Breaking

DopplePaymer Ransomware launched a website called ‘Dopple Leaks’ to disclose the encrypted data.

Ransomware has been known for causing havoc to enterprises by encrypting data and asking for a ransom, however in recent times, Ransomware creators have taken things seriously by publishing the victim’s data on a hosted website. Maze ransomware first initiated this publishing behavior, when its victims denied to pay the ransom. Now DopplePaymer Ransomware creators have published a new website called ‘Dopple Leaks’ were it has disclosed the encrypted data of few companies that it had infected.

With DopplePaymer following up with Maze’s tactics of exposing victim’s data, Sodinokibi, and Nemty have also stated that they would probably follow the same in future. 

DopplePaymer is an enterprise targeted malware that infiltrates networks, gain access to administrator credentials and eventually spread to the network devices to break the productivity, integrity and confidentiality of the enterprise. Below is the site that creators of DopplePaymer had created, the Dopple leaks. 

DopplePaymer Ransomware’s data leak website ‘Dopple Leaks’

As per DopplePaymer ransomware creators, four companies that become victim to their attack and had not paid the ransom yet. 

  • Pemex, state-owned oil company in Mexico that became victim to DopplePaymer in Nov 10th, 2019.
  • A logistic company from South Africa became a victim on Jan 20th, 2020.
  • A French cloud hosting and telecommunications company and
  • A US based merchant account company.

Ransomware can now encrypt, demand ransom and publish data

Ransomware is no longer just an encrypting malware that demands for ransom, with Maze and DopplePaymer ransomware creators publishing victim’s data, this is now threatening companies for data breaches and could even result in penalization from data law regulatory organizations.

Enterprises are requested to keep their proactive and reactive security up 24/7 and if in case they became victim to a cyberattack and could lose employees, vendor, client or personal data of any entity it is always good to disclose the attack, this way they can at least caution the affected entities. 

Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

View Comments

Recent Posts

Top 9 Best Log Management Tools for 2025

Discover the best log management tools for efficient system management and monitoring. Learn about the…

6 months ago

Top 4 Remote Support Tools for 2025- Best Remote Support Solution

Taking remote of devices and managing them will make thing simple for IT admins. In…

6 months ago

Top 5 Best Unified Endpoint Management (UEM) Software for 2025

In 2024, the Unified Endpoint Management Software market will continue to evolve and here are…

6 months ago

Top 5 Threat Intelligence Tools For 2025

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

7 months ago

Top 5 Best Microsoft Intune Alternatives to Consider for 2025

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

8 months ago

Recast Software: Advanced Endpoint Management and Security Tools for IT Teams

Recast Software offers a suite of tools designed to enhance and simplify endpoint management in…

1 year ago