'If you pay, you're fuelling global organised crime'

Discussion in 'malware problems & news' started by ronjor, Jun 24, 2019.

  1. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,037
    Location:
    Europe
    ******** Let's not forget THE ENTIRE REASON they stopped supplying fuel is because their computer systems got hacked so they couldn't see who has to pay the bill for the fuel. So they stopped supplying the fuel because they couldn't keep track of the bills. NOT BECAUSE THEY COULDN'T SUPPLY. They stopped because they wouldn't make money of it, for their own personal gain!!!!!! If they cared about the country they would have kept supplying for a week or two while the systems are down even if they don't make money off of it, and then resume as normal. They're already rich as it gets. But no. It wasn't the hackers that made em stop, they CHOSE to stop the fuel supply THEMSELVES!!!!!!!!! And now saying ******** about the country.
     
  2. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    5,443
    Location:
    DC Metro Area
    "CNA Financial Paid $40 Million in Ransom After March Cyberattack

    CNA Financial Corp., among the largest insurance companies in the U.S., paid $40 million in late March to regain control of its network after a ransomware attack, according to people with knowledge of the attack, Bloomberg News reports...

    The Chicago-based company paid the hackers about two weeks after a trove of company data was stolen, and CNA officials were locked out of their network..."

    https://www.bloomberg.com/news/arti...-40-million-in-ransom-after-march-cyberattack
     
  3. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    5,443
    Location:
    DC Metro Area
    "Cyber insurance premiums rise as ransomware, hacks continue, GAO finds

    Growing number of cybersecurity incidents has led many insurers to raise premiums and some to limit coverage in especially risky areas, such as health care and education, according to new findings from a U.S. government watchdog...

    More than half of the brokers surveyed by an industry group said that their clients saw premiums increase between 10% and 30% in late 2020, the report noted...

    ...Insurers... reduce[d] cyber coverage limits for certain riskier industry sectors … and for public entities and to add specific limits on ransomware coverage...

    The GAO study also raises the prospect that the market may be leaving behind smaller businesses that can’t afford coverage..."

    https://www.cyberscoop.com/cyber-insurance-ransom-hack-payments-gao/
     
  4. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,037
    Location:
    Europe
    They literally have 1 purpose, to cover our damage, and they don't even do that, trying to get away from anywhere where they actually have to cover it. It's like their only goal is to make money and not to actually act as a proper insurance. Oh wait, that's how it is in the US. My bad.
     
  5. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    5,443
    Location:
    DC Metro Area
    "Exagrid pays $2.6m to Conti ransomware attackers

    Backup appliance specialist hit by Conti ransomware in May with cyber criminals downloading employee and customer data, confidential contracts and source code...

    Accession to the ransomware attacker’s demands was made more embarrassing when the backup appliance supplier – which makes a big play of its strengths against ransomware – accidentally deleted the decryption tool and had to ask for it again...

    Negotiations continued and lasted until 13 May. All through this period, the attackers shared files with ExaGrid via Sendspace to show what they had been able to access..."

    [Interesting read re: negotiations with attacker]

    https://www.computerweekly.com/news/252501665/Exagrid-pays-26m-to-Conti-ransomware-attackers
     
  6. xxJackxx

    xxJackxx Registered Member

    Joined:
    Oct 23, 2008
    Posts:
    6,244
    Location:
    USA
    Nope.
    Also, tell me again, why is this stuff connected to the public internet?
     
  7. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    112,841
    Location:
    Texas
    US recovers millions in cryptocurrency paid to Colonial Pipeline ransomware hackers
     
  8. longshots

    longshots Registered Member

    Joined:
    Oct 20, 2017
    Posts:
    290
    Location:
    Australia
    Spoken like a true believer.
    And, of course, if you were an employee you would gladly go to work for 2 - 3 - 4 weeks and be content about not being paid for any of that.
    All the bleeding heart posts in this forum regarding this subject are [probably] from people that have never owned or operated their own business.

    Ransomware has become a cost of doing business. A recent Randori survey that polled 400 security decision-makers across the US confirms that impression: among the companies that were hit by ransomware in the past two years, 47% have paid the ransom. I'm actually a little surprised by that number - I thought it would closer to 80%.

    I think you'll find that their only goal is to make money. It's a business.
    That's how they pay their staff - with profits.

    Ransomware premiums have risen approx 30% because of the attacks we are seeing. It's the old supply and demand principal.
    I would be very interested to know what your business plan is for insurance companies to "act as a proper insurance" AND also make money.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.