{"id":47770,"date":"2022-07-26T10:36:01","date_gmt":"2022-07-26T10:36:01","guid":{"rendered":"http:\/\/f1554176-9513-4ae6-abf3-8a0e1a45a9df"},"modified":"2022-07-26T10:36:01","modified_gmt":"2022-07-26T10:36:01","slug":"ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","title":{"rendered":"Ransomware: 1.5 million people have got their files back without paying the gangs. Here&#8217;s how"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage\"><!----> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/\" alt=\"getty-people-in-an-office-looking-at-a-computer-screen-with-worry.jpg\" height=\"800\" width=\"1200\"><\/picture><\/div>\n<p> <!----> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall g-color-gray70 u-block g-text-xsmall\">Image: Getty<\/span><\/figcaption><\/figure>\n<p>The battle against <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web\/\" rel=\"follow\">ransomware<\/a> is challenging because not only are ransomware attacks extremely disruptive, but in many cases, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-warning-to-law-firms-stop-encouraging-victims-to-pay-ransoms-to-cyber-criminals\/\" rel=\"follow\">victims opt to pay the ransom demand for a decryption key<\/a> \u2013 fueling additional ransomware attacks because criminals know they can make easy money.&nbsp;<\/p>\n<p>However, one scheme continues to take the fight to ransomware gangs and has now helped over 1.5 million victims successfully decrypt their machines without giving into ransom demands, preventing an estimated $1.5 billion from ending up in the hands of cyber criminals.&nbsp;<\/p>\n<p>The figures come from Europol on the sixth anniversary of&nbsp;<a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">No More Ransom<\/a>, the European Union law enforcement agency&#8217;s anti-ransomware initiative.<\/p>\n<p><strong>SEE:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\/\" rel=\"follow\">Ransomware: Why it&#8217;s still a big threat, and where the gangs are going next<\/a><\/strong><\/p>\n<p>First <a href=\"https:\/\/www.zdnet.com\/article\/no-more-ransomware-how-one-website-is-stopping-the-crypto-locking-crooks-in-their-tracks\/\" rel=\"follow\">launched in 2016<\/a> by Europol, the Dutch National Police (Politie), and a handful of cybersecurity and IT companies with four decryption tools available, No More Ransom has now grown to offer 136 free decryption tools for 165 variants of ransomware, including GandCrab, REvil, Maze, and more.&nbsp;<\/p>\n<p>Over 188 partners from the private sector, the public sector, law enforcement, academia and others are now involved in the scheme, which continues to provide new decryption tools, with a portal available in 37 languages to help victims of ransomware attacks around the world.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/hit-ransomware-no-more-ransom-now-offers-136-free-tools-to-rescue-your-files\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">According to Europol<\/a>, the scheme has helped over 1.5 million victims decrypt their devices without needing to pay a ransom for a decryption key. However, the agency is under no illusions that the battle is won, especially as ransomware not only continues to be a problem, <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-why-its-still-a-big-threat-and-where-the-gangs-are-going-next\/\" rel=\"follow\">but it also continues to become more dangerous and effective<\/a>.&nbsp;<\/p>\n<p>&#8220;It&#8217;s up to us as Europol and other law enforcement agencies to keep evolving ourselves as well, rethink our strategies beyond No More Ransom. The No More Ransom platform is in place and hopefully it will stay in place for a long time as an answer to many of those scams,&#8221; said Marijn Schuurbiers, head of operations at Europol&#8217;s European Cybercrime Centre (EC3).&nbsp;<\/p>\n<p>Law enforcement agencies are also looking at new ways to stop attacks: that includes disrupting infrastructure being used by cyber criminals.&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/emotet-worlds-most-dangerous-malware-botnet-disrupted-by-international-police-operation\/\" rel=\"follow\">Europol has previously taken action against cyber crime in this way<\/a>.&nbsp;<\/p>\n<p><strong>SEE:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/cloud-computing-security-five-things-you-are-probably-doing-wrong\/\" rel=\"follow\">Cloud computing security: Five things you are probably doing wrong<\/a><\/strong><\/p>\n<p>There are also actions which everyone can take to help avoid falling victim to ransomware. Europol recommends <a href=\"https:\/\/www.zdnet.com\/article\/best-backup-software\/\" rel=\"follow\">regularly backing up data on devices, so it can be recovered without paying a ransom,<\/a> ensuring <a href=\"https:\/\/www.zdnet.com\/article\/this-one-change-could-protect-your-systems-from-attack-so-why-dont-more-companies-do-it\/\" rel=\"follow\">security software and operating systems are up to date with the latest security patches<\/a>, and using <a href=\"https:\/\/www.zdnet.com\/article\/two-factor-authentication-is-a-great-idea-but-not-enough-people-are-using-it\/\" rel=\"follow\">multi-factor authentication<\/a>&nbsp;to help prevent accounts being hacked and abused to help launch ransomware attacks.&nbsp;<\/p>\n<p>In the event of falling victim to a ransomware attack, Europol urges victims not to pay a ransom but to check the No More Ransom portal for help and report the incident to the police \u2013 because each report of a ransomware attack can help provide additional insights into how ransomware works.<\/p>\n<h3><strong>MORE ON CYBERSECURITY<\/strong><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No More Ransom project now offers free tools for decrypting 165 families of ransomware as the fight against extortion groups continues.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-47770","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: 1.5 million people have got their files back without paying the gangs. Here&#039;s how 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: 1.5 million people have got their files back without paying the gangs. Here&#039;s how 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-26T10:36:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ransomware: 1.5 million people have got their files back without paying the gangs. Here&#8217;s how\",\"datePublished\":\"2022-07-26T10:36:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\"},\"wordCount\":519,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\",\"name\":\"Ransomware: 1.5 million people have got their files back without paying the gangs. Here's how 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\",\"datePublished\":\"2022-07-26T10:36:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: 1.5 million people have got their files back without paying the gangs. Here&#8217;s how\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: 1.5 million people have got their files back without paying the gangs. Here's how 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: 1.5 million people have got their files back without paying the gangs. Here's how 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-26T10:36:01+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ransomware: 1.5 million people have got their files back without paying the gangs. Here&#8217;s how","datePublished":"2022-07-26T10:36:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/"},"wordCount":519,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","url":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","name":"Ransomware: 1.5 million people have got their files back without paying the gangs. Here's how 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","datePublished":"2022-07-26T10:36:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/","contentUrl":"https:\/\/www.zdnet.com\/article\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-1-5-million-people-have-got-their-files-back-without-paying-the-gangs-heres-how\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware: 1.5 million people have got their files back without paying the gangs. Here&#8217;s how"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47770"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47770\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}