logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
3rd May 2019 by CyberVision 0 Comments 732 Views
3rd May 2019 by CyberVision in Business Security

Everything you need to know about Robbinhood Ransomware

Ransomware restricts access to your computer system and demands that a ransom is paid for the restriction to be removed. Robbinhood is the newest kid on the block and encourages people to purchase a specific decryption tool in order to regain access to their files. This ransomware is not being spread through spam but rather through other methods, which could include hacked remote desktop services or other trojans that provide access to the attackers. Unfortunately, it has not yet been confirmed how the Robbinhood ransomware gains access to a network and the computers on it.

 

This new ransomware, Robbinhood, claims to delete encryption keys and IP addresses after receiving the ransom payout that users provide, given that their privacy is important to them. These ’Robbinhoods’ even offer free decryption of three files to try and convince the victims that they’re being sincere. However, no cyber-criminal can be trusted. In many cases, people are scammed. Although it is in the cyber-criminal’s best interests to honour ransom demands in order that they protect their dodgy income generation schemes rather than have victims distrust them and not make payouts, cyber crime is hardly an honourable business and the criminals are definitely known to ignore victims once their demands are met.

 

Individuals should not fall prey to such gimmicks and should avoid paying ransom as it only gives cyber-criminals more confidence and help them to create more malware like this. Also, there’s no guarantee that hackers will give back the files after having received the  ransom payout, even if you get them back, and they then have permanent access to the data they have taken.

 

Ransomware is only damaging if you have no way of recovering your data. So, the most important thing to remember is to always have a reliable backup of your files, stored offline and not made accessible to ransomware.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure cyber security
  • ransomware
  • robbinhood
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo