1

Organizations Pay Multiple Ransom Demands

Извините, этот текст доступен только на “Английский” и “Украинский”.

 

80% of organizations that paid a ransom demand were hit again, nearly 50% reported paying a second ransom, and nearly 10% paid a third time

 

Cybereason has published results of its second annual ransomware study during a year of unprecedented attacks to better understand the true impact on businesses. This global study reveals that 73% of organisations suffered at least one ransomware attack in 2022, compared with just 55% in the 2021 study.

 

The study once again finds that ‘it doesn’t pay-to-pay’ a ransom demand, as 80% of organisations that paid were hit by ransomware a second time, with 68% saying the second attack came in less than a month and 67% reporting that threat actors demanded a higher ransom amount.

 

The report, titled ‘Ransomware: The True Cost to Business Study 2022′, further revealed that of the organisations who opted to pay a ransom demand in order to regain access to their encrypted systems, 54% reported that some or all of the data was corrupted during the recovery process, compared to 46% in 2021, an increase of 17% year-over-year. These findings underscore why it does not pay to pay ransomware attackers, and that organisations should focus on detection and prevention strategies to end ransomware attacks at the earliest stages before critical systems and data are put in jeopardy.

 

“Ransomware attacks are traumatic events, and when ransomware gangs attack a second, third or fourth time in a matter of weeks, it can bring an organisation to its collective knees. Deploying effective anti-ransomware solutions is easier said than done, and the hackers know it. After being hit the first time by a ransomware attack, organisations need time to assess their security posture, determine what are the right tools to deploy, and then find the budget to pay for it. The ransomware gangs know this and it is the biggest reason they strike again quickly,’ said Lior Div, Cybereason CEO and Co-founder.

 

Key findings in the research include:

 

A Weak Supply Chain Leads to Ransomware Attacks: Nearly two-thirds (64%) of companies believe the ransomware gang got into their network via one of their suppliers or business partners.

 

Senior Leadership Attrition: 35% of companies suffered C-level resignations following a ransomware attack.

 

A Matter of Life and Death: Nearly 30% of companies said they paid a ransom because of the risk to human life due to system downtime.

 

Ransom Demands Increase with Each Attack: Nearly 70% of companies paid a higher ransom demand the second time.

 

Ransomware Attacks Lead to Business Disruptions: Nearly one-third (31%) of businesses were forced to temporarily or permanently suspend operations following a ransomware attack.

 

Layoffs Result from Ransomware Attacks: Nearly 40% of organizations laid off staff as a result of the attack.

 

Organisations Don’t Have the Right Tools: 60% of organisations admitted that ransomware gangs were in their network up to 6 months before they discovered them. This points to the double extortion model where attackers first steal sensitive data then threaten to make it public if the ransom demand is not paid.

 

The full report is here.

Related Posts

card__image

Состоялся первый саммит Национального кластера кибербезопасности в Украине

На днях в Киеве прошел первый саммит Национального кластера кибербезопасности – координационная платформа, объединяющая ресурсы, возможности, компетенции Совета национальной безопасности и обороны Украины и Американского фонда гражданских исследований и развития (CRDF), правительственных организаций, международных партнеров, частного сектора. Это большое событие для украинской киберсферы. Кроме итогов работы за первое полугодие 2021 года, были очерчены планы взаимодействия […]

card__image

10 Крупнейших Кибератак В Первом Квартале 2021

Киберпреступность на подъеме уже не первый год и никаких тенденций для ее снижения нет, скорее наоборот. Пандемия COVID-19 в 2020 году только усугубила ситуацию. Те, кто ожидали, что уровень киберпреступлений в 2021 году снизится, будут разочарованы, поскольку количество атак только увеличивается день ото дня.   Мы лишь только перешагнули первый квартал 2021 года, а несколько […]

card__image

Атака Microsoft Exchange: кого касается и что делать дальше?

На прошлой неделе компания Microsoft выпустила экстренные обновления безопасности для своего почтового сервера Exchange, исправляющие четыре уязвимости нулевого дня, которые активно используют хакеры. Предполагается, что за атакой стоит поддерживаемая китайским правительством хакерская группировка, известная как Hafnium.   По оценкам специалистов, минимум 30 000 организаций уже подверглись атакам в США. Более того, на протяжении выходных количество […]

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *