How to Deal With DDoS Ransom Treats

For doing business in today’s digital era, online presence is a critical ingredient. In one form or another, at one point even your local brick and mortar shop will find a way to leverage the almighty Internet. Now, let’s say your business relies heavily on online revenue. After setting everything up, you get your first sales, things start to expand, traffic flows in, analytical data looks great, you invest in infrastructure and performance, grow further, convert, write, attend conferences… If you’re good at what you do, you’ll build a certain reputation within your market. People then start to look up to you as an authority. And the more you become relevant, the more people will look. All of which is great, but as you attract attention of those you want to reach, you and your business will certainly appear on the radar of cybercriminals as well. That moment will come sooner or later and we want you to be prepared when it comes.

Beside sheer cyber-vandalism, there are also those that will look for ways to extract profit from you and your business. To do so, they aim for where they can hurt the most – your website. If you’ve build a reputation, and revenue flows in from your online assets it is likely that your web properties will become a target for nefarious acts. There’s an increasingly popular method used by hackers – the “evergreen” among criminals, that is ransom.

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%

How One AI-Driven Media Platform Cut EBS Costs for AWS ASGs by 48%
A close-up view of a digital interface featuring glowing dollar signs and binary code,representing finance and technology.
Image Source

Tweet this: When you’re good at online business you appear on cybercriminal radars

The Rise of Cyber Ransom

Over the last years cyber ransom became an increasingly popular method of digital crime. To be fair, it never disappeared, rather remained dormant only to rise and make the headlines again. Reports from tech companies like Incapsula and CloudFlare also show a rise in cyber ransom activities. A 2016 survey conducted by Corero Network Security showed that well over 80% of IT professionals expect their companies to become targets of some form of digital ransom. A more worrying fact is that 43% of them stated they believe their company could end up paying the ransom demand.

From the attacker’s perspective, it’s a matter of simple economics. It’s relatively easy for them to access the resources necessary to attack a website. Then they proceed to use the resources as a threat to a large number of companies asking for a relatively modest ransom. If only a few of them end up paying, the hacker’s efforts become highly profitable. Cyber ransom activities are simply leveraging human psychology – some people are going to pay the demanded amounts just to avoid the trouble and spending valuable time. For SMEs it gets even more frustrating as they often don’t have technical support or professionals to turn to.

A close-up view of a Bitcoin coin placed on a green circuit board,showcasing electronic components and circuitry.
Image Source

Tweet this: 80% of IT professionals expect their companies to become targets of cyber ransom

The ransom demand is usually expressed in bitcoins as the cryptocurrency is impossible to track. It’s important to note that with cyber ransom threats there are no guarantees that the attackers won’t eventually go through with an attack, or try again after a certain amount of time. Next we’ll cover the two main types of cyber ransom as well as the differences and links between them:

In the realm of cyber threats, distributed-denial-of-service (DDoS) ransom attacks and ransomware hold a rather high position on the list of top IT security concerns. They are both relatively easy to launch but can end up quite expensive for the victims to mitigate. We’re talking about DDoS ransom when a cyber criminal threatens to launch a DDoS attack to bring a company’s site down unless a certain fee is paid. 

An email screenshot with a ransom request regarding a DDoS attack,containing blurred out sensitive information.

Ransomware, on the other hand, are malicious crypto-softwares whose purpose is to encrypt all files on an infected machine. The criminals then demand a ransom fee to restore access to the files. DDoS attacks are troubling enough as they are. They can result in costly downtimes, missed revenues and damaged brand reputation. However, a ransomware attack is often the more feared one. The encrypted data can end up permanently lost and it can cost a company tens of  thousands of dollars in extorted money with no guarantees that the files will ever be restored. Also, ransomware can target consumers as well but will then demand a much less expensive fee.

Alert about computer encryption and ransom payment countdown.

Tweet this: RANSOMWARE – DDoS is often used as a decoy for network infiltration

Although the two types of cyber ransom are executed differently, there have been cases where the two were closely linked. Hackers are getting increasingly sophisticated, and often a DDoS is used as a decoy for network infiltrations, where then a ransomware gets deployed. A low-bandwidth DDoS can be short in duration and volume, so it can easily slip under the radar of IT staff and DDoS mitigation solutions. A five minute window can be more than enough for a hacker to take down firewalls and use penetration techniques to map a network and successfully install ransomware.

What To Do

Unfortunately, most solutions focus on recovering from a cyber ransom attack, rather than preventing it. In terms of prevention, a proactive approach is the safest bet. A DDoS solution that detects even the smallest attacks could be the edge that your IT security staff needs to have a complete overview on possible network intrusions. Generally, it is strongly advised to avoid paying anything if a hacker tries to extract a ransom fee out of you. As said, there are no guarantees that your site or machines won’t be attacked anyway. Also, by paying the ransom, one could easily set himself as a preferred target for future extortions.

If you do receive a ransom note, make sure that your network is prepared for a DDoS event. Bear in mind that cyber criminals often look for vulnerable targets and may have already detected your company as such. Performing security procedures, reporting to relevant authorities and contacting security experts should minimize the potential risks of cyber ransom. At GlobalDots we recently had one such company under cyber ransom threats that approached us. By the time the ransom demand was required to be paid, they already had the best solutions and know-how in place. Needless to say, the hackers didn’t get even close to get what they wanted.

A close-up of a combination padlock resting on a laptop keyboard.
Image Source

Tweet this: In case of cyber ransom: Perform security procedures, report to authorities and contact experts

There’s another thing to keep in mind in case of cyber ransom threats. In the worst case scenario, the attackers will manage to knock your assets offline. Which is why you have to make sure you have alternative communication channels with your partners and customers. Social networks come in handy in that kind of situation, and people are often sympathetic to companies that come under attack.

Final Thoughts

Cyber crime is an ever-evolving industry, and no threat should be taken loosely. With reputation and revenue at stake, one has to be aware of all the dangers that are lurking from the dark corners of the web. Becoming a victim of a cyber ransom scheme, however, can be avoided. Having a response plan is highly recommended and it will come in handy in case things take a bad turn. What were once criminal mastermind threats, today can be achieved by kids with criminal intents and Internet access. And with new and old methods of extortion being available to a larger number of people, online security becomes an increasingly important segment when doing business. If you feel unprotected and think your online business could become a target for cyber ransom, feel free to reach out to our experts here at GlobalDots. We can help you with everything web performance and security related.

Latest Articles

Three Ways CISOs Can Combat Emerging Threats in 2025

73% of CISOs fear a material cyberattack in the next 12 months, with over three-quarters convinced AI is advancing too quickly for existing methods to combat it. But what can CISOs do to prepare for the coming wave – and access the resources they need to deal with this evolving threat landscape? To find out, […]

11th November, 2024
How Optimizing Kafka Can Save Costs of the Whole System

Kafka is no longer exclusively the domain of high-velocity Big Data use cases. Today, it is utilized on by workloads and companies of all sizes, supporting asynchronous communication between even small groups of microservices.  But this expanded usage has led to problems with cost creep that threaten many companies’ bottom lines. And due to the […]

Itay Tal Head of Cloud Services
29th September, 2024
Migrating Volumez RedHat VMs into Amazon Linux 2 for higher effective discounts rate of Saving Plan

A cloud data infrastructure company relied on extensive use of multiple instance types to test its products. But this made it difficult to optimize costs – a fact which had begun to impact their ability to scale the business.   The GlobalDots team helped the company identify and implement a new infrastructure configuration that both saved […]

Itay Tal Head of Cloud Services
19th September, 2024
How Yuki Achieved SOC 2 Compliance 6x Faster

Overview A fast-growing Snowflake optimization platform was missing out on customers because they didn’t have the right data security compliance. Through multiple consultations and extensive vendor-testing, the GlobalDots team selected a solution to provide both tech and human support, helping the company achieve SOC 2 compliance within just 3 months – and win new customers […]

Itay Tal Head of Cloud Services
16th September, 2024

Unlock Your Cloud Potential

Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.

    GlobalDots' industry expertise proactively addressed structural inefficiencies that would have otherwise hindered our success. Their laser focus is why I would recommend them as a partner to other companies

    Marco Kaiser
    Marco Kaiser

    CTO

    Legal Services

    GlobalDots has helped us to scale up our innovative capabilities, and in significantly improving our service provided to our clients

    Antonio Ostuni
    Antonio Ostuni

    CIO

    IT Services

    It's common for 3rd parties to work with a limited number of vendors - GlobalDots and its multi-vendor approach is different. Thanks to GlobalDots vendors umbrella, the hybrid-cloud migration was exceedingly smooth

    Motti Shpirer
    Motti Shpirer

    VP of Infrastructure & Technology

    Advertising Services