Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Pay a Hacker Ransom Money and Risk Getting Bamboozled Twice

b2ap3_thumbnail_distributed_denial_of_service_400.jpgRequesting a ransom from victims is an unfortunate trend gaining momentum in the hacking world. This is typically done using ransomware (where hackers encrypt data and request money for the key) and distributed denial of service attacks (where hackers threaten to overwhelm a system with traffic, thus knocking it offline). In both scenarios, hackers are looking for the victim to pay up, or else. Should they?

The answer should be obvious; absolutely not. However, when a person’s valuable data becomes encrypted or they receive a legitimate threat to take down their servers, emotions often get in the way and they’ll end up “paying the piper.” Hackers know this, which is why their ransom methods employ fear tactics.

For example, ransomware like CryptoLocker will lock the user out of their computer while the screen displays a clock counting down to when their data will be deleted. And with DDoS attacks, a hacker may contact the victim mid-attack and promise to cease the attack for a fee. Both of these situations play straight into a person’s irrational fear, causing them to cough up cash.

Before reaching for your credit card to pay a hacker’s demands, stop, take a deep breath, and think objectively about the situation. What guarantee do you have that these hackers will actually make good on their promise to turn over your data or cease the attack? This guarantee is only as good as a hacker’s word, which is pretty worthless seeing that, you know, they’re criminals. Therefore, whatever you do, DON’T GIVE MONEY TO A HACKER!

By paying hackers money, you’ll only add fuel to the fire and help fund the spread of their devious acts. Plus, there are several reported cases where a victim pays the ransom, only to still have their data deleted or the attacks on their site continue. What’s it to them if they go ahead and follow through with the attack? They have your money, so who cares? It’s a classic case of adding insult to injury.

Need proof? There’s a recent example of this happening to ProtonMail, a Switzerland-based email encryption service. On November 3rd, ProtonMail was threatened with a DDoS attack by the hacking group Armada Collective. Like many companies would do, they ignored the threat, deeming it to not be credible. Soon afterward, their servers became overloaded to the point where they had to cease operations.

As reported by ZDNet:

The encryption service says the assault reached 100Gbps and not only attacked the ProtonMail datacenter but routers in Zurich, Frankfurt and other locations linked to the ISP -- eventually bringing down the datacenter and ISP. This not only took down ProtonMail, but other companies were affected, too.

To get the attackers to stop, ProtonMail paid the hackers a $6,000 ransom. The hackers happily took their money and kept up the attack. In addition to losing a cool $6k, the company was out a vast sum for all the downtime they experienced.

How much would it cost your company if you lost revenue for a full day of work, and you still had to make payroll? For a medium-to-large sized company, losing a full day’s work would likely come to much more than a few thousand dollars. In fact, hackers understand how downtime can be so costly, which is why they feel justified asking for such an exorbitant fee.

What are you supposed to do if you were asked to pay a ransom by a hacker? The first thing you’ll want to do is contact the IT professionals at Total Tech Care. We’re able to take an assessment of the attack to determine how bad it is, and restore your data to a backed up version that’s not infected with malware. When facing a hack attack, we can present you with all the options you can take, none of which will include paying a hacker money.

Call us today at 866-348-2602 to learn more, and don’t give the hackers have the upper hand.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Social Media Gadgets Chrome Tech Term Virtualization Automation Managed IT Services Managed Service Microsoft Office Facebook Cybercrime Operating System Artificial Intelligence Computers BYOD Mobile Device Management Internet of Things Networking Health IT Support Wi-Fi Hacking Remote Information Technology Alert Covid-19 Managed Service Provider Information Spam Office 365 Telephone Systems Router Bandwidth BDR Employer-Employee Relationship Recovery Social Engineering Mobility Application Law Enforcement Human Resources Big Data Password Remote Monitoring Money Encryption Applications Mobile Computing App Data Breach History Training Government VPN Blockchain Private Cloud Paperless Office How To Remote Computing Managed IT Mobile Office Apps Data Storage Patch Management Office Tips Servers Website Budget Gmail Avoiding Downtime Settings Data Security Two-factor Authentication Bring Your Own Device Mouse Data Management HaaS Work/Life Balance Infrastructure Voice over Internet Protocol Flexibility Vulnerability Windows 7 Marketing Word WiFi Google Drive IT solutions Entertainment Wireless Keyboard The Internet of Things Vendor Management Lithium-ion battery USB Vendor Firewall Managed Services Staff Software as a Service Display Telephone System Save Time Machine Learning Virtual Reality Apple Connectivity Remote Work Social Employee/Employer Relationship Cleaning RMM User Error Meetings Conferencing End of Support Education Physical Security Scam Safety Risk Management Hacker Data Protection HIPAA Sports Redundancy Workplace Strategy Comparison Net Neutrality DDoS Proactive IT CES Help Desk SharePoint Unsupported Software Printing Best Practice YouTube Charger Black Market Content Management IT Consultant Business Technology Customer Service Access Control Compliance OneNote Environment Computer Care Managed Services Provider Humor Current Events Virtual Assistant Document Management Telephony Fax Server Authentication Database Solid State Drive Wireless Technology Samsung Downtime Remote Workers How to SaaS Value Processor Data storage Update Automobile Spam Blocking Electronic Medical Records Network Congestion Hard Drive Google Docs eWaste Computing Infrastructure Hiring/Firing Identity Theft Going Green Computing Virus Battery Augmented Reality Unified Threat Management Wearable Technology Retail Hard Drives Computer Accessories Shadow IT Fraud Legal Business Intelligence Instant Messaging Remote Worker Robot Excel Digital Signage Audit Internet Exlporer Worker IT Management Cryptocurrency Biometrics Virtual Desktop Botnet PDF Printer Procurement Bluetooth IT Plan GDPR Relocation Workers Hosted Computing Social Network Science Benefits FENG Wireless Internet Printer Server Online Shopping Investment IBM Employee/Employer Relationships Video Games File Sharing Employees Worker Commute Flash Camera Windows 365 Customer Relationship Management Inventory Smart Technology Specifications ISP Distributed Denial of Service Experience Wire Video Conferencing Analyitcs Evernote ROI Supercomputer Bitcoin Travel Shortcuts Scalability Software Tips Sales Programming Business Owner Sync Printers Point of Sale Emails Personal Millennials Cryptomining Smart Office Supply Chain Management NarrowBand Wireless Charging Batteries Antivirus Search Monitoring Virtual Private Network Windows 8.1 iPhone Netflix Digitize Windows 8 Two Factor Authentication Workforce IT service Root Cause Analysis Cables Windows Server 2008 R2 Knowledge Music HBO Customer relationships Skype Project Management Email Best Practices Consultant Files Nanotechnology IT Assessment Tablet Telecommuting Manufacturing Domains Data loss Analytics Chromecast Cortana Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Outlook Computer Tips IaaS Start Menu Warranty Virtual CIO Maintenance Best Available Colocation OneDrive Uninterrupted Power Supply Biometric Security WIndows 7 Screen Mirroring HVAC Peripheral Bloatware Loyalty Google Apps Frequently Asked Questions Digital Security Cameras Monitor Analysis Using Data Books Mobile Administrator Windows 10s Devices Copiers Tablets 5G Cast Enterprise Content Management Quick Tip Entrepreneur Tip of the week MSP Ergonomics Reputation webinar Accountants Streaming Media Emergency Smartwatch Content Professional Services Microchip Shortcut Public Cloud Thought Leadership Development Tech Support Employer Employee Relationship Credit Cards OLED Laptop Assessment Password Manager Virtual Machine Windows Media Player User Techology Password Management PCI DSS Cost Management PowerPoint Windows Server 2008 2FA Social Networking Customers Fiber Optics Multi-Factor Security Employee Audiobook Tools Search Engine Twitter Messaging Cabling Touchpad Television Business Mangement Hypervisor Managing Stress NIST Policy Dark mode Smart Tech Trend Micro Trending Running Cable Politics Advertising Addiction SMS Memory Cameras Amazon Default App Public Computer Recycling Saving Time Procedure Regulations Wiring dark theme Practices Shopping Notifications Transportation Google Search Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Criminal Bing Safe Mode FinTech

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code