Ransomware hackers are now calling up their victims to add pressure


As more and more people start backing up their files, hackers using malware have resorted to calling up their victims to pretend their backups are lost too. — Frank Rumpenhorst/dpa

The ingenuity of cybercriminals would appear to know no bounds. Hacker groups, forever devising perfidious new strategies to blackmail unsuspecting people with malware, are now even resorting to offline techniques to pressure their victims.

Of course, your best insurance against encryption attacks will always be a backup of your files. But hackers know that too.

If your files are being held ransom and you still don't come forward with the cash, then the hackers will assume you have backups. In this case, they may start ringing you up in person to make you worry about the safety of your backups, even if these are unaffected.

Since August this year, ransomware gangs have been cold-calling victims they suspect have backed-up data in an effort to sow doubt that their backups are safe, tech website ZDNet.com reports, citing anti-ransomware company Coveware.

The ransomware specialists believe various hacker groups are outsourcing these calls to one call centre of non-native English speakers.

Restoring your files from the backup is a waste of time, the hackers will tell the victim over the phone. The ransomware has long since taken control of your networked devices, they say, telling you the only way to get rid of them is to pay up.

"We continue to monitor and know that you are installing SentinelOne antivirus on all your computers," reads a transcript of one call Coveware shared with ZDNet.com.

"But you should know that it will not help. If you want to stop wasting your time and recover your data this week, we recommend that you discuss this situation with us in the chat or the problems with your network will never end."

Police and malware experts generally advise against being intimidated by blackmailers. Victims are generally advised never to pay money to the hackers, but to inform the police instead. Countless cases have shown that the victim cannot rely on the hackers to release the files after paying.

Anyone seeking technical assistance in encrypting their data should only trust reputable sources – such as the ID Ransomware project, which can often tell exactly which Trojan it is from an uploaded sample file. Knowing this is important if you want to start looking for an antidote.

One of the most important trusted archives that collects decryption tools and instructions is "No more Ransom", operated by Europol and IT security companies.

But be careful searching around online for help, as hackers have laid countless traps on the web. Other hackers are deliberately spreading fake decryption tools online. Download them, and you could be faced with yet another ransomware. – dpa

Article type: metered
User Type: anonymous web
User Status:
Campaign ID: 1
Cxense type: free
User access status: 3
Subscribe now to our Premium Plan for an ad-free and unlimited reading experience!
   

Next In Tech News

Qualcomm, GlobalFoundries sign pact to double chip manufacturing
Palantir forecast cut, surprise loss send shares down 15%
Crypto platform Zipmex to start releasing Bitcoin, Ether for customers
PM’s Telegram account hacked
‘How lovely he is’: adorable four-year-old Chinese boy delights millions for saluting policewoman helping him get identity card
Baidu CEO says EV arm's autonomous driving tech will be ahead of Tesla
How a cyber storm tore apart the life of Chinese influencer Zeng Ying
Crypto business leaving Japan due to high tax, entrepreneur says
Twitter breach exposed anonymous account owners
Demand for grocery delivery cools as food costs rise

Others Also Read