First step in fighting ransomware? Stop paying the cyberthieves | Editorial
Running a business or a government agency is difficult enough during the pandemic. Imagine being broadsided by a ransomware attack.
All at once, computer screens freeze. A cybergang pops up to explain the methodology for paying the ransom in cryptocurrency, and what happens if the requisite bitcoins never show up.
kAmt?4CJAE:@? H:== 6?E@>3 8:823JE6D @7 52E2] $@4:2= $64FC:EJ ?F>36CD[ 5C:G6C’D =:46?D6 ?F>36CD[ >65:42= :?7@C>2E:@? 2?5 @E96C A6CD@?2= 52E2 H:== 86E DA:==65 @FE @?=:?6 7@C :56?E:EJ E9:6G6D 2?5 @E96C 4C:>:?2=D E@ 56G@FC] qFD:?6DD6D 4@F=5 8@ 32?<CFAE[ 8@G6C?>6?E @A6C2E:@?D 4@F=5 D6:K6 FA]k^Am
kAm$@>6 4@>A2?:6D 2?5 8@G6C?>6?E 3@5:6D 92G6 DF44F>365 E@ 4J36C E9:6G6D’ 56>2?5D] x==:?@:D pEE@C?6J v6?6C2= zH2>6 #2@F= @AE65 ?@E E@ A2J] w:D @77:46 H2D 9:E @? pAC:= `_ H:E9 2 C2?D@>H2C6 2EE24< E92E[ 244@C5:?8 E@ E96 924<6CD[ 2>@F?E65 E@ 2 E967E @7 23@FE a__ 8:823JE6D @7 52E2] %96 82?8[ H9:49 42==65 :ED6=7 s@AA6=!2J>6C[ E9C62E6?65 E@ C6=62D6 E96 52E2[ D@>6 @7 H9:49 4@?E2:?65 A6CD@?2= :56?E:EJ :?7@C>2E:@?]k^Am
kAm“*6D[ :E 2?86CD >6] *6D[ :E 7CFDEC2E6D >6[ 2?5 >@DE 46CE2:?=J[ :E’D 6>32CC2DD:?8 E@ 92G6 :E 92AA6? E@ J@FC 286?4J[” #2@F= E@=5 E96 r9:428@ %C:3F?6 2?5 E96 q6EE6C v@G6C?>6?E pDD@4:2E:@?] w6 H@F=5?’E 5:GF=86 E96 C2?D@> D@F89E[ 3FE 96 D2:5 E92E “H92E6G6C E96 2>@F?E H2D[ :E’D @FC A9:=@D@A9J 2D 2 DE2E6 9625 =2H 6?7@C46>6?E 286?4J E92E A2J:?8 4C:>:?2=D :D ?@E D@>6E9:?8 H6 5@ 2?5 ?@E D@>6E9:?8 H6 4@?E6>A=2E6 5@:?8]”k^Am
kAm%92E’D 962CE6?:?8 E@ 962C] !2J:?8 C2?D@> E@ 4J36C E9:6G6D :D E2?E2>@F?E E@ E9C@H:?8 49F> :? E96 H2E6C] pD >@C6 924<65 6?E:E:6D 42A:EF=2E6[ 2 8C@H:?8 ?F>36C @7 924<6CD 2?5 4C:>:?2= @FE7:ED H:== 36 52KK=65 3J E96 62D6 @7 E96 4C:>6 2?5 H:== H2?E :? @? E96 24E:@?] pD :ED @H? 6?E6CAC:D6[ C2?D@>H2C6 92D 6G@=G65 E@ E96 A@:?E E92E 4J36C4C:>:?2=D H9@ 56G6=@A65 E96 C2?D@>H2C6 2C6 ?@H C6?E:?8 @C D6==:?8 :E E@ =6DD E649D2GGJ 325 8FJD H9@ F?=62D9 E96 2EE24<D 2?5 4@==64E E96 >@?6J]k^Am
kAms6762E:?8 E96 D4@FC86 @7 C2?D@>H2C6[…