{"id":128338,"date":"2021-09-30T08:23:44","date_gmt":"2021-09-30T15:23:44","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/09\/ransomware-gangs-are-complaining-that-other-crooks-are-stealing-their-ransoms"},"modified":"2021-09-30T08:23:44","modified_gmt":"2021-09-30T15:23:44","slug":"ransomware-gangs-are-complaining-that-other-crooks-are-stealing-their-ransoms","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/09\/ransomware-gangs-are-complaining-that-other-crooks-are-stealing-their-ransoms","title":{"rendered":"Ransomware gangs are complaining that other crooks are stealing their ransoms"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/ransomware-gangs-are-complaining-that-other-crooks-are-stealing-their-ransoms.jpg\"><\/a><\/p>\n<p>But even if victims pay the ransom \u2013 which isn\u2019t recommended because it encourages more ransomware attacks \u2013 restoring the network can still be a slow process and it can be weeks or months before services are fully restored.<\/p>\n<p>SEE: A cloud company asked security researchers to look over its systems. Here\u2019s what they found.<\/p>\n<p>Be it REvil or <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-these-four-rising-threats-could-be-the-next-major-cybersecurity-risk-facing-your-business\/\" target=\"_blank\">any other ransomware gang<\/a>, the best way to avoid the disruption of a ransomware attack is to prevent attacks in the first place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>But even if victims pay the ransom \u2013 which isn\u2019t recommended because it encourages more ransomware attacks \u2013 restoring the network can still be a slow process and it can be weeks or months before services are fully restored. SEE: A cloud company asked security researchers to look over its systems. Here\u2019s what they found. [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-128338","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/128338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=128338"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/128338\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=128338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=128338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=128338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}