Four in five ransomware victims suffer repeat attacks
Lightning often strikes twice, says Cybereason research
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Four in every five organizations that pay ransomware fees suffer another attack, according to research released today by security company Cybereason.
The company published the figure in a report that surveyed cyber security professionals worldwide, with 24% of them based in the US. It found that 46% of the companies targeted a second time were attacked by the same criminals that infected them the first time.
A rise in double extortion attacks — ransomware attacks that encrypt files and steal data — is likely to spur repeat attacks from ransomware groups and their affiliates who want to extract more money from victims.
According to the report, DarkSide, the gang that successfully attacked Colonial Pipeline, had been pressuring its targets with threats to release insider information to stock traders so they could short company shares.
Cyber criminals seem to be good at honoring ransom payments by providing decryption keys, but they aren't great at quality assurance. While 51% of companies that paid a ransom said they retrieved their data in full. Another 46% said they got their data back, but some of it was corrupted. Only 3% didn't get their data back at all.
Ransomware attacks also had a devastating effect on businesses. The study revealed that two-thirds of organizations suffered significant revenue losses, and 29% laid off some staff in the wake of an attack, which often led to the business’s demise. In the US, 31% of companies suffering a ransomware attack closed altogether.
RELATED RESOURCE
Defend your organisation from evolving ransomware attacks
Learn what it takes to reduce risk and strengthen operational resiliency
Senior executives weren’t immune from the effects of successful ransomware attacks. The report found that a third of companies lost senior leadership after an attack, either by dismissal or resignation.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The research found businesses relied heavily on cyber insurance to cover the losses, as 54% of companies took out a policy. However, this often isn't an effective hedge against ransomware risk. Of companies with cyber insurance and suffered an attack, 42% said cyber insurance only partially covered the losses.
Danny Bradbury has been a print journalist specialising in technology since 1989 and a freelance writer since 1994. He has written for national publications on both sides of the Atlantic and has won awards for his investigative cybersecurity journalism work and his arts and culture writing.
Danny writes about many different technology issues for audiences ranging from consumers through to software developers and CIOs. He also ghostwrites articles for many C-suite business executives in the technology sector and has worked as a presenter for multiple webinars and podcasts.
-
Cohere's Aleph Alpha merger could create a transatlantic sovereign AI powerhouseAnalysis The merger between Cohere and Aleph Alpha aims to capitalize on the burgeoning sovereign AI market
-
Everything you need to know about OpenAI's new workspace agentsNews New ‘workspace agents’ from OpenAI will automate tasks for workers and can be customized for specific roles
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
