this post was submitted on 14 Sep 2023
228 points (97.5% liked)
Technology
60115 readers
2373 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I wonder if this is a good decision - you have to be very afraid of the publication of this data to pay millions to blackmailers without being sure that they won't be at your door again soon.
It’s becoming the standard to just pay the ransom. Many large companies have a cybersecurity insurance policy anyways. Plus on the hackers side, they have a reputation to maintain. If word gets out that a specific group isn’t decrypting after payment, they will be less likely to get paid in the future.
This isn’t a crypto locker hack though where you can verify pretty immediately if they’re going to keep their word by them decrypting your data.
In this case the hackers actually physically have the data and are threatening to make it public if you don’t pay.
There’s no way to verify that they will never release it once you pay them. They could just sit on it for years after getting paid and then come back and say pay up again or they’ll release it.
Which is kinda what's happening now!
And this is why you don't negotiate with terrorists.