Police warns companies not to pay cyber ransoms

With ransomware cases escalating, police are advising companies not to comply with hacker requests

Cyber crime posted within binary code

Police have warned companies not to pay hackers if they demand a ransom, after criminals threatened the child of a senior employee at an Australian company.

The company in question complied with the hacking group's request to pay out thousands of dollars after its systems were hacked and sensitive data was stolen.

When the company paid the ransom, the hackers changed their minds and began threatening a senior employee at the company and their family.

Police said the hackers: "profiled a senior member of the organisation, identified their family and threatened to discredit members of his family through online attacks particularly targeting a child."

Acting assistant commissioner Brian Hay said: "This was a very serious attack on an organisation and quite traumatic for the business, the victim and his family. We are strongly urging business to ensure their computer systems are secure and protected from hackers, that they adopt a policy of not paying ransom demands and carefully consider the information posted on social media."

The warning comes at the same time as a security researcher at Check Point uncovered a new decryption ransomware threat. Natalia Kolesova said the scam, called Troldesh, involves a hacker encrypting a victim's files, forcing them to pay a fee for the files to be subsequently decrypted. While investigating the threat, Kolesova was able to bargain with the hacker to get a discount on the ransom.

However, even this can be dangerous for enterprises to get into. Hays advised organisations to put protocols in place in order to deal with incidents should they occur in the first place: "Organisations need to think about putting in place a strategy to counteract or respond to these types of incidents. But the one message that I cannot stress enough is to never comply with extortion demands and report these matters to us immediately."

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

5 May 2021
Security researchers take control of a Tesla via drone
ethical hacking

Security researchers take control of a Tesla via drone

5 May 2021
Best free malware removal tools 2021
Security

Best free malware removal tools 2021

5 May 2021
Acuant acquires identity verification provider Hello Soda
mergers and acquisitions

Acuant acquires identity verification provider Hello Soda

4 May 2021

Most Popular

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

30 Apr 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021