Skip to content
Naked Security Naked Security

Crooks hold nude plastic surgery pictures to ransom after break-in

Patients, including some celebrities, of a plastic surgery clinic, have found themselves on the receiving end of ransom demands

A group calling itself the Tsar Team has published and ransomed at least 25,000 photos of before/after/some nude plastic surgery clients, along with patients’ private data.

According to Lithuanian police, the hackers broke into the servers of the Grozio Chirurgija chain of clinics earlier this year and demanded ransoms from the clinic’s clients in more than 60 countries around the world, including Germany, Denmark, Norway and other EU countries.

According to the Guardian, that includes more than 1,500 British patients. The purloined database also includes before and after nude images of celebrities.

Police told reporters that the crooks’ initial demand for the entire database was 300 bitcoin. As of Wednesday, that worked out to about $692,814 USD; £537,481; or €616,849.

The clinic refused to pay. The Tsar Team released a portion of the database in March, then the rest of it on Tuesday. But between those two releases, the thieves also carved it up, patient by patient, to try to shake down each one individually.

It’s unclear how many people have been extorted, but police said that dozens have come forward to report the blackmail.

Deputy chief of Lithuania’s criminal police bureau Andzejus Raginskis:

It’s extortion. We’re talking about a serious crime.

According to the Guardian, individual patients were being hit up for bitcoin payments worth between €50 and €2,000, depending on the sensitivity of the stolen data. For example: they were bumping up the ransom for nude photos, passport scans and National Insurance numbers.

For those who might be tempted into a Celebgate-ish, nude-celebs curiosity jag, the police warned that any “leechers” who download and store the stolen data could also be prosecuted.

The thieves have since reduced the ransom for the full database to 50 bitcoin ($115,292 USD; £103,605).

Who is Tsar Team? The crooks are either using a name associated with the APT28 or Fancy Bear espionage group in order to throw law enforcement off their tracks, or they’re actually Fancy Bear.

That’s the hacker group implicated in tampering with the US presidential election, including the Democratic National Committee leak, as well as attacks on En Marche and the Konrad Adenauer Foundation.

CrowdStrike, the security firm that the DNC called on for help following its leak, identified two “sophisticated adversaries” on the network of the formal governing body for the US Democratic Party.

According to CTO and co-founder Dmitri Alperovitch, the two adversaries used the handles Cozy Bear and Fancy Bear – groups believed to be closely linked to Russia’s intelligence services.

But as the Guardian points out, we don’t really know if the hackers that attacked Grozio Chirurgija are linked to Fancy Bear/APT28, or if they merely borrowed the name in order to spread disinformation.

Besides the “who’s extorting us” question, of course, is the more immediate quandary for patients:  the “should I pay?” dilemma.

Naked Security has mostly stuck to a neutral stance on the issue. After all, some organizations, such as hospitals, can feel like they simply have no choice.

But this is different. This is definitely a “don’t pay” case, says fellow Naked Security writer Paul Ducklin.

After all, if you do pay up, you first have to trust the crooks not to release the photos later anyway (or not to come back for more money), and then you have to trust them not to suffer a breach of their very own with the data they stole.

In other words, even if you trust them not to screw you over a second time on purpose, you also have to trust them not to screw you over a second time by mistake and thereby to allow someone else to screw you over a third time on purpose…

…and so on, ad infinitum.


8 Comments

“the police warned that any “leachers” who download and store the stolen data could also be prosecuted.”

That won’t happen, I guarantee it.

Reply

it can’t happen, there would be no laws broken.

Reply

Handling Stolen Goods – is an offence in UK

Reply

Hard to call it “Stolen Goods” when the perps make copies but leave the originals in place. The owner was not deprived of anything.

Reply

Not sure the music/film industry would agree with you there.

Reply

I believe with the music/film industry, the consuming is not what breaks the law, it’s the sharing of it after you download it. This may have changed though.

Reply

Well, in common parlance, the word “stolen” can hardly be considered objectionable.

We all know what we mean when we talk about “stolen cars” or about “car theft” even though in legalistic terms they have often not been stolen but twocced. (Taken without owner’s consent.)

Similarly, I think it makes sense to talk about “stolen data” even though the owner was not physically deprived of it, in much the same way we talk about “malware”, short for “malicious software” even though the legal interpretation of malice may not actually apply in every malware outbreak.

Legal jargon informs and influences everyday language but – thankfully! – does not determine or regulate it.

Reply

“The owner was not deprived of anything.”

…not even the peace of mind that no creepy strangers have seen their naughty bits? No doubt it’s unsettling to wonder if a creepy stranger on the train is staring because they have nude photos of you.

Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Subscribe to get the latest updates in your inbox.
Which categories are you interested in?
You’re now subscribed!