Skip to content
Primary Menu
  • GEORGE V MAGAZINE
    • NEUBAUER ARTISTS
      • ACCOUNT
        • LOGIN
        • LOGOUT
        • PASSWORD RESET
      • GEORGE FOUNDATION
      • TRAVEL BOOKINGS
      • SUSTAINABILITY
  • NEWS
    • News
    • Politics
    • Defense
    • World
    • Sports
    • Crime
  • FINANCE
    • Business
    • Neubauer Invest
    • Real Estate
    • Economy
    • Technology
    • Ownerships
    • Sponsored
  • ENTERTAINMENT
    • Neubauer Studios
    • Beauty
    • Celebrities
    • Fashion
    • TV & Films
    • Music
    • Health
  • LEISURE
    • Lifestyle
    • Travel
    • Jewelry
    • Arts
    • Sexual Wellness
    • Gastronomy
  • ROYALS
  • MARKETS
    • MARKET NEWS & FOREX INDEX
    • MARKET RESEARCH
    • GLOBAL HEAT TRADE MAP
    • INVESTMENTS
  • LIVE SCORES
    • Champions League
    • Europa League
    • EUROPEAN LEAGUES
      • Premier League
      • La Liga
      • Bundesliga
      • Ligue 1
      • Liga Portugal
      • Süper Lig
      • MLS
      • Serie A
      • Super League Greece
      • Eredivisie
      • Allsvenskan Sweden
      • Divisjon Norway
      • Veikkausliiga Finland
      • Superliga Denmark
    • SOUTH AMERICAN
      • Liga Argentina
      • La Liga MX
      • Serie A Brazil
    • Saudi League
    • Russian Cup
Light/Dark Button
GEORGE FM
  • Technology

George V Magazine In An Extortion By Tricksters “Ransomware Gang’s New Modus Operandi” Calling The Front Desk

In reality, the call recording just shows a somewhat hilarious and failed attempt to extort and intimidate a company’s rank-and-file employees. The recording also shows how ransomware gangs are always looking for different ways to intimidate the companies they hack.
Sylvia Klimaki Published: April 9, 2024 | Updated: April 9, 2024 3 minutes read
phone-desk-office-ransomware

Image Credits: William Whitehurst / Getty Images

Neubauer Artists LLC
Getting your Trinity Audio player ready...

When a hacker called the company that his gang claimed to breach, he felt the same way that most of us feel when calling the front desk: frustrated.

The phone call between the hacker, who claims to represent the ransomware gang DragonForce, and the victim company employee was posted by the ransomware gang on its dark web site in an apparent attempt to put pressure on the company to pay a ransom demand.

“It’s increasingly common for threat actors to make contact via telephone, and this should be factored into organizations’ response plans. Do we engage or not? Who should engage? You don’t want to be making these decisions while the threat actor is listening to your hold music,” said Brett Callow, a threat analyst at Emsisoft.

In the call, the hacker asks to speak with the “management team.” Instead, two different employees put him on hold until Beth, from HR, answers the call.

“Hi, Beth, how are you doing?” the hacker said.

After a minute in which the two have trouble hearing each other, Beth tells the hacker that she is not familiar with the data breach that the hacker claimed. When the hacker attempts to explain what’s going on, Beth interrupts him and asks: “Now, why would you attack us?”

“Is there a reason why you chose us?” Beth insists.

“No need to interrupt me, OK? I’m just trying to help you,” the hacker responds, growing increasingly frustrated.

The hacker then proceeds to explain to Beth that the company she works for only has eight hours to negotiate before the ransomware gang will release the company’s stolen data.

“It will be published for public access, and it will be used for fraudulent activities and for terrorism by criminals,” the hacker says.

“Oh, OK,” says Beth, apparently nonplussed, and not understanding where the data is going to be.

“So it will be on X?” Beth asks. “So is that Dragonforce.com?”

The hacker then threatens Beth, saying they will start calling the company’s clients, employees and partners. The hacker adds that they have already contacted the media and provided a recording of a previous call with one of her colleagues, which is also on the gang’s dark web site.

“So that includes a conversation with Patricia? Because you know, that’s illegal in Ohio,” Beth says.

“Excuse me?” the hacker responds.

“You can’t do that in Ohio. Did you record Patricia?” Beth continues.

“Ma’am, I am a hacker. I don’t care about the law,” responds the hacker, growing even more frustrated.

Then the hacker tries one more time to convince Beth to negotiate, to no avail.

“I would never negotiate with a terrorist or a hacker as you call yourself,” Beth responds, asking the hacker to confirm a good phone number to call them back.

When the hacker says they “got no phone number,” Beth has had enough.

“Alright, well then I’m just gonna go ahead and end this phone call now,” she says. “I think we spent enough time and energy on this.”

“Well, good luck,” Beth says.

“Thank you, take care,” the hacker says.

Original Article on TechCrunch


CUSTOMER QUERIES
ABOUT THE OWNER OF THIS MAGAZINE
PRINCE JORGE ‘GEORGE’ JIMÉNEZ NEUBAUER TORRES V
REACH OUT

Tower House,
Sovereign Park,
Market Harborough,
Leicestershire,
LE16 9EF
+ 44 (0) 1858 438884

About The Author

Sylvia Klimaki

Sylvia Klimaki

Focusing on climate, social impact, entrepreneurship. Have conducted over 380 interviews to date for print, online and broadcast media. She is based in London, United Kingdom.

See author's posts

What do you feel about this?

Post navigation

Previous: Sharon Osbourne Doubles Down On James Corden Criticism: “He’s Fair Game”
Next: Live As Your Dream, Or Be Content With What You Have?

Author's Other Posts

Eurobank Chairman George Zanias Announces Dividend After 16 Years EUROBANK

Eurobank Chairman George Zanias Announces Dividend After 16 Years

April 4, 2026
“Injection” of 16 Billion Euros Into 7 Strategic Sectors of The Greek Economy ba8c45c28fd675ed7b99dcae38af8019_XL

“Injection” of 16 Billion Euros Into 7 Strategic Sectors of The Greek Economy

April 4, 2026
Harvard Endowment Jumps To $53.2 Billion, Delivers 9.6% In Returns 1x-1

Harvard Endowment Jumps To $53.2 Billion, Delivers 9.6% In Returns

March 11, 2026
Duke Energy Partners With Brookfield Investment In Duke Energy Florida $87 Billion sr-duke-energy-florida-2

Duke Energy Partners With Brookfield Investment In Duke Energy Florida $87 Billion

March 5, 2026

Related Stories

Screenshot
  • Technology

Neubauer Corporation Releases GIO AI App

Susan Kane March 29, 2026
Screenshot 2026-03-22 at 6.18.30 PM
  • Technology

Zelda Fans Are Officially In Love With Ocarina

Susan Kane March 22, 2026
51247-101262-51055-100832-foxconn-xl-xl
  • Technology

Apple’s Suppliers Have So Far Spent $16 Billion To Move From China

Susan Kane March 15, 2026
tilly-norwood-take-the-lead-screenshot-billboard-1800
  • Music
  • Technology

AI-Generated ‘Actress’ Tilly Norwood Drops Music Video for ‘Take the Lead’: ‘I’m Just a Tool, But I’ve Got Life’

Eva Thomas March 11, 2026

You may have missed

st-georges-nelstrop-pedro-ximenez.jpg
  • Gastronomy

Pedro Ximénez Wines, Brandy, & Whiskey A Jiménez, Torres, Cordero, Hernandez Family Tradition

Los Angeles Times April 20, 2026
Screenshot
  • Lifestyle

Louis Vuitton Marks 130 Years of The Monogram With A Year-Long Celebration

Marie Courtois April 20, 2026
profimedia-0625922291
  • Beauty

The Body As A Project: Where Self-Care Ends And Pressure To Perform Begins

Calin Van Paris April 20, 2026
2ce11f09b74e1fe48c78f57d3587e3e0
  • Celebrities

Zendaya Reveals Why She Wore A ‘Wedding Dress’ To ‘The Drama’

Kara Nesvig April 20, 2026
  • NEUBAUER CORPORATION
  • WHO WE ARE
  • MEET THE TEAM
  • TERMS OF SERVICE
  • PRIVACY POLICY
  • REPRESENTED BY NEUBAUER PARTNER
All Copyright © 2026 All Rights Reserved.
George V Magazine
Manage Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions. We are proud to be a Woman Owned Business, certified by WBENC.

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}