cybernews.com Open in urlscan Pro
2606:4700:3108::ac42:2bc5  Public Scan

URL: https://cybernews.com/news/pendragon-record-ransom-demand/
Submission: On February 28 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search/

<form class="header__search-form" action="/search/" method="get" data-js-search-mobile="">
  <input class="header__search-form-input" placeholder="Search..." type="search" data-js-search-input-mobile="">
  <button type="submit" class="header__search-form-button" title="Search">
    <svg class="svg-icon header__search-form-button-icon" width="22" height="22">
      <use xlink:href="#mdi-magnify"></use>
    </svg>
  </button>
</form>

POST /api/add-comment/

<form id="comment-form" class="space space_size_n text text_size_small" action="/api/add-comment/" method="POST">
  <label for="comment-form-text">
    <strong class="form-label form-label_required">Comment</strong>
    <textarea id="comment-form-text" name="comment" required="" cols="45" rows="8" class="form-input space space_size_s" minlength="3"></textarea>
  </label>
  <div class="space space_size_n">
    <div class="cells cells_responsive">
      <label class="cells__item cells__item_width cells__item_width_2" for="comment-form-name">
        <strong class="form-label form-label_required">Name</strong>
        <input id="comment-form-name" type="text" name="name" required="" class="form-input space space_size_s" minlength="3">
      </label>
      <label class="cells__item cells__item_width cells__item_width_2" for="comment-form-email">
        <strong class="form-label form-label_required">Email</strong>
        <input id="comment-form-email" type="email" name="email" required="" class="form-input space space_size_s" minlength="3">
      </label>
    </div>
    <label class="space space_size_n display_block" for="privacy_policy">
      <strong class="form-label form-label_required">Privacy Policy Agreement</strong>
      <span class="space space_size_s content display_block">
        <input id="privacy_policy" name="privacy_policy" required="" type="checkbox"> &nbsp; I agree to the <a class="link" href="https://cybernews.com/terms-conditions/" target="_blank" rel="noreferrer">
Terms &amp; Conditions
</a> and <a href="https://cybernews.com/privacy-policy/" target="_blank" rel="noreferrer">
Privacy Policy
</a>. </span>
    </label>
  </div>
  <div class="space space_size_l">
    <button class="button" type="submit"> Post comment </button>
  </div>
</form>

Text Content

 * News
   * Cybersecurity news
   * Cyber war news
 * Editorial
 * Security
 * Privacy
 * Crypto
 * Tech
 * Resources
   * What is a VPN?
   * How to use a VPN?
   * What is malware?
   * Are password managers safe?
   * More resources
 * Tools
   * Strong password generator
   * Personal data leak checker
   * Password leak checker
   * Website security checker
   * VPN speed test
 * Reviews
   * Antivirus software
   * Best VPN services
   * Password managers
   * Best ad blockers
   * Secure email providers
   * Best website builders
   * Best web hosting services

 * Follow
   * 
   * 
   * 
   * 
   * 
   * 
   * 



© 2023 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.
 1. Home
 2. News


UK CAR DEALER PENDRAGON HIT WITH A RECORD RANSOM DEMAND

Vilius Petkauskas
Senior Journalist
Updated on: 24 October 2022

--------------------------------------------------------------------------------

Image by Shutterstock.


Pendragon was allegedly breached by LockBit ransomware, with cybercriminals
demanding the company pay a $60M ransom.

Pendragon, UK’s second-largest car dealer with 160 showrooms across the country,
announced the company was subject to an IT security incident. Brands such as
CarStore, Evans Halshaw, and Stratstone operate under Pendragon’s umbrella.

“We have identified suspicious activity on part of our IT systems and have
confirmed we experienced an IT security incident. This has not affected our
ability to operate, and we continue to service our customers and communities as
normal,” Pendragon said in a statement on Friday.

According to security researcher Dominic Alvieri, LockBit ransomware was behind
the attack. However, Pendragon‘s name was not posted on LockBit‘s leak site at
the time of publishing.

The prolific gang is said to have issued a whopping $60M (£54M) ransom demand to
Pendragon. If confirmed, that ransom demand would be among the largest ever
reported.



The record holder for the largest ransom demand is the now-defunct REvil
ransomware gang. Last year, its affiliates demanded $70M from a US software
provider Kaseya. However, the ordeal ended with one of the attackers, Yaroslav
Vasinsky, being charged by the US Department of Justice.

The massive ransom demand for the return of Pendragon’s data may be linked to
the company receiving a $444M (£400M) takeover offer from its largest
shareholder a month ago. On September 27, Pendragon announced the takeover
proposal to its employees and shareholders.


THE INFAMOUS CARTEL

LockBit ransomware cartel leads the digital extortion underworld. A ransomware
report by threat intelligence firm Digital Shadows shows that in the third
quarter of 2022, LockBit was the most active group by an overwhelming margin.

LockBit and its affiliates accounted for over a third of all ransomware attacks
involving organizations being posted to ransomware leak sites. Researchers
attributed over 200 victims to LockBit.

While LockBit is far from the only successful ransomware group, it has outlasted
many competitors. Prominent groups like REvil, Darkside, and Cl0p came and went,
either regrouping or disbanding.

More recently, the Conti ransomware gang seems to have closed up shop once at
the top of the ransomware game. Meanwhile, LockBit has been active since 2019,
releasing the second and third generations of malware.

Pundits think the gang’s success stems from the group’s ability to combine a
business-oriented approach with specialized tech.

--------------------------------------------------------------------------------


MORE FROM CYBERNEWS:

Metaverse used to exist, but it no longer does, behavioral engineer says

Metaverse used to exist, but it no longer does, behavioral engineer says

The Playlist: An origin story like no other that charts the rise of Spotify

Cybercrime car wash: auto dealer convicted of laundering $5.7m in stolen money

Nightmare Before Streaming: common dangers of illegal streaming

Subscribe to our newsletter

Share
Tweet
Share
Share
Share

--------------------------------------------------------------------------------

Editor's choice
EDITORIAL
Cybernews weekly briefing: tech and security events you should know about
by  Jurgita Lapienytė
24 February 2023

Here's this week's recap – a brief summary of hacks and threats Cybernews
observed between February 20 and February 24.

Read more about Here's this week's recap – a brief summary of hacks and threats
Cybernews observed between February 20 and February 24.
Meta and Twitter's move to milk users might backfire
23 February 2023
One year of Russia’s cyberwar in Ukraine: what we have learned
23 February 2023
WhatsApp, Grindr, and Facebook used to entrap and persecute LGBT citizens, says
report
22 February 2023
Bots ruin everything: how Taylor Swift concert made us compete against
non-humans
20 February 2023

--------------------------------------------------------------------------------



--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Leave a Reply

Your email address will not be published. Required fields are marked

Comment
Name Email
Privacy Policy Agreement   I agree to the Terms & Conditions and Privacy Policy
.
Post comment

 * Categories
   * News
   * Editorial
   * Security
   * Privacy
   * Crypto
   * Cloud
   * Tech
 * Reviews
   * Antivirus Software
   * Password Managers
   * Best VPNs
   * Best VPN for Android
   * Secure Email Providers
   * Website Builders
   * Best Web Hosting Services
 * Tools
   * Password generator
   * Personal data leak checker
   * Password leak checker
   * Website security checker
   * VPN speed test
   * Coupon codes
 * ENGAGE
   * About Us
   * Send Us a Tip
   * Careers

 * 
 * 
 * 
 * 
 * 
 * 
 * 

 * About Us
 * Contact
 * Send Us a Tip
 * Privacy Policy
 * Terms & Conditions
 * Vulnerability Disclosure

© 2023 Cybernews – Latest Cybersecurity and Tech News, Research & Analysis.



This website uses cookies. By continuing to use this website you are giving
consent to cookies being used. Visit our Privacy Policy .
I Agree