• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • March 4th, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Cyber Crime

Whistleblower reveals Cyber Security Firm hacks its own clients to extort them

May 12th, 2015 Waqas Cyber Crime 0 comments
Whistleblower reveals Cyber Security Firm hacks its own clients to extort them
Share on FacebookShare on Twitter

A former employee of P2P cyber security firm Tiversa, turned whistleblower spilled the beans that the firm hacks its customers in order to fake bogus data breaches and then furthermore extorts its clients to finance its ‘incident response’ services.

The P2P cyber security firm Tiversa is once again in the news but for all the wrong reasons, this time it’s because a former employee turned inside mule Richard Wallace claimed that Tiversa “made false sham hacks and wrongfully forced their clients to buy its services.”Cyber security scam, an inside Informer reveals the firm extorts  clients through bogus hacking:S

Tiversa who?

The company operates on a state level Tiversa delivers P2P Intelligence services to various corporations, individuals and government agencies built on its vastly patented technologies that are able to monitor over 550 million users issuing approximately 1.8 billion searches in a single day. Requiring basically no software or hardware, Tiversa can detect exposed files, retrieve copies, regulate file sources and assist backing in remediation and risk alleviation.

whistleblower-reveals-cyber-security-firm-hacks-its-own-clients-to-extort-them

Tiversa came to light in 2007 when it claimed that highly confidential military documents, including some tracing back to the Pentagon, were being leaked through P2P software installed on sophisticated systems that stored the data.

In 2009, Tiversa said an Iranian IP address was partaking classified info that contained the infrastructures, triangulation and administration electronics on the helicopter in use of the President of the United States, Barack Obama. Then in 2011, Tiversa yet again claimed, that the website WikiLeaks may be manipulating a specific feature in peer-to-peer file-sharing applications to search for highly classified data.

The company is in fact appointed by governments and corporations to exploit the same dodge plan to investigate and get hold of the exposed documents and figure out who might be responsible for accessing them.

In 2013, Tiversa famously tried to stop the publication of the tell-all book, The Devil Inside the Beltway, authored by LabMD’s CEO Michael J. Daugherty. The FTC had slapped LabMD and filed a data breach complaint against them, which is a medical cancer testing laboratory, after Tiversa said it found a leaked LabMD spreadsheet enclosing personal information on more than 9,000 customers on a P2P network.

According to Wallace, Tiversa did this by using phony IP addresses — on the orders of Tiversa’s CEO, Bob Boback. The company, which works closely with law enforcement, would look up the Internet addresses that were used by known criminals or identity thieves, then claim that those IP addresses were sharing stolen files online. Wallace said it was a scare tactic that added “spread” to the supposed damage — and “wow factor,” reported by CNN Money.

“So, to boil this down, you would make the data breach appear to be much worse than it actually had been?” FTC Administrative Judge Michael Chappell asked.

“That’s correct,” Wallace responded.

Tiversa told LabMD about the crack and black mailed the lab to pay it for “incident response” services, but the lab denied and then Tiversa dispensed the info to the FTC.

  • Tags
  • Cyber Crime
  • cyber security
  • Scam
  • security
  • Tiversa
Facebook Twitter LinkedIn Pinterest
Previous article 80 funny, creepy, strange, disturbing Google Street View Images
Next article Facebook users hit with See 'What Happens to this Pregnant Lady' video scam
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism

Related Posts
Hackers hit Microsoft Exchange Server to steal email data

Hackers hit Microsoft Exchange Server to steal email data

Crypto firm Tether claims hackers have demanded $24m in ransom

Crypto firm Tether claims hackers have demanded $24m in ransom

Botnet Abusing Bitcoin Blockchain To Evade Detection

Botnet Abusing Bitcoin Blockchain To Evade Detection

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Flaw allowed bypassing verification code, log in to any Microsoft account
Microsoft

Flaw allowed bypassing verification code, log in to any Microsoft account

Hackers hit Microsoft Exchange Server to steal email data
Cyber Crime

Hackers hit Microsoft Exchange Server to steal email data

Gootloader exploits websites via SEO to spread ransomware, trojans
Security

Gootloader exploits websites via SEO to spread ransomware, trojans

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us