A former employee of P2P cyber security firm Tiversa, turned whistleblower spilled the beans that the firm hacks its customers in order to fake bogus data breaches and then furthermore extorts its clients to finance its ‘incident response’ services.
The P2P cyber security firm Tiversa is once again in the news but for all the wrong reasons, this time it’s because a former employee turned inside mule Richard Wallace claimed that Tiversa “made false sham hacks and wrongfully forced their clients to buy its services.”Cyber security scam, an inside Informer reveals the firm extorts clients through bogus hacking:S
The company operates on a state level Tiversa delivers P2P Intelligence services to various corporations, individuals and government agencies built on its vastly patented technologies that are able to monitor over 550 million users issuing approximately 1.8 billion searches in a single day. Requiring basically no software or hardware, Tiversa can detect exposed files, retrieve copies, regulate file sources and assist backing in remediation and risk alleviation.
Tiversa came to light in 2007 when it claimed that highly confidential military documents, including some tracing back to the Pentagon, were being leaked through P2P software installed on sophisticated systems that stored the data.
In 2009, Tiversa said an Iranian IP address was partaking classified info that contained the infrastructures, triangulation and administration electronics on the helicopter in use of the President of the United States, Barack Obama. Then in 2011, Tiversa yet again claimed, that the website WikiLeaks may be manipulating a specific feature in peer-to-peer file-sharing applications to search for highly classified data.
The company is in fact appointed by governments and corporations to exploit the same dodge plan to investigate and get hold of the exposed documents and figure out who might be responsible for accessing them.
In 2013, Tiversa famously tried to stop the publication of the tell-all book, The Devil Inside the Beltway, authored by LabMD’s CEO Michael J. Daugherty. The FTC had slapped LabMD and filed a data breach complaint against them, which is a medical cancer testing laboratory, after Tiversa said it found a leaked LabMD spreadsheet enclosing personal information on more than 9,000 customers on a P2P network.
According to Wallace, Tiversa did this by using phony IP addresses — on the orders of Tiversa’s CEO, Bob Boback. The company, which works closely with law enforcement, would look up the Internet addresses that were used by known criminals or identity thieves, then claim that those IP addresses were sharing stolen files online. Wallace said it was a scare tactic that added “spread” to the supposed damage — and “wow factor,” reported by CNN Money.
“So, to boil this down, you would make the data breach appear to be much worse than it actually had been?” FTC Administrative Judge Michael Chappell asked.
“That’s correct,” Wallace responded.
Tiversa told LabMD about the crack and black mailed the lab to pay it for “incident response” services, but the lab denied and then Tiversa dispensed the info to the FTC.