Cyber criminals only honour half of ransomware payments
Victims still don't get files decrypted after sending money, says new report
Paying money to cyber criminals following a ransomware attack is no guarantee that files will be decrypted, according to a new report.
Imperva's CyberEdge Group's fifth annual Cyberthreat Defense Report found that 55% of respondents were compromised by ransomware in 2017, down from 61% in 2016. However, when infected by ransomware, out of the companies that paid the ransomware, 49% recovered their data while 51% lost their data.
The research questioned 1,200 IT security decision makers and practitioners from 17 countries and 19 industries. It found that out of the companies that refused to pay the ransom, 87% recovered their data, 13% lost their data.
"Just over half of the survey respondents admitted that following a ransomware infection they still lost their data even though they paid the fine," said Terry Ray, CTO at Imperva.
"This highlights the reality that there is no guarantee a company will get their data back if they pay the ransom. Companies therefore need to stop ransomware attacks from the very beginning, before the encryption of data takes place. The best way to prevent an attack is to immediately detect ransomware file access behaviours before the ransomware spreads across the network and encrypts file servers. Once detected, you can quarantine impacted users, devices and systems."
The report also revealed that for the first time in five years, the percentage of organisations affected by a successful cyber attack decreased, dropping from 79% in 2016 to 77% in 2017. Furthermore, the number of organisations victimised by six or more successful attacks fell from 33% in 2016 to 27% in 2017.
Respondents also highlighted an IT security skills deficit. For the first time in five years, lack of skilled personnel outdid low security awareness among employees as IT security's greatest inhibitor to success. In 2018, four in five organisations are experiencing an IT security skills shortage.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"The security skills shortage is well-documented so this isn't a surprise. However, to help overcome deficiencies in their human teams, organisations can bolster their cyber defences and bridge the skills gap using machine learning (ML) and artificial intelligence (AI). ML software can perform preventative and analytical security processes and can detect threats at a much greater speed than humans, helping to prevent attacks," said Ray.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
The modern workplace: Standardizing collaboration for the enterprise IT leaderHow Barco ClickShare Hub is redefining the meeting room
-
Interim CISA chief uploaded sensitive documents to a public version of ChatGPTNews The incident at CISA raises yet more concerns about the rise of ‘shadow AI’ and data protection risks
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposedNews No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems
