this post was submitted on 07 Nov 2023
58 points (95.3% liked)

Technology

59217 readers
3155 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 10 points 1 year ago* (last edited 1 year ago) (9 children)

Digging customers out from this is quite literally what I do for a living. Issues aren't always as simple as "don't pay."

The article seemed to be aimed at average desk workers. It didn't contain any data or suggestions not commonly told in phishing tutorials offered by companies.

This is an entry level explanation of a highly complex problem. I would suggest you send it to your grandma or a blue collar friend who doesn't work on computers.

[–] [email protected] 3 points 1 year ago (8 children)

I want to know -

  1. Do the kidnappers (I do not know the term) keep the promise?
  2. What happened after the paying the ransom money?
  3. What else are involved in addition to paying or not paying?
[–] [email protected] 3 points 1 year ago (1 children)

They will demand payment in cryptocurrency, usually bitcoin, which is untraceable. There's no guarantee that they will really keep their word; since it's completely anonymous, there's nothing you can do. If you get infected, you just have to accept that your files are gone. The best thing you can do is backup while you still can.

[–] [email protected] 4 points 1 year ago

Make sure some of your backups are kept offline (so that they won't be encrypted along with everything else) and also test that they work regularly! Otherwise they might not do what you think they do.

load more comments (6 replies)
load more comments (6 replies)