FBI: Don’t Pay Bitcoin Ransomware

The FBI has changed its stance on ransomware extortionists saying people targeted should refuse to pay the bitcoin ransom despite a previous statement from the FBI encouraging victims to pay a ransom.

At a recent Federal Trade Commission’s Fall Technology Series, supervisory special agent for the FBI’s Cyber Division, Will Bales, said that businesses or individuals targeted by ransomware should refuse to pay the ransom, as reported in Dark Reading.

According to the US Justice Department, ransomware attacks quadrupled in 2016 with an average of 4,000 per day. The FBI has previously revealed that ransomware costs amounted to $209 million in the first three months of this year. This is compared to a total of $24 million for the twelve months of 2015.

PhishMe research found that 93 percent of phishing emails now contain some form of ransomware.

The FBI Changes Its Advice

It seems that the FBI has had a change of heart regarding its advice with ransomware extortionists. Victims are now being asked to contact the FBI with any information they have to help advance the FBI’s ransomware investigation.

Earlier this year, CCN reported that a Canadian university had to pay a ransom amounting to $20,000 Canadian dollars in bitcoins to receive the keys to restore its data.

While three banks and a pharmaceutical company in India were targeted by ransomware extortionists who demanded a ransom in bitcoin last year.

A police department in Massachusetts also found itself the target of ransomware after the Melrose Police Department had to pay one bitcoin in ransom to regain access to its files.

Additionally, at the beginning of the year,  the Charity Commission in the UK issued an alert to all charities about an extortionist group demanding payments in bitcoin. The group, RepKiller Team, stated that if they didn’t receive bitcoin payments from £300 – £500, those targeted would face cyberattacks.

For now, the FBI seem to be issuing the correct advice.

Cryptocoinsnews

 

« Cloud-Based Malware Now Delivers Ransomware
You Have Big Data, Or Perhaps Just Too Much Data? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation

UCD Centre for Cybersecurity and Cybercrime Investigation is Europe's leading centre for research & education in cybersecurity, cybercrime and digital forensics.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

Segment

Segment

Segment provides a range of services and solutions for all companies which have a need for data protection and IT security.

Zeichner Risk Analytics (ZRA)

Zeichner Risk Analytics (ZRA)

ZRA is a small business with over 20 years of experience in cybersecurity, risk management, program management, strategic planning, and law and policy.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

Packetlabs

Packetlabs

Packetlabs specializes in penetration testing services and application security.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.