zlacker

[parent] [thread] 5 comments
1. rollca+(OP)[view] [source] 2025-11-13 10:54:27
Never pay the ransom.

The extortionist knows they cannot prove they destroyed the data, so they will eventually sell it anyway.

They will maybe hold off for a bit to prove their "reputation" or "legitimacy". Just don't pay.

replies(1): >>wallet+q
2. wallet+q[view] [source] 2025-11-13 10:57:20
>>rollca+(OP)
If this is actually frequently happening, your claim should be pretty easy to prove. Most stolen databases are sold fairly publicly.

The ransom payments tend to be so big anyway that selling the data and associated reputational damage is most likely not worth the hassle.

Basic game theory shows that the best course of action for any ransomware group with multiple victims is to act honestly. You can never be sure, but the incentives are there and they’re pretty obvious.

The big groups are making in the neighbourhood of $billions, earning extra millions by sabotaging their main source of revenue seems ridiculous.

replies(2): >>rollca+Y2 >>wordpa+7G
◧◩
3. rollca+Y2[view] [source] [discussion] 2025-11-13 11:16:48
>>wallet+q
> reputational damage

Whoa. You're a crime organization. The data may as well "leak" the same way it leaked out of your victim's "reputable" system.

replies(1): >>wallet+o4
◧◩◪
4. wallet+o4[view] [source] [discussion] 2025-11-13 11:28:27
>>rollca+Y2
We’re talking about criminal organisations that depend on a certain level of trust to make any money at all.

Yes, the data might still leak. It’s absurd to suggest that it’s not less likely to leak if you pay.

There’s a reason why businesses very frequently arrive at the conclusion that it’s better to pay, and it’s not because they’re stupid or malicious. They actually have money on the line too, unlike almost everyone who would criticise them for paying.

◧◩
5. wordpa+7G[view] [source] [discussion] 2025-11-13 15:25:10
>>wallet+q
Do you think ransomware groups do referrals to their satisfied customers who paid and didn't have their data leaked?
replies(1): >>wallet+SM
◧◩◪
6. wallet+SM[view] [source] [discussion] 2025-11-13 15:54:29
>>wordpa+7G
Probably? They have pretty professional customer service pages.

However they don’t really need to because there are plenty of documented cases, and the incident response company you hire will almost certainly have prior knowledge of the group you’re forced to deal with.

If they had a history of fucking over their “customers”, the IR team you hired would know and presumably advise against paying.

[go to top]