zlacker

[return to "Checkout.com hacked, refuses ransom payment, donates to security labs"]
1. prodig+47[view] [source] 2025-11-13 10:24:20
>>Strang+(OP)
If i was a customer id be pissed off, but this is as good as a response you can have to an incident like this.

- timely response

- initial disclosure by company and not third party

- actual expression of shame and remorse

- a decent explanation of target/scope

i could imagine being cyclical about the statement, but look at other companies who have gotten breached in the past. very few of them do well on all points

◧◩
2. wallet+v8[view] [source] 2025-11-13 10:34:19
>>prodig+47
> as good as a response you can have to an incident like this.

From customer perspective “in an effort to reduce the likelihood of this data becoming widely available, we’ve paid the ransom” is probably better, even if some people will not like it.

Also to really be transparent it’d be good to post a detailed postmortem along with audit results detailing other problems they (most likely) discovered.

◧◩◪
3. tobyhi+Ea[view] [source] 2025-11-13 10:52:24
>>wallet+v8
I strongly disagree. Paying the ransom will put everyone in danger.
◧◩◪◨
4. wallet+Ra[view] [source] 2025-11-13 10:54:35
>>tobyhi+Ea
I would totally agree with you if we lived in a hypothetical world where ransomware payments aren’t super common anyway.

Until there is legislation to stop these payments, there will be countless situations where paying is simply the best option.

◧◩◪◨⬒
5. yreg+Pi[view] [source] 2025-11-13 11:58:27
>>wallet+Ra
> Until there is legislation to stop these payments, there will be countless situations where paying is simply the best option.

Paying the ransom is not exactly legal, is it? Surely the attackers don't provide you with a legitimate invoice for your accounting. As a company you cannot just buy a large amount of crypto and randomly send it to someone.

◧◩◪◨⬒⬓
6. mapont+Mp[view] [source] 2025-11-13 12:50:37
>>yreg+Pi
Most of the time the company doesnt pay directly.

They hire a third party, sometimes their cyber insurance provider, to "cleanup" the ransomware. That third party then pays another third party who is often located in a region of the world with lax laws to perform the negotiations.

At the end of the day nobody breaks any laws and the criminals get paid.

[go to top]