• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

7 Cases When Victims Paid Ransom to stop cyber attacks

September 9, 2016 by BIlaal Williams 4 Comments

This is an interesting article which talks about 7 cases where compromised ransomware victims paid to regain access to their data. The victim’s vary from police department’s to a Nascar race team. Payment was made via bitcoin, and in one of the cases, the attacks continued even after the ransom was paid. The attacks were made via DDoS attacks on an email service, and via infected computers from successful phishing scams. This article stresses the importance of security awareness training for employees, and backing up data in separate locations. Payment of ransom only encourages more ransomware campaigns so proactive solutions are imperative. The article also briefly talks about an anti-ransomware site  ‘No More Ransom’‘ which was created to assist Internet users by recovering their files for absolutely free to stop them from paying ransom to criminals.

https://www.hackread.com/top-7-cases-of-ransom-payments/

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Ahmed A. Alkaysi says

    September 9, 2016 at 2:48 pm

    I totally agree with your statement that paying the ransom will “encourage more ransomware campaigns..” However, I remember reading an article a few months back where a hospital”s information system was basically held hostage until a ransom was paid. It is one thing if a company like Target experienced a data breach, but it something entirely different when we are dealing with a life and death situation in the case of the hospital IT system being non-functional until a ransom is paid. In this case, I can understand where paying the ransom makes sense. However, like you said, in order to avoid these types of situations, there needs to be more awareness for the employees in terms of the security of their systems. There should also be controls in place which considers these types of issues.

    Log in to Reply
  2. BIlaal Williams says

    September 9, 2016 at 4:28 pm

    That definitely makes sense, according to the article, the FBI actually encourages victims to pay the ransom in most cases. So it really is a catch 22..and as you stated the more sensitive information , the more important it is to re-gain access to the data as soon as possible. Along with preventative measures and controls, I’m hoping that sites such as ‘No More Ransom’ can provide additional assistance to victims and help to mitigate ransomware campaigns.

    Log in to Reply
  3. Loi Van Tran says

    September 10, 2016 at 10:41 pm

    Bilaal, thanks for the post.

    I just read on ZDNet that ransomware is now the biggest cybersecurity threat mainly because it uses simple attack and the willingness of its victims to pay to unlock their files. This willingness makes it more profitable for cybercriminals to use ransomware for a quick profit. Even the FBI encourages victims to just pay. This is definitely not the best way to battle against these types of attacks. Even if the attackers gave you the key to unlock your files, they have already infiltrated your network and probably have a back door to your systems. What’s to stop them from locking it again?

    Log in to Reply
  4. Wade Mackey says

    September 12, 2016 at 9:10 pm

    I have to second the comment about the FBI. I’ve been in the room when the agent essentially says something like “Don’t quote me, but I’d pay it”.

    Wade

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in