Security News > 2023 > December > A tale of 2 casino ransomware attacks: One paid out, one did not
From the outside, at least, it appears that Caesars suffered minimal pain and business disruption primarily because it decided to pay the ransom.
"Paying a ransom is like cutting the cheese in a packed elevator: it makes other people suffer," Emsisoft threat analyst Brett Callow told The Register.
"Put simply, companies that pay keep ransomware alive and ensure other companies will be attacked. If nobody paid, there'd be no more ransomware."
There are a number of factors that play into a company's decision to pay or not pay a ransom, according to incident responders.
"In some cases we have worked, the organization refused to pay the ransom, and then the level of extortion that played out afterwards was so intense, the organization told us they regretted not just paying them in the first place," Rubin said.
FBI pumps 'significant' resources into snaring data-theft crew US officials close to persuading allies to not pay off ransomware crooks.
News URL
https://go.theregister.com/feed/www.theregister.com/2023/12/28/casino_ransomware_attacks/
Related news
- CISA warns of Jenkins RCE bug exploited in ransomware attacks (source)
- CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks (source)
- Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds (source)
- Most ransomware attacks occur between 1 a.m. and 5 a.m. (source)
- New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data (source)
- Lateral movement: Clearest sign of unfolding ransomware attack (source)
- BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave (source)
- U.S. Agencies Warn of Iranian Hacking Group's Ongoing Ransomware Attacks (source)
- Ransomware crisis deepens as attacks and payouts rise (source)
- Ransomware attacks escalate as critical sectors struggle to keep up (source)