勒索軟體

How to negotiate with hackers

“Your network has been penetrated,” begins the text file. The message is a ransom note — but instead of requesting cash for the safe return of a loved one, it asks for digital funds for the release of data belonging to a US manufacturer.

The company is one of many to be affected by ransomware — where hackers disable a victims’ files or systems and will only release the decryption key once a ransom is paid. The hackers of the manufacturing company sign off their note: “No system is safe.”

They may be right. The rise of ransomware has been driven by businesses’ growing dependence on technology and data, as well as the development of anonymous digital currencies that allow criminals to move funds without being traced. So what should a company do if they are hacked?

您已閱讀14%(770字),剩餘86%(4645字)包含更多重要資訊,訂閱以繼續探索完整內容,並享受更多專屬服務。
版權聲明:本文版權歸FT中文網所有,未經允許任何單位或個人不得轉載,複製或以任何其他方式使用本文全部或部分,侵權必究。
設置字型大小×
最小
較小
默認
較大
最大
分享×