Cyber criminals only honour half of ransomware payments

Victims still don't get files decrypted after sending money, says new report

Paying money to cyber criminals following a ransomware attack is no guarantee that files will be decrypted, according to a new report.

Imperva's CyberEdge Group's fifth annual Cyberthreat Defense Report found that 55% of respondents were compromised by ransomware in 2017, down from 61% in 2016. However, when infected by ransomware, out of the companies that paid the ransomware, 49% recovered their data while 51% lost their data.

The research questioned 1,200 IT security decision makers and practitioners from 17 countries and 19 industries. It found that out of the companies that refused to pay the ransom, 87% recovered their data, 13% lost their data.

"Just over half of the survey respondents admitted that following a ransomware infection they still lost their data even though they paid the fine," said Terry Ray, CTO at Imperva.

"This highlights the reality that there is no guarantee a company will get their data back if they pay the ransom. Companies therefore need to stop ransomware attacks from the very beginning, before the encryption of data takes place. The best way to prevent an attack is to immediately detect ransomware file access behaviours before the ransomware spreads across the network and encrypts file servers. Once detected, you can quarantine impacted users, devices and systems."

The report also revealed that for the first time in five years, the percentage of organisations affected by a successful cyber attack decreased, dropping from 79% in 2016 to 77% in 2017. Furthermore, the number of organisations victimised by six or more successful attacks fell from 33% in 2016 to 27% in 2017.

Respondents also highlighted an IT security skills deficit. For the first time in five years, lack of skilled personnel outdid low security awareness among employees as IT security's greatest inhibitor to success. In 2018, four in five organisations are experiencing an IT security skills shortage.

"The security skills shortage is well-documented so this isn't a surprise. However, to help overcome deficiencies in their human teams, organisations can bolster their cyber defences and bridge the skills gap using machine learning (ML) and artificial intelligence (AI). ML software can perform preventative and analytical security processes and can detect threats at a much greater speed than humans, helping to prevent attacks," said Ray.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now


Best ransomware removal tools

Best ransomware removal tools

16 Dec 2020

Most Popular

Citrix buys Slack competitor Wrike in record $2.25bn deal

Citrix buys Slack competitor Wrike in record $2.25bn deal

19 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
SolarWinds hackers hit Malwarebytes through Microsoft exploit

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021