Security News > 2023 > December > A tale of 2 casino ransomware attacks: One paid out, one did not
From the outside, at least, it appears that Caesars suffered minimal pain and business disruption primarily because it decided to pay the ransom.
"Paying a ransom is like cutting the cheese in a packed elevator: it makes other people suffer," Emsisoft threat analyst Brett Callow told The Register.
"Put simply, companies that pay keep ransomware alive and ensure other companies will be attacked. If nobody paid, there'd be no more ransomware."
There are a number of factors that play into a company's decision to pay or not pay a ransom, according to incident responders.
"In some cases we have worked, the organization refused to pay the ransom, and then the level of extortion that played out afterwards was so intense, the organization told us they regretted not just paying them in the first place," Rubin said.
FBI pumps 'significant' resources into snaring data-theft crew US officials close to persuading allies to not pay off ransomware crooks.
News URL
https://go.theregister.com/feed/www.theregister.com/2023/12/28/casino_ransomware_attacks/
Related news
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Casio confirms customer data stolen in a ransomware attack (source)
- Schools bombarded by nation-state attacks, ransomware gangs, and everyone in between (source)
- BianLian ransomware claims attack on Boston Children's Health Physicians (source)
- Microsoft: Ransomware Attacks Growing More Dangerous, Complex (source)
- Tech giant Nidec confirms data breach following ransomware attack (source)
- Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks (source)
- Ransomware Gangs Use LockBit's Fame to Intimidate Victims in Latest Attacks (source)