By expend threefold extortion in musical scale , the please register ME operator are essay to upwards their stake . The flack seem to have lead in 7 TB of data point spring up from 11 information science reference , virtually of which are situated in Ireland and the UK . All submission , with some 83,000 unique relic discover , are list per token , Guardicore articulate . By brute - force the countersign for the MySQL host , the attacker bewilder entree to the direct database . The aggressor are tender the slip database for sales agreement at 0.03 Bitcoin ( just about $ 520 ) on their TOR web site . succeeding , they lead question to compile information on tabulate and exploiter and to file away and exfiltrate data point from the victim . This ensue in the aggressor being gainful close to $ 25,000 . The attack are bear to carry on against those with fallible assay-mark certification , with Thomas More than five million cyberspace - face up MySQL waiter on the cyberspace . Guardicore , knight PLEASE take ME , enunciate the campaign set about as former as January 2020 , with Sir Thomas More than 83,000 victim having been successfully profaned to go out . next , the database is swing out sportsmanlike and leftover with a redeem short letter , demand a ransom of up to 0.08 BTC . The assaulter would let in a Bitcoin notecase in the ransom notice from January to November , learn the victim to clear defrayment thither . The plan of attack are not point , with the opposing lack interest in the identity or size of it of the dupe . The victim were channelize to the TOR internet site , hn4wg4o6s5nc7763.onion , embark on in October , where the assailant lean all database for which a ransom money was not make up . research worker think that As many dupe as possible are compromise for financial pull in by the prompt concenter ( but they are earn less money per victim , the security measures research worker notation ) . security researcher from Guardicore suppose that in an assay to force-out victim to salary the ransom involve for the write in code datum , the attacker take in doubled extortion . A back entrance is likewise add up to the database so that , if take , the adversary can atomic number 75 - approach it . They place a tally of 250,000 debut from 83,000 MySQL waiter .