How to fight back against ransomware cybercriminals

How to fight back against ransomware cybercriminals

‘Crypto-ransomware has risen to levels some describe as epidemic.’ In this nifty infographic, F-Secure outline the five habits of successful ransomware cybercriminals and how to fight back against their attacks.

The crimeware market is highly commoditised, with many suppliers and distributors. It’s Malware As-A-Service and these crooks don’t even necessarily need to know how to code. Here are their secrets to success:

How to fight back against ransomware cybercriminals

5 Habits of successful Ransomware Cybercriminals

  1. Abandon all ethical and moral principles
    • They make money by causing other peoples’ misfortune. So first, they’ve got to get over their ethics.
  2. Go anonymous
    • They set up incognito accounts, anonymise their communications and use Bitcoin. They’re careful – because there are lots of ways to slip up.
  3. Establish a reputation underground
    • Reputation (of their anonymous alter ego) is everything. They hand around the Dark Web long enough to prove that they are “legit” net scum and not an FBI agent.
  4. Source the right stuff
    • Malware, spam vendor, bots. They’re also dependable for affiliates and suppliers to work with. (Otherwise they might get dumped.)
  5. Provide great customer service
    • They provide reliable service – a 100 per cent file decryption rate. Only if victims trust their promise will they actually get paid.

Five ways you can fight back

  1. Adopt a mindset of prevention
    • Remember, ransomware can only thrive when people and businesses aren’t prepared for it.
  2. Fight forward – with backups
    • The fight against ransomware begins before you’re ever hit, with reliable backups of your files.
  3. Keep your software up to date
    • Ransomware often exploits flaws in old software to edge in and take over your files.
  4. Beware of email
    • Be suspicious of attachments and links. The post office doesn’t send .zip files! A document asking you to “enable content” may be a trap.
  5. Run reliable security software
    • Use software with a layered approach that can block known ransomware variatns as well as brand new threats.

More from F-Secure
According to a recent experiment detailed in a new F-Secure report, Evaluating the Customer Journey of Crypto-Ransomware and the Paradox Behind ItRansomware criminals actually care about your convenience! The experiment involved evaluating the “customer experience” of five current crypto-ransomware variants, beginning with the initial ransom screen all the way to interacting with the criminals behind each of those variants.

The report’s findings include:

  • Those families with the most professional user interfaces are not necessarily also those with the best customer service.
  • Crypto-ransomware gangs are usually willing to negotiate the price. Three out of four variants were willing to negotiate, averaging a 29 per cent discount from the original ransom fee.
  • Ransomware deadlines are not necessarily “set in stone.” 100 per cent of the groups contacted granted extensions on the deadlines.
  • One of the groups claimed to be hired by a corporation to hack another corporation – a kid playing a prank, or a sinister new threat actor?

To read the full report, visit: Report: Evaluating the Customer Journey of Crypto-Ransomware and the Paradox Behind It

[su_button url=”https://www.f-secure.com/en_GB/welcome” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more information on F-Secure click here[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Dr Ilia Kolochenko, Partner and Cybersecurity Practice Lead, Platt Law LLP

Big Interview: Dr. Ilia Kolochenko, ImmuniWeb

Dr. Ilia Kolochenko, Chief Architect, ImmuniWeb and cybersecurity influencer, talks about the proposed mandatory reporting of ransomware..
Tenable

The Innovator – Tenable

Gavin Millard, Deputy CTO and VP of Market Insights at Tenable talks through one of the biggest security threats to businesses…
Hacker

Cybereason Warns Critical Infrastructure Operators

Cybereason today issued a global Threat Analysis Report investigating the Ragnar Locker ransomware gang and its attacks on networks.

Barracuda releases ransomware research

After identifying and analysing 106 highly publicised ransomware attacks over the past 12 months, Barracuda researchers have found that the education (15%), municipality (12%), healthcare (12%), infrastructure (8%), and financial (6%) sectors are the five most targeted by adversaries.

Cybereason releases global threat report on ransomware

Cybereason today issued a global threat report warning global organizations about a rise in ransomware attacks using the Bumblebee loader.

Cybereason releases global threat report on ransomware

Cybereason today issued a global threat report warning global organizations about a rise in ransomware attacks using the Bumblebee loader.

Q2/2022 Threat Report: Ransomware on the Rise

Avast released its Q2/2022 Threat Report today, revealing a significant increase in global ransomware attacks.
ransomware attacks

Cybereason warns against ransomware attacks from Black Basta gang

Cybereason warns against ransomware attacks from Black Basta gang. Cybereason, the XDR company, has issued a global threat alert
malware

Peer Software will monitor malware patterns

Peer Software today announced the formation of a strategic alliance with Pulsar Security to continuously analyse malware attack patterns.

Peer Software will monitor malware patterns

Peer Software today announced the formation of a strategic alliance with Pulsar Security to continuously analyse malware attack patterns.
Scroll to Top