• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCybersecurity

Here’s What Happened To One Company That Refused To Pay Off Hackers

By
Jonathan Vanian
Jonathan Vanian
Down Arrow Button Icon
By
Jonathan Vanian
Jonathan Vanian
Down Arrow Button Icon
January 10, 2017, 7:35 PM ET
FRANCE-INTERNET-INFORMATION-TECHNOLOGY-SECURITY-COMPUTER
An IT researchers shows on a giant screen a computer infected by a ransomware at the LHS (High Security Laboratory) of the INRIA (National Institute for Research in Computer Science and Automation) in Rennes, on November 3, 2016. Paradise where computer viruses blossom under the watchful eye of scientists, the Laboratory of high security (LHS-PEC) of Rennes is a small fortress from where emerge the first studies on the "ransomwares", those digital brigands which Dominate the malware market. / AFP / DAMIEN MEYER (Photo credit should read DAMIEN MEYER/AFP/Getty Images)Damien Meyer—AFP via Getty Images

Hackers continue to use ransomware to attack and extort businesses and other organizations, highlighting the dangers of failing to put up adequate cyber defenses.

E-Sports Entertainment Association, a company that hosts competitive video game tournaments, is among the latest to be hit. The gaming company said this week that hackers had released stolen data about its users, including emails, private messages, and phone numbers after it refused to pay $100,000.

ESEA did not say how many users were impacted, but according to the LeakedSource, a website that tracks and stores stolen databases, roughly 1.5 million ESEA users have been compromised.

Get Data Sheet, Coins2Day’s technology newsletter.

“We do not give in to ransom demands and paying any amount of money would not have provided any guarantees to our users as to what would happen with their stolen data,” the ESEA said in a statement.

The cyber attack on the ESEA is the latest wave of ransomware attacks that appear to be a growing problem. A report by Cisco (CSCO) in July said that ransomware attacks are rising, with nearly 10,000 people and businesses paying extortion money each month to avoid having their sensitive data released or scrambled. Cisco said that the average ransom is around $300 and that hackers, overall, could make $34 million annually carrying out the attacks.

ESEA said that hackers first contacted the organization on Dec. 27 to say that they had broke into its computer networks, stole user data, and wanted payment with the threat that they would leak the information or sell it on the black market. Over the following weeks, ESEA communicated with the hackers via emails, sought legal counsel, notified users, and informed the FBI about the attack.

The company said that it investigated the data breach and has remedied the problem, which resulted in its computer systems going offline periodically over the past few days.

ESEA told its users that they should update their passwords as well as any security questions and answers they used on other online accounts that used the same information.

Also this week, hackers breached a community college in the Los Angeles area and demanded a $28,000 ransom to keep from destroying data from the school that they had stolen. In this case, the college chose to pay the extortion fee to get the data back, according to The San Diego Union-Tribune.

Additionally, hackers have breached over 25,000 online MongoDB databases stored in places like Amazon (AMZN) Web Services over the past month and then demanded payment. Many companies use the popular open-source database to store data that doesn’t fit into the conventional rows-and-columns-format. However, companies that fail to set up their databases properly leave them vulnerable to hacking.

For more about cybersecurity, watch:

Cybersecurity firm Flashpoint said that it now appears that hackers in the MongoDB case are intercepting each other’s extortion payments in an effort to steal the proceeds of their hackings. This has resulted in “a catastrophic volume of global data loss,” because some victims end up paying off the wrong hackers, Flashpoint said in a blog post.

MongoDB has posted an online tutorial to help those affected by the ransomware attacks troubleshoot the problem.

About the Author
By Jonathan Vanian
LinkedIn iconTwitter icon

Jonathan Vanian is a former Coins2Day reporter. He covered business technology, cybersecurity, artificial intelligence, data privacy, and other topics.

See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.