United States Media reported that an American firm Colonial Pipeline has paid US $ 5 million as ransom money to hackers to regain access to its networks. As said, Colonial Pipeline provides around 45 percent of the fuel supply to the United States East Coast states. Although, the company did not accept the payment of ransom to the hackers, however, it was not possible for it to restart its operations as early as it did.
According to reports, Ransomware attacks have been on the rise during recent years, but they grew up rapidly over the last year during the COVID-19 pandemic, which forced more services online, while making the critical infrastructure more vulnerable to cyber criminals. Presently, most of the public and private infrastructure including government departments,
Hospitals, schools, local utilities providers, banks and business remained a prime target of cyber hackers during the previous year. Usually, the victim corporations face huge losses in kind of finance, resources and time for restoring their operations and getting access to their hacked systems therefore, firms like Colonial Pipeline prefer to pay less ransom money instead pouring huge resources in repairing the damaged system.
However, it is unbelievable in the country like the United States that all law enforcement agencies including Federal Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Police and other cyber security apparatus were unable to stall such cyber-attacks and public prefer to pay ransom to minimize their loss instead of cooperating with LEAs to get the criminal in chains. According to reports, the ransomware attacks has grown about 350 per cent annually during past years. Although, US government and LEAs always advocate not to pay ransom because the compromised system remains an easy prey to the hackers all times, but public trend is in opposite direction.
According to statistics, about 50 per cent hacking incidents occurred due to massive security breaches by the users. All the latest development, security apparatus, rules and regulations proved to be insufficient to safeguard against cyber-attacks, however they had forgotten to dig out the culprit sitting inside their ranks because no cyberattack could be successful without compromise of security by insider worm.