{"id":4311,"date":"2022-04-15T13:08:53","date_gmt":"2022-04-15T06:08:53","guid":{"rendered":"https:\/\/www.sterling-team.com\/news\/?p=4311"},"modified":"2025-08-26T16:42:48","modified_gmt":"2025-08-26T09:42:48","slug":"what-is-ransomware-should-i-pay-the-ransomware","status":"publish","type":"post","link":"https:\/\/www.sterling-team.com\/news\/en\/what-is-ransomware-should-i-pay-the-ransomware\/","title":{"rendered":"What is Ransomware? Should I Pay the Ransomware?"},"content":{"rendered":"<p><script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"Article\",\n  \"mainEntityOfPage\": {\n    \"@type\": \"WebPage\",\n    \"@id\": \"https:\/\/www.sterling-team.com\/news\/en\/what-is-ransomware-should-i-pay-the-ransomware\/\"\n  },\n  \"headline\": \"What is Ransomware? Should I Pay the Ransomware?\",\n  \"description\": \"What is ransomware? Ransomware is a type of malware\/program that infects and then takes control of a computer by preventing its users from accessing its data by encrypting the data.\",\n  \"image\": \"https:\/\/www.sterling-team.com\/news\/wp-content\/uploads\/2022\/04\/what-is-ransomware-should-i-pay-the-ransomware.jpg\",  \n  \"author\": {\n    \"@type\": \"Organization\",\n    \"name\": \"Blog STEM - PT Sterling Tulus Cemerlang\",\n    \"url\": \"https:\/\/www.sterling-team.com\/\"\n  },  \n  \"publisher\": {\n    \"@type\": \"Organization\",\n    \"name\": \"sterling-team.com\",\n    \"logo\": {\n      \"@type\": \"ImageObject\",\n      \"url\": \"https:\/\/www.sterling-team.com\/news\/wp-content\/uploads\/2020\/12\/cropped-cropped-blog-stem-sap-gold-partner-sap-business-one-indonesia.png\"\n    }\n  },\n  \"datePublished\": \"2022-04-15\",\n  \"dateModified\": \"2022-04-15\"\n}\n<\/script><br \/>\nEvery day, more and more companies or individuals are affected by Ransomware attacks.<\/p>\n<div class=\"box-toc\" style=\"background-color: #f4f7fa; padding: 20px 30px; margin-bottom: 1.6em;\">\n<div class=\"toc-header\"><b>Daftar isi<\/b><\/div>\n<div class=\"toc-item\">\n<ul>\n<li><a href=\"#what-is-ransomware\">What is Ransomware ?<\/a><\/li>\n<li><a href=\"#several-tactics-ransomware\">Several Tactics Used by Ransomware to Extort Companies<\/a><\/li>\n<li><a href=\"#should-i-pay-rensomware\">Should I Pay the Ransomware ?<\/a><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p id=\"what-is-ransomware\">What is ransomware? Ransomware is a type of malware\/program that infects and then takes control of a computer by preventing its users from accessing its data by encrypting the data.<\/p>\n<p>And to be able to open or access the data again, the owner \/ user of the computer is asked to pay a sum of money to the sender of the ransomware.<\/p>\n<p>Many victims finally decide to pay the ransom, in the hope that they can access their data again.<\/p>\n<picture><source title=\"Cara Meningkatkan Penjualan dengan SAP Business One\" srcset=\"https:\/\/d2h87rbqc48mm2.cloudfront.net\/ws\/wp-content\/themes\/STEM\/images\/venafi-survey-ransomware-min.webp\" media=\"(max-width: 480px)\" \/><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-5076\" title=\"Survey conducted by Venafi - a company engaged in cybersecurity\" src=\"https:\/\/d2h87rbqc48mm2.cloudfront.net\/ws\/wp-content\/themes\/STEM\/images\/venafi-survey-ransomware.webp\" alt=\"Survey conducted by Venafi - a company engaged in cybersecurity\" width=\"650\" height=\"350\" \/><\/picture>\n<p>&nbsp;<\/p>\n<p>However, is it true that by paying the ransom, we can then regain access to our data?<\/p>\n<p>Based on a survey conducted by Venafi &#8211; a company engaged in cybersecurity (<sup>1<\/sup>), several surprising things were revealed:<\/p>\n<ul>\n<li>83% of successful ransomware attacks, subsequently experienced extortion 2 to 3 times.<\/li>\n<li>71% of people in charge of IT decision-making see that this ransomware practice has become more intense over the past 12 years.<\/li>\n<\/ul>\n<p id=\"several-tactics-ransomware\">There are several tactics used by ransomware to extort companies:<\/p>\n<ul>\n<li>38% threatened to blackmail enterprise customers with stolen customer data<\/li>\n<li>35% threatened to expose company data on the dark web<\/li>\n<li>32% threatened to tell enterprise customers that their data had been stolen.<\/li>\n<\/ul>\n<p>Regardless of what tactics ransomware uses to carry out extortion, the most worrying part is that even though the company has paid the ransom their data is still exposed.<\/p>\n<ul>\n<li>16% of companies that refuse to pay the ransom have their data exposed on the dark web.<\/li>\n<li>18% of companies willing to pay the ransom have their data exposed on the dark web.<\/li>\n<li>What&#8217;s worse, 35% of the companies that paid the ransom still couldn&#8217;t get their data back.<\/li>\n<\/ul>\n<picture><source srcset=\"https:\/\/d2h87rbqc48mm2.cloudfront.net\/ws\/wp-content\/themes\/STEM\/images\/tactis-ransomware-min.webp\" media=\"(max-width: 480px)\" \/><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-5076\" title=\"There are several tactics used by ransomware to extort companies\" src=\"https:\/\/d2h87rbqc48mm2.cloudfront.net\/ws\/wp-content\/themes\/STEM\/images\/tactis-ransomware.webp\" alt=\"There are several tactics used by ransomware to extort companies\" width=\"650\" height=\"350\" \/><\/picture>\n<p>&nbsp;<\/p>\n<p id=\"should-i-pay-rensomware\">From these facts, it can be concluded that paying the ransom for ransomware is not necessarily helpful and can actually exacerbate ransomware attacks.<\/p>\n<p>Therefore, it is highly recommended to continue to have protection on every PC\/Notebook that is used, on the network infrastructure, and provide understanding or remind all users to be careful when using a computer. Whether it&#8217;s when transferring data such as using a flash, accessing the internet.<\/p>\n<p>Especially when using email, because in many cases the intruders infiltrated this ransomware via emails that seemed to be sent by company business partners or from banks. So that people\/users who don&#8217;t understand will immediately click on the link or open the document in the email, which incidentally already contains ransomware.<\/p>\n<p><a href=\"https:\/\/www.sterling-team.com\/sap-business-one\/\" target=\"_blank\" title=\"What is SAP Business One?\" rel=\"noopener\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-1344\" src=\"https:\/\/www.sterling-team.com\/news\/wp-content\/uploads\/2020\/05\/banner-sap-indonesia-cta-en.jpg\" alt=\"What is SAP Business One?\" title=\"What is SAP Business One?\" width=\"600\" height=\"150\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every day, more and more companies or individuals are affected by Ransomware attacks. Daftar isi What is Ransomware ? Several&hellip;<\/p>\n","protected":false},"author":1,"featured_media":4281,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[392],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/posts\/4311"}],"collection":[{"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/comments?post=4311"}],"version-history":[{"count":7,"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/posts\/4311\/revisions"}],"predecessor-version":[{"id":8465,"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/posts\/4311\/revisions\/8465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/media\/4281"}],"wp:attachment":[{"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/media?parent=4311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/categories?post=4311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sterling-team.com\/news\/wp-json\/wp\/v2\/tags?post=4311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}