Ransomware has become one of the most common types of cyber-crime, devastating individuals, businesses, and government agencies. Law enforcement has largely failed to catch or deter the hackers, who are usually foreign. But we found that U.S. companies, exploiting regulatory loopholes and sometimes misleading victims, have secretly abetted the rise of ransomware for their own profit.
Five months before DarkSide attacked the Colonial pipeline, two researchers discovered a way to rescue its ransomware victims. Then an antivirus company’s announcement alerted the hackers.
Wary of alarming investors, companies victimized by ransomware attacks often tell the SEC that “malware” or a “security incident” disrupted their operations.
Michael Gillespie is one of the world’s leading cybercrime fighters, and you’d never know it.
Thanks to Michael Gillespie, an obscure programmer at a Nerds on Call repair store, hundreds of thousands of ransomware victims have recovered their files for free.
Cybercriminals are zeroing in on the managed service providers that handle computer systems for local governments and medical clinics.
Even when public agencies and companies hit by ransomware could recover their files on their own, insurers prefer to pay the ransom. Why? The attacks are good for business.
We recently wrote about two U.S. firms that promised high-tech ransomware solutions but instead paid the cyber-attacker. A U.K. company appears to do the same.
The Trade Secret: Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers
As ransomware attacks crippled businesses and law enforcement agencies, two U.S. data recovery firms claimed to offer an ethical way out. Instead, they typically paid the ransom and charged victims extra.
Has your organization been hit by ransomware? Did you hire a data recovery firm? Do you know how an attack works from the inside? We’d like to hear from you.