Ransomware hackers are now calling up their victims to add pressure


As more and more people start backing up their files, hackers using malware have resorted to calling up their victims to pretend their backups are lost too. — Frank Rumpenhorst/dpa

The ingenuity of cybercriminals would appear to know no bounds. Hacker groups, forever devising perfidious new strategies to blackmail unsuspecting people with malware, are now even resorting to offline techniques to pressure their victims.

Of course, your best insurance against encryption attacks will always be a backup of your files. But hackers know that too.

If your files are being held ransom and you still don't come forward with the cash, then the hackers will assume you have backups. In this case, they may start ringing you up in person to make you worry about the safety of your backups, even if these are unaffected.

Since August this year, ransomware gangs have been cold-calling victims they suspect have backed-up data in an effort to sow doubt that their backups are safe, tech website ZDNet.com reports, citing anti-ransomware company Coveware.

The ransomware specialists believe various hacker groups are outsourcing these calls to one call centre of non-native English speakers.

Restoring your files from the backup is a waste of time, the hackers will tell the victim over the phone. The ransomware has long since taken control of your networked devices, they say, telling you the only way to get rid of them is to pay up.

"We continue to monitor and know that you are installing SentinelOne antivirus on all your computers," reads a transcript of one call Coveware shared with ZDNet.com.

"But you should know that it will not help. If you want to stop wasting your time and recover your data this week, we recommend that you discuss this situation with us in the chat or the problems with your network will never end."

Police and malware experts generally advise against being intimidated by blackmailers. Victims are generally advised never to pay money to the hackers, but to inform the police instead. Countless cases have shown that the victim cannot rely on the hackers to release the files after paying.

Anyone seeking technical assistance in encrypting their data should only trust reputable sources – such as the ID Ransomware project, which can often tell exactly which Trojan it is from an uploaded sample file. Knowing this is important if you want to start looking for an antidote.

One of the most important trusted archives that collects decryption tools and instructions is "No more Ransom", operated by Europol and IT security companies.

But be careful searching around online for help, as hackers have laid countless traps on the web. Other hackers are deliberately spreading fake decryption tools online. Download them, and you could be faced with yet another ransomware. – dpa

Article type: metered
User Type: anonymous web
User Status:
Campaign ID: 1
Cxense type: free
User access status: 0
Subscribe now to our Premium Plan for an ad-free and unlimited reading experience!
   

Next In Tech News

Siemens investigating report employee worked for Russian hacking firm
AI generator Midjourney pauses service over deepfake ‘abuse’
Taiwan says US officials have visited to discuss concerns about chip subsidies
Users hit by multiple unauthorised transactions hope banks will expedite refunds
Hong Kong police seek HK$5.2bil for new 5G system to handle ‘massive’ data gathered by frontline officers
Man used hidden cam to secretly video victims in fitting room, US cops�say
AirTag locates stolen bag at US airport, suspect arrested
Slip, sliding away: Video of two men jumping into river to save runaway car in China delights mainland social media
Hyundai offers free steering locks to combat TikTok thefts
Tweeters, and celebs, await ‘blue tick’ ultimatum

Others Also Read