Started By
Message

re: Colonial Pipeline gave in: $5,000,000 paid to ransomware hackers

Posted on 5/14/21 at 9:06 am to
Posted by ArmydawgMD
Member since Sep 2020
464 posts
Posted on 5/14/21 at 9:06 am to
Cowards


How did they guarantee the hackers weren't pulling a Nigerian prince scheme and would fix the code after payment?
This post was edited on 5/14/21 at 9:28 am
Posted by Mingo Was His NameO
Brooklyn
Member since Mar 2016
25455 posts
Posted on 5/14/21 at 9:29 am to
quote:

How did they guarantee the hackers weren't pulling a Nigerian prince scheme and would fix the code after payment?



You're right dude! I bet they didn't even think about that!
Posted by Fat Batman
Gotham City, NJ
Member since Oct 2019
1413 posts
Posted on 5/14/21 at 9:36 am to
quote:

Cowards


How did they guarantee the hackers weren't pulling a Nigerian prince scheme and would fix the code after payment?


For a ransomware outfit, Darkside seems to care a lot about their reputation/PR. They offer tech support and even consulting on how to harden the victim's network after the ransom is paid

A Closer Look at DarkSide

As for being cowards, it is really a business decision and not a how bold/brave are you. Is it better/cheaper to pay the ransom, or can we get everything back up ourselves for cheaper (unlikely unless your business can be down for ~1000 years or you are a leader in the quantum computing sector), is it cheaper to restart from scratch.
This post was edited on 5/14/21 at 9:40 am
Posted by jdd48
Baton Rouge
Member since Jan 2012
22173 posts
Posted on 5/14/21 at 11:34 am to
quote:

Cowards


How did they guarantee the hackers weren't pulling a Nigerian prince scheme and would fix the code after payment?


Easy to say when you're not facing a possible extended shutdown and maybe even the company going under.
This post was edited on 5/14/21 at 11:35 am
Posted by BottomlandBrew
Member since Aug 2010
27247 posts
Posted on 5/14/21 at 12:58 pm to
quote:

How did they guarantee the hackers weren't pulling a Nigerian prince scheme and would fix the code after payment?


Because if word got out that they didn't unlock everything, then they'd never get another ransom payment again. To keep the scam going, you have to deliver on your side of things.

I said it in another thread related to this, but we got hit one time with ransomware, but we were back up within a couple hours because we had a solid recovery protocol. Granted we're smaller than Colonial, but still. Our IT guys nuked the system, did a restore, and we were good to go. It infected a couple dozen workstations, including our main manufacturing server. It was money well spent to be prepared.
first pageprev pagePage 1 of 1Next pagelast page
refresh

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram