Just 7% of Organizations Successfully Recover Data After Paying Ransom in Malware Attacks

Recent trends reveal an alarming increase in the number of both public and private sector organizations making ransom payments to hackers deploying malware, particularly in the form of ransomware. These transactions often come with dire consequences that may not be widely recognized, raising critical questions about their efficacy and the broader implications for cybersecurity.

A survey conducted by Hiscox Group, a Bermuda-based insurance provider, has disclosed that merely 7% of victims who concede to ransomware demands successfully recover their encrypted data. The vast majority either endure significant data losses or depend on backups for recovery, highlighting a critical gap in the effectiveness of paying ransoms.

A prevailing issue in these situations is that many cybercriminals fail to uphold their end of the bargain post-payment. This reality is prompting ransomware actors to exercise increased caution in resuming access for victims, fearing that further interaction could attract the attention of law enforcement agencies.

Hiscox is particularly recognized for its specialized insurance offerings, which include coverage for unique scenarios such as classic cars, kidnapping and ransom situations, and personal injuries, alongside standard insurance policies provided by traditional firms.

Cybersecurity experts assert that businesses frequently feel pressured to meet hackers’ ransom demands to minimize operational downtime, safeguard their reputations, and mitigate potential risks. Unfortunately, this reaction not only empowers cybercriminals but also emboldens them to escalate their attacks against additional targets.

A notable recent example underscoring the severe impact of cyberattacks is the Synnovis ransomware attack that targeted a pathology technology provider catering to the National Health Service (NHS) in London. The malicious infiltration led to significant disruptions, causing the rescheduling of over 10,000 appointments related to acute outpatient care and delaying 1,700 elective procedures across prominent NHS trusts.

The ramifications of this cyber incident were far-reaching, resulting in direct consequences for patients, with two serious harm incidents reported, along with five instances of moderate harm and 114 cases of minor harm. This event starkly illustrates the potential dangers of ransomware beyond mere operational disruptions, emphasizing the urgent necessity for enhanced cybersecurity protocols and cooperative strategies to address such threats effectively.

In addressing the methods used in these attacks, one can refer to the MITRE ATT&CK framework. Potential tactics and techniques that could have been leveraged include initial access, where attackers exploit vulnerabilities to gain entry; persistence, ensuring they maintain access even after system reboots; and privilege escalation, allowing them to gain higher-level access within the organization’s networks. The applicability of these tactics highlights the intricacies of modern cyber threats and underscores the need for businesses to bolster their cybersecurity posture strategically.

Join over 500,000 cybersecurity professionals in our LinkedIn group “Information Security Community”!

Source