Cyber criminals only honour half of ransomware payments

Victims still don't get files decrypted after sending money, says new report

Paying money to cyber criminals following a ransomware attack is no guarantee that files will be decrypted, according to a new report.

Imperva's CyberEdge Group's fifth annual Cyberthreat Defense Report found that 55% of respondents were compromised by ransomware in 2017, down from 61% in 2016. However, when infected by ransomware, out of the companies that paid the ransomware, 49% recovered their data while 51% lost their data.

The research questioned 1,200 IT security decision makers and practitioners from 17 countries and 19 industries. It found that out of the companies that refused to pay the ransom, 87% recovered their data, 13% lost their data.

"Just over half of the survey respondents admitted that following a ransomware infection they still lost their data even though they paid the fine," said Terry Ray, CTO at Imperva.

"This highlights the reality that there is no guarantee a company will get their data back if they pay the ransom. Companies therefore need to stop ransomware attacks from the very beginning, before the encryption of data takes place. The best way to prevent an attack is to immediately detect ransomware file access behaviours before the ransomware spreads across the network and encrypts file servers. Once detected, you can quarantine impacted users, devices and systems."

The report also revealed that for the first time in five years, the percentage of organisations affected by a successful cyber attack decreased, dropping from 79% in 2016 to 77% in 2017. Furthermore, the number of organisations victimised by six or more successful attacks fell from 33% in 2016 to 27% in 2017.

Respondents also highlighted an IT security skills deficit. For the first time in five years, lack of skilled personnel outdid low security awareness among employees as IT security's greatest inhibitor to success. In 2018, four in five organisations are experiencing an IT security skills shortage.

"The security skills shortage is well-documented so this isn't a surprise. However, to help overcome deficiencies in their human teams, organisations can bolster their cyber defences and bridge the skills gap using machine learning (ML) and artificial intelligence (AI). ML software can perform preventative and analytical security processes and can detect threats at a much greater speed than humans, helping to prevent attacks," said Ray.

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now


Best ransomware removal tools

Best ransomware removal tools

9 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type

How to find RAM speed, size and type

8 Apr 2021
Roadmap 2021: What’s coming from 3CX
Advertisement Feature

Roadmap 2021: What’s coming from 3CX

30 Mar 2021