No More Ransom saves ransomware victims £6.5 million
The scheme unlocks 28,000 devices in its first year
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Ransomware victims have saved 6.5 million and decrypted more than 28,000 devices during the first year of the No More Ransom initiative, its creators have said.
The scheme, which was set up a year ago by Kaspersky Lab and McAfee in partnership with Europol and the Dutch National Police, offers users tools which allow them to unlock and decrypt computers that have been hit by ransomware. The tools are provided by nine partner organisations and protect against more than 100 different varieties of ransomware.
It is a good example of public and private sectors working together to tackle cyber security. Among No More Ransom's 109 partner organisations are security companies like Fortinet, Bitsight and Claranet, as well as law enforcement organisations from various countries, academic institutions such as Bournemouth University and major businesses such as Barclays.
Writing in a blog post about the figures, chief scientist and McAfee fellow Raj Samani, and lead scientist for McAfee's Office of the CTO, Christiaan Beeke, said: "Let us put that into context, for zero cost, victims of ransomware who do not have to be customers of any security provider can get their data back for nothing."
"They don't have to fill in a survey, enter their email address, provide their credit card details, in fact they don't even have to worry about obfuscating their IP address," they added. "For the first time, there is another option. No longer are victims faced with the option of a) lose my data or b) pay criminals."
However, ransomware gangs and cyber criminals are still making vast profits, despite these advances, new research shows.
Google, Chainalysis, NYU Tandon School of Engineering and UC San Diego this week presented a paper revealing that over the past two years, ransomware victims paid out over $25 million.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Two recent attacks include WannaCry, which delayed NHS operations amid other targets, and NotPetya, which is still impacting businesses a month after it hit.
"Preventive measures alone can't keep up with the fast-evolving nature of ransomware attacks. Instead, it's vital businesses look at layered security which includes dedicated protection from ransomware attacks to ensure they remain cyber resilient," said Dan Sloshberg, cyber resiliency expert at email management firm Mimecast.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Everything you need to know about OpenAI's new workspace agentsNews New ‘workspace agents’ from OpenAI will automate tasks for workers and can be customized for specific roles
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
