
>No-one has paid; this is a good thing, even for victims laden with cash, since the attackers cannot decrypt files because encryption keys are not saved locally or transmitted to command and control servers.
>"Let us emphasise that the cyber criminals behind this KillDisk variant cannot supply their victims with the decryption keys to recover their files, despite those victims paying the extremely large sum demanded by this ransomware," ESET researchers Robert Lipovsky and Peter Kalnai say.
Time will tell if anybody pays, sure, but there is no causality between blackhats being able to decrypt files and the victims paying up... victims will usually discover that the files cannot be decrypted after they have paid, I guess ... unless you expect the blackhats to be honest (ROFL) and admit they cannot decrypt files, which I find unlikely. They will cash-in and run off.