When Clients Ask for the Wrong Kind of Help: A Cybersecurity Reality Check

By Sirbow Varma | 30 July 2025

I recently had a consult scheduled that was flagged as urgent. Usually, the team handles scheduling, and if something's critical, it lands directly on my calendar. Walking into the meeting, I anticipated a fairly standard scenario: maybe a compromised account, a network configuration gone awry, or someone accidentally deleting their crypto seed-phrases. You know, the usual Monday in Durban's CyberSec landscape.

The conversation started quite typically, the client was laying out their issues in meticulous detail. Midway through drafting a solution in my mind, the client suddenly leaned forward, paused dramatically, looked at me and asked, "So, do you think you can write me some ransomware, help me install it, and show me how to use it?"

I will admit, this caught me slightly off guard. My brain buffered for a few seconds, the same way DSTV's streaming service does right before the cricket highlights. I had wonder if I had accidentally walked into a Hawks sting operation. After the initial shock wore off, I politely and firmly made it clear that creating and distributing ransomware isn't exactly part of my professional repertoire. You see, aside from the obvious moral and ethical concerns, there's also the minor inconvenience of Prison to consider.

But this strange encounter got me thinking about Ransomware-as-a-Service (RaaS). Yes, you read that correctly. Just like Netflix, but instead of binge-worthy dramas, you're getting encryption tools and a crash course in extortion. What a wonderful time to be alive!

The Business of Digital Extortion

Ransomware-as-a-service has rapidly grown into a bizarre but lucrative industry. Cybercriminal groups now operate with such business sophistication that they provide customer support better than most actual companies. They offer user-friendly interfaces, detailed manuals, and even support hotlines to assist customers in their criminal ventures. Imagine calling tech support because your encryption isn't locking files fast enough.

Hi, yes, my ransomware isn't menacing enough. Can you escalate this ticket?

In fact, these customer support channels are shockingly active. A prime example was the spyware-as-a-service company mSpy, which experienced a significant data breach. Among the exposed information were thousands of customer support tickets, revealing an incredibly active helpdesk assisting clients with their espionage needs. Turns out, even cybercriminals want to talk to a real human. Who knew?

These criminal enterprises have even adopted affiliate marketing programs. They run affiliate schemes that rival Temu and Amazon, except nobody's buying appliances, just breaches. Affiliates promote ransomware, deploy it against targets, and the original developers take a percentage of the ransom payments. It's disturbingly efficient and lucrative.

The Scale of the Problem

$265 billion (R5 trillion)
Projected annual global cost of ransomware attacks by 2031
Cybersecurity Ventures

However, before anyone starts thinking ransomware might be a nifty side-hustle to supplement their income during unemployment, let's ground ourselves in reality. Operating ransomware, even just subscribing to a service, carries hefty legal consequences. Authorities worldwide have significantly stepped up their game, and international law enforcement agencies like Interpol have successfully shut down multiple RaaS platforms. Recently, one notable bust took down a platform with over 50,000 active subscribers. Rest assured, none of those subscribers will be leaving five-star reviews.

Building Your Digital Immune System

So, if ransomware isn't the solution (and it never should be), exactly how do you protect yourself and your business from becoming another statistic?

The first line of defense is simple but crucial: backups. Think of backups like digital Tupperware. Boring, plastic and often ignored until you're starving and it's all you've got. Maintaining regular, secure, and offline backups ensures that if your systems are compromised, you have a clean version of your data ready to restore. Trust me, panic googling "How to decrypt ransomware without paying" at 2 AM while load shedding kicks in isn't a fun experience.

Next, implement multi-factor authentication (MFA) wherever possible. MFA is like flossing. No one enjoys doing it, until you regret skipping it when things start falling apart. Sure, it's an extra step, but it's considerably less hassle than recovering from an attack.

And lastly, educate yourself and your team regularly. Cyber threats are constantly evolving, and knowing what phishing emails, malicious links, and latest suspicious activities look like can prevent most attacks. Training is not glamorous, but neither is losing access to critical business systems in the midst of month-end when your accountant is already stressed about SARS deadlines.

The Bottom Line

So, no, I will not help you build ransomware or support your criminal ambitions, no matter how politely you ask. But what I can and will do is help ensure your business stays secure, functional and compliant.

After all, orange jumpsuits really aren't flattering on anyone. If you'd rather steer clear of cybercrime and need legitimate cybersecurity guidance, then reach out. I promise our conversations will not be as awkward as this one.

Sirbow Varma

Security+, CySec+, CEH, Pentest+, OSCP, CCNP
Disclaimer: Currency conversions based on exchange rates as of July 30, 2025.

Hit by ransomware? We respond fast.

Ubuntu Guard's incident response team helps South African businesses contain ransomware, recover encrypted data, and get back online quickly.

Get Emergency Help