First step in fighting ransomware? Stop paying the cyberthieves | Editorial

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Running a business or a government agency is difficult enough during the pandemic. Imagine being broadsided by a ransomware attack.

All at once, computer screens freeze. A cybergang pops up to explain the methodology for paying the ransom in cryptocurrency, and what happens if the requisite bitcoins never show up.


This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAmt?4CJAE:@? H:== [email protected]>3 8:823JE6D @7 52E2] [email protected]:2= $64FC:EJ ?F>36CD[ 5C:G6C’D =:46?D6 ?F>36CD[ >65:42= :[email protected]>2E:@? 2?5 @E96C [email protected]?2= 52E2 H:== 86E DA:==65 @FE @?=:?6 [email protected] :56?E:EJ E9:6G6D 2?5 @E96C 4C:>:?2=D [email protected] [email protected]] qFD:?6DD6D [email protected]=5 [email protected] 32?<CFAE[ [email protected]?>6?E @A6C2E:@?D [email protected]=5 D6:K6 FA]k^Am

[email protected]>6 [email protected]>A2?:6D 2?5 [email protected]?>6?E [email protected]:6D 92G6 DF44F>365 [email protected] 4J36C E9:6G6D’ 56>2?5D] x==:[email protected]:D [email protected]?6J v6?6C2= zH2>6 #[email protected]= @AE65 [email protected] [email protected] A2J] w:D @77:46 H2D 9:E @? pAC:= `_ H:E9 2 [email protected]>H2C6 2EE24< E92E[ [email protected]:?8 [email protected] E96 924<6CD[ 2>@F?E65 [email protected] 2 E967E @7 [email protected] a__ 8:823JE6D @7 52E2] %96 82?8[ H9:49 42==65 :ED6=7 [email protected]=!2J>6C[ E9C62E6?65 [email protected] C6=62D6 E96 52E2[ [email protected]>6 @7 H9:49 [email protected]?E2:?65 [email protected]?2= :56?E:EJ :[email protected]>2E:@?]k^Am

kAm“*6D[ :E 2?86CD >6] *6D[ :E 7CFDEC2E6D >6[ 2?5 >@DE 46CE2:?=J[ :E’D 6>32CC2DD:?8 [email protected] 92G6 :E 92AA6? [email protected] [email protected] 286?4J[” #[email protected]= [email protected]=5 E96 r9:[email protected] %C:3F?6 2?5 E96 q6EE6C [email protected]?>6?E [email protected]:2E:@?] w6 [email protected]=5?’E 5:GF=86 E96 [email protected]> [email protected][ 3FE 96 D2:5 E92E “H92E6G6C E96 2>@F?E H2D[ :E’D @FC A9:[email protected]@A9J 2D 2 DE2E6 9625 =2H [email protected]>6?E 286?4J E92E A2J:?8 4C:>:?2=D :D [email protected] [email protected]>6E9:?8 H6 [email protected] 2?5 [email protected] [email protected]>6E9:?8 H6 [email protected]?E6>A=2E6 [email protected]:?8]”k^Am

kAm%92E’D 962CE6?:?8 [email protected] 962C] !2J:?8 [email protected]> [email protected] 4J36C E9:6G6D :D E2?E2>@F?E [email protected] [email protected]:?8 49F> :? E96 H2E6C] pD >@C6 924<65 6?E:E:6D 42A:EF=2E6[ 2 [email protected]:?8 ?F>36C @7 924<6CD 2?5 4C:>:?2= @FE7:ED H:== 36 52KK=65 3J E96 62D6 @7 E96 4C:>6 2?5 H:== H2?E :? @? E96 24E:@?] pD :ED @H? 6?E6CAC:D6[ [email protected]>H2C6 92D [email protected]=G65 [email protected] E96 [email protected]:?E E92E 4J36C4C:>:?2=D [email protected] [email protected] E96 [email protected]>H2C6 2C6 [email protected] C6?E:?8 @C D6==:?8 :E [email protected] =6DD E649D2GGJ 325 8FJD [email protected] F?=62D9 E96 2EE24<D 2?5 [email protected]==64E E96 >@?6J]k^Am

kAms6762E:?8 E96 [email protected] @7 [email protected]>H2C6[…

Source…