No More Ransom Saves Victims

According to a recent Europol statement, a service called No More Ransom has assisted in the recovery of valuable information stolen by hackersThis has helped more than 6 million victims and has saved approximately €1B from cyber criminal hands. No More Ransom is collecting decryptors so ransomware victims don’t have to pay to get their data back and attackers don’t get rich. 

Ransomware victims are encouraged to reject the demand for payment. Moreover, the project members explain that by paying ransom to cyber criminals, you are only confirming that the ransomware is working, and there is no guarantee that you will receive the required decryption key in return.

To date, the No More Ransom repository of ransomware decryptors has helped more than 6 million victims recover their files, keeping nearly a billion euros out of the hands of cyber criminals says Europol recently.

No More Ransom is maintained via cooperation between the European Cybercrime Centre and several cybersecurity and other types of companies, including Kaspersky, McAfee, Barracuda and AWS. Its purpose is to keep victims from handing over the cash that helps fuel more ransomware attacks, according to Europol.

“The general advice is not to pay the ransom,” No More Ransom advises. “By sending your money to cyber criminals you’ll only confirm that ransomware works, and there’s no guarantee you’ll get the decryption key you need in return.”

Instead, the group directs victims to their Crypto Sheriff tool. There, victims can enter either the URL, onion or Bitcoin address given by the attacker to pay the ransom.

The tool searches the No More Ransom database, where the offerings have grown from an initial four decryptors back in 2016 to the current roster of 121 tools to decrypt 152 ransomware families. It’s also free and available in 37 languages, according to the group. If no decryptor is available for a given ransomware infection, keep checking back: No More Ransom regularly adds new unlock tools.

Don’t Pay the Ransom

Victims who are quick to pay identify themselves as easy prey. Cybereason reported that 80 percent of organisations that paid a ransom were then hit by a follow-up attack.  Half of those were attacked a second time by the same group, but a full third attracted additional threat actors smelling an easy payday.

Regular backups remain the best way to protect data from a ransomware attack, the Europol said. They further recommend users be mindful of the links they click on and update their security software. But most importantly, the cyber crime cops appeal to organisations to avoid handing over their money.

“If you become a victim, do not pay!” the Eurpol said. “Report the crime and check No More Ransom for decryption tools.”

Europol say that frequent backups are still the most effective method of preventing a ransomware infection. The agency advised users to pay close attention to the links they click and to keep their software up to date on a regular basis. Europol also strongly advises ransomware victims not to pay the ransom. The first step to take in this situation is to report the crime and then search for decryption tools in the No More Ransom repository.

The decryptors available in the No More Ransom repository have helped more than six million people to recover their files for free. This prevented criminals from earning almost a billion euros through ransomware attacks. Currently offering 121 free tools able to decrypt 151 ransomware families, it unites 170 partners from the public and private sector. The portal is available in 37 languages.

Despite controversy over whether businesses and organisations who fall victim to ransomware should meet criminals’ demands, the US government is unlikely to make it illegal for victims of ransomware attacks to pay the ransom.

According to the US Department of Justice, banning this act will only wreak further havoc. Bryan Vorndran, assistant director of the FBI's cyber division, told lawmakers on the US Senate Committee on the Judiciary that the agency does not recommend companies pay ransoms because it doesn't guarantee the business will regain access to their data or prevent data from ultimately being leaked.

Europol:        Threatpost:      Softpedia:      Dark Reading:      Oodaloop:     UrgentComm:

You Might Also Read:

Negotiating Ransom: To Pay Or Not?:

 

« Cyber Attacks May Lead To A “shooting war”
Learn how to detect and respond to insider threats »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Bugraptors

Bugraptors

BugRaptors is a certified software testing company with extensive experience as a third-party testing vendor, effectively proven as a leader in software testing & QA Services.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA was formed by a group of academics, security and fraud experts to explore ways to increase security awareness among audiences, including consumers, employees, businesses and law enforcement.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Breathe Technology

Breathe Technology

Breathe Technology has been providing Managed IT Support/ Service Desk, Cloud Services, Cyber Security & Communications to businesses and schools since 2003.

Redinent Innovations

Redinent Innovations

Redinent is a cutting-edge IoT Security platform that offers precise security posture analysis and delivers actionable intelligence, empowering businesses to operate with unrivaled resilience.