A Ransomware What-If: What Do You Do When Hackers Strike?

Date: 11/05/2018

There were more than 184 million ransomware attacks around the world last year, and there’s no sign that this type of cybercrime is slowing down. If anything, the effectiveness and lucrative payouts for hackers could mean even higher numbers of attacks in the coming months.

Are you prepared? Is your workplace?

The first step is to understand how ransomware works. The culprits behind the attack can be some of the most sophisticated hackers in their field, or they may be nothing more than a low-level user who has purchased some malicious software on the Dark Web. A highly-skilled hacker can infiltrate your network, while a less adept cybercriminal relies on getting you to install the malicious software for them through a phishing email or other social engineering.

Once the harmful software is on your network, though, your files and system are locked up tight. The only way to regain access—and restore day-to-day business—is to pay the ransom and hope the criminal decides to give you the necessary decryption key. (In too many cases, the thieves made off with the ransom and refused to unlock the victim’s computers.)

One recent profile of ransomware victims demonstrated a couple of different approaches to dealing with an attack. In one instance, a city government was infiltrated; they decided to pay the ransom and hope for the best. In the other case, city officials decided not to pay the ransom and instead rely on the backups of their important files.

So who was right? It doesn’t matter. Every ransomware attack and every victim are different, so making a sound decision about recovery should be the work of the victim, law enforcement, and security experts.

But here are some things to consider:

  • While businesses are more likely to provide a bigger payout, criminals know that individuals might pay up in order to retrieve their precious photos, videos, stored content, and more.
  • Paying the ransom is absolutely no guarantee that a hacker will decrypt your files or unlock your computer.
  • The best defense against this kind of attack is to routinely back up all of your files and important folders.
  • Ensuring that you, your family members, and your company’s workforce can spot a phishing attempt and avoid installing harmful software will also help protect you.
  • A company-wide policy about never downloading unknown files, never clicking on links in emails, never opening unexpected attachments, and other dangerous behaviors can also secure your network from this kind of attack.

No matter what steps you take, it’s important to stay on top of cyberthreats and scam attempts. Regular company training and a comprehensive company-wide computer use policy can help protect your business network, and monitoring computer use at home can do the same. As always, installing and updating a strong antivirus solution to block these threats is important, too.


Contact the Identity Theft Resource Center for toll-free, no-cost assistance at (888) 400-5530. For on-the-go assistance, check out the free ID Theft Help App from ITRC.

How much information are you putting out there? It’s probably too much. To help you stop sharing Too Much Information, sign up for the In the Loop.

Get ID Theft News

Stay informed with alerts, newsletters, and notifications from the Identity Theft Resource Center