Close Menu

    Subscribe to Updates

    Get the latest tech news

    Facebook X (Twitter) Instagram
    TechArenaTechArena
    • Home
    • News
    • Reviews
    • Features
      • Top 5
    • Startups
    • Contact
    Facebook X (Twitter) Instagram
    TechArenaTechArena
    Home»News»Ransomware: Should you Pay?
    News

    Ransomware: Should you Pay?

    Kaluka wanjalaBy Kaluka wanjalaFebruary 16, 2017Updated:February 16, 20175 Mins Read
    Facebook Twitter Telegram LinkedIn WhatsApp Email Pinterest
    ransomware
    ransomware
    Share
    Facebook Twitter LinkedIn WhatsApp Telegram

    Ransomware maintained its attractiveness amongst cybercriminals in 2016. Of note is the steady growth on multiple platforms including mobile which essentially means every mobile device user is vulnerable as we enter 2017.

    According to research by Internet Security firm ESET, Android mobile device users have been targeted by various types of ransomware. Most frequently the police themed ransomware which tried to scare victims into paying up after (falsely) accusing them of harvesting illegal content on their devices.

    Many ransomware campaigns use phishing emails as an entry point and may arrive as part of another malware’s payload. Similarly an attack may be delivered by an exploit kit seeking vulnerabilities so as to install and execute the malware on the affected computer.

    To the trained eye, or protected computer, it is easier to spot and remove these emails and delivery methods before the attack is deployed.

    “Often, organizations realise they are under attack after the fact. At which point their data or documents have already been encrypted and an expensive demand note in untraceable Bitcoins, attached as a permanent screen saver on their computers“, says Teddy Njoroge, Country Manager, ESET East Africa.

    To Pay or Not To Pay

    Ransomware has turned into a multi billion dollar industry – meaning many attackers perpetrating the crime do in fact provide the encryption keys to unlock your data. If it became public knowledge that the perpetrators behind a particular strain of ransomware are not providing the necessary encryption keys, this would be bad for business.

    There are however a few unfortunate circumstances which may result in you still not getting your data back, even after you pay a hefty ransom – often running into many thousands of dollars.

    Firstly, many ransomware developers sell their code to syndicates and other criminals – some even provide simple to use web interfaces so anyone can reap a profit and earn them a percentage. In the case of the former though, you are relying on a twisted form of honour amongst thieves in the hopes that you’ll get the necessary keys to decrypt your data. They may very well be running short campaigns in order to extort various business and individuals only to disappear with your money.

    Secondly, not all code is created equal. There have been numerous examples of ransomware where the encryption process was flawed in some way, or where there is no key even being stored/transmitted after an infection which could be used for the decryption process. This is of huge concern and experts continue to do great work in analysing the processes and routines of these variants in order to publish their findings to prevent people from paying for an encryption key that won’t work, or worse, doesn’t even exist.

    Thirdly, if people continue to pay, the attackers will persist. Only by no one paying up will attackers eventually get the message that their ongoing efforts will not generate them any profit – to the benefit of all.

    It is worthy to note that some attacks have been well orchestrated – cyber-criminals often do research before targeting a particular entity or organisation in order to determine the size of the organisation and the likely payment that can be made based on the amount of data affected – even worse identifying those who may have paid for similar attacks in the past.

    “The best approach is for all to refuse to be bullied into making payments, no matter the demands. Understandably it is an easier decision to make if only one or two computers or websites are affected as opposed to an entire network of devices“, explains Njoroge.

    Pro-Active Internet Security

    Unfortunately as long as it remains profitable, ransomware will continue to be a problem, especially for emerging economies such as Kenya and the larger Africa. For this reason, precaution in the form of a robust internet security regime, supported by regular training of staff, based on an organization‘s cyber-risk profile would be a most preferred investment route.

    Driven from a policy perspective, it is advisable to add dealing with ransomware to the organization‘s disaster recovery (DR) plans. In addition there are cyber-insurance options that can help an organization start over in case of the cyber-risk being realized.

    A key component of DR is regular back-up of critical business data and documents at an offsite location. Based on the service level procured this should be done at regular intervals. ESET recommends StorageCraft as a world leading DR vendor – through proper implementation, in the event of ransomware infections, site wide disasters such as fires, floods and other events, one can restore business critical systems in minutes rather than hours or days.

    A proper DR investment can also cost significantly less than paying up for ransomware, let alone the loss of money from impacted systems being unavailable for extended periods of time.

    cybersecurity eset ransomware
    Kaluka wanjala
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    Editor at TechArena. I cover all things technology and review new gadgets as I get them. You can reach me on email: [email protected]

    Related Posts

    Cairo-based AI Startup Nanovate Raises $1M to Expand Across MENA

    October 18, 2025

    Vertiv Teams Up with PNY Technologies to Power Next-Gen NVIDIA AI Deployments in EMEA

    October 17, 2025

    LOOP Officially Launches LOOP FLEX, Its Buy Now, Pay Later Solution

    October 16, 2025

    Comments are closed.

    Latest Posts

    Cairo-based AI Startup Nanovate Raises $1M to Expand Across MENA

    October 18, 2025

    Vertiv Teams Up with PNY Technologies to Power Next-Gen NVIDIA AI Deployments in EMEA

    October 17, 2025

    LOOP Officially Launches LOOP FLEX, Its Buy Now, Pay Later Solution

    October 16, 2025

    How CSquared is Powering Africa’s Digital Backbone – An Interview with Napoleon Mengot

    October 16, 2025
    Advertisement
    Editor's Pick

    How CSquared is Powering Africa’s Digital Backbone – An Interview with Napoleon Mengot

    October 16, 2025

    Global Solar Panels Aren’t Enough: Why Supply Chains Hold the Key to Sustainability

    October 13, 2025

    Change leaders must put security at the heart of transformation

    October 13, 2025

    Westcon-Comstor’s Vincent Entonu: “Africa Is Not a Late Adopter of Technology”

    October 10, 2025
    © 2025 TechArena.. All rights reserved.
    • Home
    • Startups
    • Reviews

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.