Don’t Pay Ransomeware Payments After Cyberattacks – Technology

[ad_1]

“It is our policy, it is our guidance, from the FBI, that companies should not pay the ransom for a number of reasons,” Christopher Wray testified under questioning from members of the House Judiciary Committee.

Besides the fact that such payments can encourage additional cyberattacks, victims may not automatically get back their data despite forking over millions, “and that’s not unknown to happen,” Wray said.

UNITED STATES - June 10: Federal Bureau of Investigation Director Christopher Wray before the House Judiciary Committee for i



UNITED STATES – June 10: Federal Bureau of Investigation Director Christopher Wray before the House Judiciary Committee for its hearing on “Oversight of the Federal Bureau of Investigation in Washington on Thursday, June 10, 2021. (Photo by Caroline Brehman/CQ-Roll Call, Inc via Getty Images)

In ransomware attacks, hackers lock up and encrypt a victim’s data and demand a payment in order to return it. They have proliferated in scale over the past year, targeting not just hospitals and police agencies but also critical infrastructure and vital industries. Some recent major corporate targets have responded by paying the ransom, fearing that a prolonged shutdown of their businesses could have catastrophic consequences for the country and disrupt crucial supply chains.

Colonial Pipeline, which transports about 45 percent of fuel consumed on the East Coast, last month paid a ransom of 75 bitcoin — then valued at roughly $4.4 million — in hopes of getting its system back online.

On Wednesday, JBS SA, the world’s largest meat processing company, revealed that it had paid the equivalent of $11 million to hackers who broke into its computer system last month.

Colonial Pipeline CEO Joseph Blount told lawmakers this week that the decision to pay the ransom was the hardest choice of his career but ultimately the right thing to do, particularly given the gas shortages that surfaced within days in parts of the United States. He said that although the key the company was given to decrypt its data did not work perfectly, Colonial has resumed operations after a brief shutdown.

“There are a whole bunch of things we can do to prevent this activity from occurring, whether they pay the ransom or not, if they communicate and coordinate and work closely with law enforcement right out of the gate,” he said. “That’s I think the most important part.”

[ad_2]

Source link