Skip to main content

Hackers ransom sensitive photos, information stolen from cosmetic clinics

You can do everything right, including keeping your systems protected, never clicking on suspicious links, and making sure to enter private information only on safe sites, and you can still see your most private information stolen and published. The reason is simple — our information is located on servers that we do not control and sometimes, those servers are vulnerable to attack.

Such was the case with a chain of Lithuanian cosmetic surgery clinics, which was attacked by a group of hackers known as Tsar Team. The hackers broke into the servers, stole sensitive personal data and private client photos, and are now holding the clinics hostage, The Guardian reports.

Related Videos

When you have cosmetic surgery performed, the surgeons and their staff take photos to plan procedures and to provide before-and-after comparisons. Many of these photos are taken of clients in the nude and are thus just as sensitive as any of the photos stolen and published in various famous celebrity attacks. These photos, along with sensitive personal records, are now being used to extort individual clients of the clinics into paying between 50 and 2,000 Euros in bitcoin or the records and photos will be publicly released.

At first, the hackers were willing to sell back the entire database for 300 bitcoins, or around $685,000, but the clinics refused to pay. Now, the payment for the database has been reduced to 50 bitcoin, or around $114,000. The per-record ransom is based on how sensitive the data and photos are, with the most revealing photos and information like passport scans and national insurance numbers having the highest price tag.

According to Jonas Staikunas, the director of the Grozio Chirurgija chain of clinics that suffered the attacks, “Clients, of course, are in shock. Once again, I would like to apologize. Cybercriminals are blackmailers. They are blackmailing our clients with inappropriate text messages.”

The clinic is suggesting that patients do not engage the blackmailers and Lithuanian law enforcement agencies are working to locate the hackers. In addition, anyone who downloads and stores the data illegally will also be prosecuted.

The attack follows along with the massive Wannacry ransomware attack that affected hundreds of thousands of individuals and organizations around the world. It serves to further highlight the need for locking down systems and doing more to keep them safe from these kinds of attacks. In the end, it is not enough that we keep our own systems secure — we have to worry about the systems maintained by every organization we do business with.

Editors' Recommendations

Experts fear ChatGPT will soon be used in devastating cyberattacks
The ChatGPT name next to an OpenAI logo on a black and white background.

ChatGPT has taken the world by storm in recent months, but just as it has amazed people with its technical capabilities, concerns have also been raised over its potential misuse. Now, it seems some IT leaders are worried it will soon be used in major cyberattacks, with the potential to cause devastation in the future.

In a survey of 1,500 IT and cybersecurity professionals conducted by BlackBerry, 51% of respondents believed that ChatGPT will be responsible for a successful cyberattack in the next 12 months. As much as 78% feel that attack will happen within two years, while a handful think it could happen within the next few months.

Read more
Hack involved the data of a nation’s entire population
A depiction of a hacker breaking into a system via the use of code.

Hackers are well known to nab customer data held by companies, but obtaining the personal data of pretty much all of the residents of a single nation in one fell swoop takes the nefarious practice to a whole new level.

The remarkable feat was allegedly performed by a 25-year-old Dutch hacker who, when arrested by police, had in his possession personal data linked to pretty much every resident of Austria -- about nine million people.

Read more
Hackers dug deep in the massive LastPass security breach
The LastPass logo appears in front of a menacing hooded figure.

The cybersecurity breach that LastPass owner GoTo reported in November 2022 keeps getting worse as new details are revealed, calling into question the company's transparency on this serious issue.

It has been two months since GoTo shared the alarming news that hackers stole the usernames, passwords, email addresses, phone numbers, IP addresses, and even billing information of LastPass users. In GoTo's latest blog update, the company reported that several of its other products were compromised as well.

Read more