DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Firms That Promised High-Tech Ransomware Solutions Almost Always Just Pay the Hackers

Posted on May 16, 2019 by Dissent

Renee Dudley and Jeff Kao report that two firms that advertised technology solutions to responding to ransomware incidents — Proven Data Recovery of Elmsford, New York and Florida-based MonsterCloud – were really just paying ransom to the attackers.

Read more on ProPublica.

I suspect that ransom payments have been the dirty little secret for the past three years or so. Once the FBI came out at one point and said it didn’t recommend paying ransom, I think firms were more hesitant to disclose that they had paid. Who wants to be named and shamed as a company encouraging attackers by paying them, right?

But payment seems to be happening a lot more than we might have guessed. As a lawyer from a prominent law firm that handles hundreds of breaches every year told me, it’s an economic/business decision.  What is it going to cost you if you don’t pay? That law firm also claims that in 94% of their cases, working decryption keys are obtained when victims pay the ransom.  Both that law firm  and a whitehat from an intel firm tell me that these days, they are seeing 7-figure ransom demands in some cases.

At this rate, I think that paying ransom may become the first option – instead of the last resort  option – for firms that don’t have backups that are usable or can’t afford what could be a lengthy disruption to their business or patient care.  So is every firm looking at their cyberinsurance policy to see if they have coverage to pay ransom in the event of a ransomware attack? Do they know how to obtain BTC in a hurry if they don’t have an incident response firm already on board and ready to react?

The times, they are a-changing.


Related:

  • Two years after an audit highlighted significant concerns, North Salem Central School District leaves sensitive student data at risk
  • Veradigm's Breach Claims Under Scrutiny After Dark Web Leak
  • Russian Police Bust Suspected Meduza Infostealer Developers
  • Massive Great Firewall Leak Exposes 500GB of Censorship Data
  • Landmark civil penalty of AU$5.8 million issued under Australia’s Privacy Act
  • How many courts have had sealed and sensitive files exposed by one vendor's error?
Category: Breach IncidentsCommentaries and AnalysesMalware

Post navigation

← Whistleblower lawsuit alleges hackers stole $515,000, and Fort Worth employee data was compromised in security breach
Ca: $60 million class-action lawsuit denied by judge →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.