Ransom Money

If You Pay a Hacker Ransom Money, You’re Still Gonna Have a Bad Time

Ransom Money: Why Paying Hackers Won’t Save You

A troubling trend in cybersecurity is the growing threat of ransomware and distributed denial-of-service (DDoS) attacks. With cybercriminals constantly on the prowl, businesses must stay informed on how to defend themselves against these digital extortionists. Many victims of ransomware and DDoS attacks believe that handing over ransom money is the quickest way to resolve the issue. But here’s the hard truth: it’s not.

The Rise of Ransomware and DDoS Attacks

Ransomware and DDoS attacks have surged in popularity among cybercriminals. A DDoS attack can cripple an organization’s online infrastructure, rendering critical services inoperable until the attack subsides. During this time, hackers demand ransom money in exchange for stopping the attack. In theory, paying should bring an end to the assault and restore services. But what happens when the hackers take the ransom money and continue the attack anyway?

Why Paying Ransom Money Is a Risky Move

Businesses must consider this scenario carefully before succumbing to a hacker’s demands. There are no guarantees that paying the ransom money will end the attack. Cybercriminals are often ruthless and thrive on causing chaos. The ransom money you pay could simply embolden them to continue, knowing they’ve found an easy target. In the worst-case scenario, you hand over the cash, and they persist with their assault, reveling in the destruction they leave behind.

A Real-World Example: The ProtonMail Attack

Take the case of ProtonMail, an encrypted email service based in Switzerland. On November 3rd, ProtonMail was hit by a massive DDoS attack from a hacker group known as the Armada Collective. Initially, the company dismissed the threats, thinking them insignificant. However, the attack quickly escalated, overloading its servers with traffic and halting operations entirely, even preventing legitimate messages from being delivered.

As reported by ZDNet:

The encryption service says the assault reached 100Gbps and not only attacked the ProtonMail datacenter but routers in Zurich, Frankfurt, and other locations linked to the ISP—eventually bringing down the data center and ISP. This not only took down ProtonMail, but other companies were affected, too.

Under pressure, ProtonMail ultimately paid $6,000 in ransom money, hoping to protect those affected by the attack. However, the payment did nothing—the attack continued. That $6,000 was lost, along with the significant costs incurred from the downtime. This case highlights why businesses should never rush to pay ransom money without exploring alternative solutions.

Protecting Your Business from Cyber Extortion

When faced with ransomware or DDoS threats, the best strategy is to take preventative measures before an attack occurs. Implementing strong cybersecurity defenses can make all the difference. If your organization is targeted, don’t make any rash decisions—contact Vision Computer Solutions, your trusted technology consultant, before paying any ransom money.

Cyberattacks will only continue to evolve, but by staying proactive, businesses can avoid becoming victims. To learn more about how your company can strengthen its defenses against cyber extortion, call Vision Computer Solutions at (248) 349-6115.

TUNE IN
TECHTALK DETROIT