Should You Pay A Ransomware Attacker? | Coro Cybersecurity (2024)

Coro Secures $100 Million Funding Round to Drive Aggressive Growth to Transform Cybersecurity for SMEs Read more

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (1)

Platform

Partners

Industries

Blog

About

Contact Sales

Get Started

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (8)

Does your business satisfy security regulations?

Learn how your industry, services, and location can impact your compliance posture.

Get Started

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (14)

Does your business satisfy security regulations?

Learn how your industry, services, and location can impact your compliance posture.

Get Started

Start a Trial

Watch a Demo

Contact Sales

Become a Partner

Compliance Survey

Get Support

Start a Free Trial

Try Coro for Free for the Next 30 Days

"*" indicates required fields

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (15)

Watch a Demo

Explore our collection of recorded product demonstrations to witness Coro in action.

"*" indicates required fields

See how much time you could save with Coro guarding your business:

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (16)

Instantly handle 95%+ of email threats

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (17)

Monitor cloud app security from a single dashboard

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (18)

Protect devices across the threat landscape

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (19)

Prevent data loss with a deceivingly simple solution

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (20)

Contact Sales

Receive comprehensive information about our product, pricing, and technical details straight from our specialists.

"*" indicates required fields

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (21)

Become a partner today

Turn your cybersecurity business into a revenue center

"*" indicates required fields

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (22)

Build Your Compliance Report

Does your business satisfy security regulations? Take the survey to learn how your industry, services, and location can impact your compliance posture.

Take the Compliance Survey

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (23)

For many businesses, it’s a worst-case scenario.

You open your laptop and try to access your latest presentation, report, or financial statement. However, when you click on the files, all you see is gibberish and error messages.

On your desktop, you discover the dreaded ransom note with instructions: “If you want your files back, you must pay $250,000 in Bitcoin. If you don’t pay within 24 hours, your data will be destroyed for good.”

What would you do? Most cybersecurity experts will advise you not to pay. Let’s be real though: there is no hard-and-fast rule about paying a ransom—especially when the clock is ticking and dollars are burning. Some examples:

  • When Colonial Pipeline—one of the United States’ major fuel pipeline operators— was hacked in 2021, they chose to pay a $4.4 million ransom because the consequences of disrupting the U.S. fuel supply were too dire.
  • Travelex, a currency exchange service, paid $2.3 million in January 2020 after employees were forced to revert to pen and paper, creating a customer service disaster across the U.K.
  • JBS USA, a meatpacking company, paid $11 million in Bitcoin to hackers in 2021 as the disruption on their system led to huge financial losses.

In each scenario, the company had to make a call based on their unique circ*mstances. They also did so with no guarantee that the hackers would actually provide them with a decryption key, or that it would work properly.

Whether you ultimately decide to pay or not, it’s important to take every scenario into account and make an informed decision.

Reasons Not to Pay

Law enforcement generally recommends against paying ransoms. While paying a ransom might seem like a quick fix, it’s a risky decision with no guarantee of success. Here are the reasons most experts advise against paying:

1. It doesn’t protect you against data losses

In some cases, decryptors provided by hackers will make the situation worse. For example, the Prolock ransomware attack corrupts files larger than 64 MB, leading to 1 byte of data loss per Kb for larger files. If victims paid the ransom, they would still suffer significant data corruption and losses.

Nearly half of ransomware victims who paid the ransom (46%) regained access to their information, only to discover that their data was corrupted. In fact, 3% of victims that paid didn’t receive any of their data back at all.

2. You may open the door for another attack

Here’s another scary stat from the whitepaper quoted in the first point: 78% of victims who paid the ransom were breached again, and 63% faced an even bigger ransom demand than they did before.

When you make a payment, you send a message to hackers: you’re not only unprepared for an attack, but you are willing and able to pay an exorbitant price to get your files back.

3. It may lead to penalties

Bear in mind that when you are paying a hacker group, you’re effectively funding a criminal organization. The group may even be involved in domestic or international terrorism.

That is why the U.S. government discourages ransomware payments and is willing to penalize organizations that pay ransomware attackers. It’s enforced by the Office of Foreign Assets Control (OFAC), a department within the Treasury. OFAC maintains a list of sanctioned individuals and organizations. If the ransomware attacker is on this list, paying them is considered “material assistance,” which violates sanctions. Strict liability applies, which means an organization can be penalized even if it didn’t know the attacker was sanctioned.

4. The possibility of double extortion

Many ransomware attackers go further than just holding your data for ransom. There’s a tactic called “double extortion,” whereby attackers steal a copy of your data before encrypting it. They then hit you with a double threat:

  • Pay the ransom to get your data decrypted.
  • If you don’t pay, the attackers will then threaten to release the stolen data publicly.

In other words, paying only gives you back control of your encrypted data, but it doesn’t guarantee they’ll destroy the stolen copy. Bear in mind that even if you pay ransom, you may still suffer from all of the fallout of a data breach—including loss of revenue and reputational damage—because of this tactic.

What Happens If You Pay?

Let’s say you decide to take the risk and make the payment anyway. In the ideal scenario, the attackers will provide you with a decryption key so that you can restore your information. Unfortunately, this ideal scenario rarely plays out in real life. A very small percentage of companies get all of their data back.

Usually, you’re able to restore most of the lost data. But encrypted files aren’t easily recoverable, decryptors often crash, and data recovery is a slow and laborious process. And even if you do pay, your information could still end up on the dark web.

Remember, the people that hit you with ransomware are criminals; they’re already committed crimes by even putting your company in this position. Thinking they won’t commit another crime if it benefits them is naive, because what else do they have to lose?

If you do decide to make a payment, there are a few things you should consider:

1. Hire a ransomware negotiator

Your incident response (IR) team or insurance agency may have a negotiator on staff. Find out if that’s the case before you enter into a retainer so that you know who to turn to in the event of an emergency.

2. Consider a Bitcoin safety net

You may think about having a Bitcoin wallet set up and funded as part of an IR plan so that you can make a quick payment. Sourcing crypto on short notice can be difficult.

3. Contact your insurance company

Find out what your insurance will cover. You may have cyber insurance in place, but you have to know what you are covered for before making any payments. Some insurers will not cover ransoms paid.

4. Trust those with experience

Ransomware attacks happen everyday. Listen to the advice of your IR team and ransomware negotiator. It may seem obvious, but they have your best interests at heart and should handle the negotiation from start to finish. They may even advise you not to pay the ransom because the group that hacked you has a reputation for providing broken keys or selling data regardless of receiving the ransom.

Remember, even if you do pay, you haven’t officially recovered your data yet. It can take weeks to get back up and running. And according to some research, paying the ransommay even double your recovery cost.

To Pay or Not to Pay?

We would strongly recommend not making a payment, but every ransomware attack should be evaluated on a case-by-case basis. Your business and the well-being of your customers may depend on you paying the ransom. For example, if you work in the medical field, there’s the possibility your patients’ lives may depend on it.

Weigh the pros and cons before making a decision. Reach out to experts and find out what your insurance covers. Yes, you may be able to retrieve most of your data and get back to business quickly. And you may even do the math and find out it’s cheaper to pay a ransom than to hire data recovery specialists to get you back up and running.

However, it’s important to note that most ransom payments aren’t the silver bullets the cyber crooks may say they are. You may still lose your data (and a significant chunk of cash) after paying.

The best thing you can do is start implementing preventative measures and contingency plans beforehand. Backup your data, apply the principle of least privilege and access controls to limit the damage, and cultivate a cyber-aware culture at work.

If you can avoid a ransomware attack altogether through stronger preventative measures, you might never have to face this impossible question.

Coro Cybersecurity News

Expand knowledge in cybersecurity

"*" indicates required fields

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (36)

Coro was built on a simple principle: Enterprise-grade security should be accessible to every business. We believe the more businesses we protect, the more we protect our entire economic outlook.

872-264-4991

[emailprotected]

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (37)

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (38)Should You Pay A Ransomware Attacker? | Coro Cybersecurity (39)

Copyright 2023 © Coro Cybersecurity All Rights Reserved

Should You Pay A Ransomware Attacker? | Coro Cybersecurity (2024)

FAQs

Should You Pay A Ransomware Attacker? | Coro Cybersecurity? ›

We would strongly recommend not making a payment, but every ransomware attack should be evaluated on a case-by-case basis. Your business and the well-being of your customers may depend on you paying the ransom.

Should you pay the ransom in a ransomware attack? ›

In general, the FBI advises that organizations refrain from paying ransoms because it simply emboldens malicious actors by telling them that extortion works.

Does ransomware go away if you pay? ›

Paying the Ransom Won't Guarantee You Get Your Data Back

On average, organizations that paid the ransom only had 65% of their encrypted data restored. For another 29%, more than half of their stolen data remains encrypted. This means it's extremely unlikely you'll get all of your data back, even if you pay.

What not to do during ransomware attack? ›

Don't: Pay the Ransom

Many new victims of ransomware attacks are interested in paying the ransom. They want to get the attack over with and move on with their business. However, this is a bad idea. First, there's no guarantee a hacker will let your systems go after you pay the ransom.

Do you have to report ransomware attack? ›

The Cybersecurity and Infrastructure Security Agency and FBI recommend reporting ransomware attacks to the authorities as soon as possible. This expert advice outlines the process.

Why shouldn't we pay ransom? ›

By paying the ransom you are proving that the attack is successful in its end goal: getting money. This money will be funnelled back into the scam to hit as many businesses as possible.

Is it illegal to pay a cyber ransom? ›

The legality of paying ransom in a cyberattack varies depending on the jurisdiction and the specific circ*mstances. In the United States, it is generally legal to make ransom payments. However, cybersecurity experts and law enforcement agencies strongly discourage organizations from doing so.

What percentage of ransomware attacks are paid? ›

The study, which surveyed over 1000 cybersecurity professionals, found that a staggering 84% of organizations agreed to pay a ransom demand after being breached. Of these, less than half (47%) got their data and services back uncorrupted, emphasizing that paying is generally not the solution.

Can you remove ransomware without paying? ›

Cleaning Ransomware if You Have Backed Up Your Data

You can use one of these free tools to scan your computer and remove malware: Kaspersky, McAfee, or AVG. Recover files from backup.

Does wiping a computer remove ransomware? ›

The surest way to confirm ransomware has been removed from a system is by doing a complete wipe of all storage devices and reinstalling everything from scratch. Formatting the hard disks in your system will ensure that no remnants of the ransomware remain.

What is the first thing to do in ransomware attack? ›

Isolate and contain

If not sure which front-end assets are infected, or if the ransomware is still actively spreading and encrypting files, disconnect storage devices before they become infected.

What's a likely outcome of a ransomware attack? ›

Financial Losses: Ransomware attacks are designed to force their victims to pay a ransom. Additionally, companies can lose money due to the costs of remediating the infection, lost business, and potential legal fees.

Should you pay a ransomware attack? ›

The FBI does not support paying a ransom in response to a ransomware attack. Paying a ransom doesn't guarantee you or your organization will get any data back. It also encourages perpetrators to target more victims and offers an incentive for others to get involved in this type of illegal activity.

Do you get your files back if you pay ransomware? ›

1) Does paying the ransom for ransomware work? In a ransomware attack, paying the ransom does not guarantee that attackers will provide the decryption key. Even with the key, most organizations are unable to recover all their data with decryption alone.

Can a company recover from a ransomware attack? ›

“Once an organization becomes a ransomware victim, it's faced with a dilemma: pay the ransom, which is never advised, or move forward without the data. If the organization has a proper backup strategy in place to counteract cyberattacks, it can quickly recover by accessing its backed up data and avoid costly downtime.”

What percentage of ransomware victims pay the ransom? ›

At the start of 2019, 85% of victims of ransomware attacks paid a ransom following an attack, by the middle of 2021 the percentage had fallen to 46%, and in Q4, 2023, only 29% of victims paid the ransom.

Should I negotiate with ransomware? ›

It is generally not recommended to negotiate with ransomware attackers or pay the ransom. Doing so can encourage further ransomware attacks. Paying the ransom not only supports the attackers' criminal activity but also puts your organization at risk of being targeted again.

Can ransomware be cracked without paying the ransom amount? ›

More details about ransomware

In most cases, victims can restore files without paying a ransom only when they have a data backup or a working third-party decryption tool. Paying a ransom should not be considered as an option because cybercriminals may not provide a decryption tool.

References

Top Articles
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 6582

Rating: 4 / 5 (61 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.