Security News > 2023 > December > A tale of 2 casino ransomware attacks: One paid out, one did not

From the outside, at least, it appears that Caesars suffered minimal pain and business disruption primarily because it decided to pay the ransom.
"Paying a ransom is like cutting the cheese in a packed elevator: it makes other people suffer," Emsisoft threat analyst Brett Callow told The Register.
"Put simply, companies that pay keep ransomware alive and ensure other companies will be attacked. If nobody paid, there'd be no more ransomware."
There are a number of factors that play into a company's decision to pay or not pay a ransom, according to incident responders.
"In some cases we have worked, the organization refused to pay the ransom, and then the level of extortion that played out afterwards was so intense, the organization told us they regretted not just paying them in the first place," Rubin said.
FBI pumps 'significant' resources into snaring data-theft crew US officials close to persuading allies to not pay off ransomware crooks.
News URL
https://go.theregister.com/feed/www.theregister.com/2023/12/28/casino_ransomware_attacks/
Related news
- Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks (source)
- Hunters International ransomware claims attack on Tata Technologies (source)
- Toronto Zoo shares update on last year's ransomware attack (source)
- Ransomware gang creates tool to automate VPN brute-force attacks (source)
- SANS Institute Warns of Novel Cloud-Native Ransomware Attacks (source)
- ⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More (source)
- BlackLock ransomware claims nearly 50 attacks in two months (source)
- TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers ‘Apply Psychological Pressure” (source)
- Texas State Bar warns of data breach after INC ransomware claims attack (source)
- Sensata Technologies hit by ransomware attack impacting operations (source)