{"id":16080,"date":"2018-01-30T17:00:50","date_gmt":"2018-01-30T22:00:50","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=16080"},"modified":"2022-04-28T09:35:48","modified_gmt":"2022-04-28T13:35:48","slug":"how-do-ransomware-criminals-make-their-money","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/how-do-ransomware-criminals-make-their-money\/","title":{"rendered":"How Do Ransomware Criminals Make Their Money"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Chances are, you&#8217;ve seen a news report or have possibly been exposed to a virus or ransomware attack at some point while online. If your phone is suddenly behaving oddly, it\u2019s a good idea to use <a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=Blog&amp;c=How_Do_Ransomware_Criminals_Make_Their_Money\" target=\"_blank\" rel=\"noopener\"><strong>dfndr<\/strong><\/a><\/span><b>\u00a0security\u2019s full virus scan feature<\/b><span style=\"font-weight: 400;\"> to check your phone for hidden malware. This can help you to quickly remove any dormant or silent viruses that may put your information at risk to hackers:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But have you ever wondered how the perpetrators behind those hacks and programs make their money? By understanding what they do to extort information and earn their money, you can better prepare yourself against future attacks, and know the warning signs to watch out for. <\/span><\/p>\n<p><b>Read More:<a href=\"https:\/\/www.psafe.com\/en\/blog\/net-neutrality-battle-could-affect-your-access-to-netflix\/\" target=\"_blank\" rel=\"noopener\">\u00a0The Net Neutrality Battle Could Affect Your Access to Netflix<\/a><\/b><\/p>\n<p><b>Step 1: Hacking Into the Device<br \/>\n<\/b><span style=\"font-weight: 400;\">The first step for any hacker is to get access to your device or your information. This can be done through software or through a tracker that has been installed on a sketchy website. It can come from a variety of programs or apps that may be vulnerable \u2014 which is one reason to make sure that you constantly update your devices. Once that area has been exposed, it can be identified and targeted for installing the ransomware onto your computer or phone.<\/span><\/p>\n<p><b>Step 2: Extort the Device Back to the Owner<br \/>\n<\/b><span style=\"font-weight: 400;\">Once installed or hacked, hackers and ransomware criminals will try to extort your information for money, likely by emailing you or demanding a form of payment from you, if you want your data kept safe and restored. An example is a famous case involving the HBO hackers, who demanded money from HBO to prevent them from releasing new <\/span><i><span style=\"font-weight: 400;\">Game of Thrones<\/span><\/i><span style=\"font-weight: 400;\"> episodes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Oftentimes, criminals will demand payment in the form of Bitcoin, a digital currency that can\u2019t be tracked, so their information won&#8217;t be revealed. This form or ransom payment allows cybercriminals to continue doing this to other unsuspecting victims. If you refuse to pay, oftentimes it isn&#8217;t worth it for the criminals to continue extorting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the knowledge of how ransomware hackers make their money, you can take better steps to prepare yourself against attacks and prevent your information and devices from being compromised. Make sure to be aware of how ransomware attacks work and to report to the authorities when you&#8217;re being extorted. More importantly, make sure that you browse safely to ensure that you won&#8217;t get a virus or malware to begin with by downloading a reliably performing antivirus app. You can have peace of mind knowing that the security of your device has safeguards in place.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you heard reports about cyber attacks, but have no clue how ransomware criminals make their money? Find out how they target individuals.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[162,942,9,358,545,249,223,161],"class_list":["post-16080","post","type-post","status-publish","format-standard","hentry","category-security","tag-antivirus","tag-app0","tag-mobile","tag-protection","tag-safety","tag-security","tag-tips","tag-virus"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=16080"}],"version-history":[{"count":2,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16080\/revisions"}],"predecessor-version":[{"id":18050,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16080\/revisions\/18050"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=16080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=16080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=16080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}