Conversely, a black hat might choose to install <ransomware> on a business's system that shuts down all business services until the business either (1) identifies and resolves the problem themselves or (2) takes the risk of paying the ransom to the hacker in the hope that the <ransomware> will be removed upon receipt of payment.