to the listed address , or forever lose access to your files . [ Learn about top security certifications : Who they 're for , what they cost , and which you need . The problem is , some of the more recent attacksAttack.Ransomshow evidence the database was erased . So even if the ransom is paidAttack.Ransom, the data is lost for good . The researchers tracking these attacks are aware of at least four individuals who delete the databases entirely after running a list command . Once deleted , they ’ ll leaveAttack.Ransomthe ransom note and logoff the system . So far , these individuals have used more than a dozen Bitcoin wallet addresses , and nine different email accounts . The tracking document is available on Google Docs . Only one of those victims had backups to use when the ransom paymentAttack.Ransomfailed . Soon , criminals started going after other development platforms , such as Elasticsearch - a Java-based search engine that 's popular in enterprise environments . Then they moved on to public facing Hadoop and CouchDB deployments .