I too feel that the CISO is being framed. Plus, how can any CISO be that naive or dumb to have officially negotiated such things on record? We are talking about a CISO here, not someone fresh out of college. On another note, if the CISO is being made a "bakra" here, perhaps we need to look deeper. Is this an attempt to take the focus away from something more important? Like the breach itself? Sometimes the most honest people in the system are made targets and made scapegoats. All in all, there is no credibility to this, and it's unfortunate that most people from the Media, do not apply their brains or do enough research when writing stories on cyber security incidents.
Fake - Fake - Fake. I will pay 3,13337 INR to anyone who can bring any credible information about the hacker xenZen identity. Two weeks ago, the press reported, based on evidence shared by a hacker named xenZen, that the Star Health CISO leaked data to a hacker. The argument that the CISO sent the database using his official email ID itself is absurd. But the press is now running on that story. And the hacker xenZen is pushing this story to all media houses - look at the screeshot. Two weeks ago, we posted our analysis blog and confirmed two things: 1) The Star Health data leak was legitimate. 2) However, we found that the Chief Information Security Officer (CISO) did not leak the data. Rather, the hacker framed the CISO by fabricating evidence. Security breaches like the one mentioned above are terrible, but making a CISO the scapegoat is even worse. If a malicious hacker can hack a database and frame the security team, then I don’t think we are heading in the right direction. At the time of writing (2 weeks ago), Star Health was not a CloudSEK customer. Since then, Star Health has reached out, and we have been helping them, but they are still not our customer. And we will help them free of cost until we bring justice to this matter. We have already taken down the hacker's leak site, but he has created other mirror sites. I will keep you posted on this matter. My post - https://lnkd.in/gYH9YBNp Our blog - https://lnkd.in/giX_bckq"
Senior management can do many better things 😉 than this to circumvent the process or system for laundering the money. But this is absolutely an unconvincing rational the threat actor is trying to establish, doesn't sit right.
Agree to the points shared above.
Valid point
Investor | Business Mentor | DigiPreneur | AcquirePreneur I buy, invest, leverage, grow, scale + exit businesses
1moIMHO,, Based on the language in the email and the strategic intent of tarring talent from our country as incompetent and unprofessional, I see 3 players who might pursue this approach. 1) a neighbour in the N/NE, 2) a neighbour in the west trying to punch way above it's weight and 3) a major power in decline and which hates competition from India.To me this seems more of a targeted digital influence op rather than an attack on an.indian entity. Except more of the same as India grows in.ascendancy. I am surprised no one pointed this angle earlier.