might check out How to Tell If You’ve Hacked (And what to do about it) . Better yet, check with your CRM or database provider and understand the steps they take–or don’t take– to protect you and your organization.
|