What is sorely lacking in these ransom attack schemes is an independent third-party entity that tracks whether the attackers actually honor their promise of giving back access to the ransomed system once the money is paid.
Who could actually pay one of these ransomware companies off knowing there’s no guarantee of restoring access?
You have to take an already known scammer's word for it. That's not any assurance at all.
Hence the need for a third party. Once a third party can vouch, the value of maintaining positive status with them exceeds that of not returning access after the ransom is paid.
Think of the amount of effort that goes into gaining control of one of these systems. The win rate of actually getting paid the ransom is probably abysmally small since, as you said, there’s no reason to trust someone you already know is a hacker.
If that third party “plays fair” rating got the payout up to even 30% it’d be worth it to stay in their good graces.
On the other side of the equation, some of the legitimate companies whose systems get compromised probably would be willing to pay a ransom, if they had some reasonable assurance it’s only a one time hit and they get access back.
Pro tip: they won’t. They don’t. They never do (statically).
I’m Always like what leaked? Do I care? My social number and all my data is online and on the dark.
Who gives fuck.
Lock your credit down and forget about it. Then start using unique emails for each login with a password keeper.
They want logins to money and crypto, that’s all they can really hope to get.
<Pink-bunny-turd@doesnotexist.com> is not used anywhere else on the web. So they have no cross hack vector.