Ex White House CIO attacks insurance firms for 'fuelling ransomware industry'

Theresa Payton argues companies are manipulating victims to avoid paying higher bills

Ransomware splash screen mockup

Former CIO of the White House Theresa Payton has warned that cyber insurance companies are supporting the ransomware industry by manipulating organisations into paying to have their systems returned after a cyber attack.

Insurance companies, according to Payton, are encouraging customers to pay ransomware demands as the costs associated with data recovery often outweigh those incurred by the ransom, meaning insurance providers pay far less as a result.

"I'm increasingly frustrated at the trend where the insurance companies are encouraging the victims to pay," said Theresa Payton, former White House CIO and security authority.

"The insurance company looks at what the potential incident response and forensics bill might be and that's going to be bigger in many cases because many organisations are not prepared and they would actually rather pay," she said.

Speaking at CloudSec 2019 in London, Payton said she was recently approached by an organisation seeking advice on how to proceed after its insurance company attempted to handle the ransomware issue directly. In that case, the insurance firm said it was "experienced at negotiating with the ransomware syndicates" and that it could "get the price to go way down".

However, Payton argued that it's important to trust your playbook, which typically tells an organisation not to pay and subsequently fund cyber crime. She added that if an insurance company tells you to pay, it could be an indicator that they're trying to save money.

Ransomware is typically pitched to victims at a slightly lower cost than what it would take to recover, which has been one of the reasons why it has proved to be such a highly successful form of cyber attack over recent years. However, in addition to concerns about funding cyber criminals, organisations are generally advised not to agree to any ransomware payments as there is no guarantee that paying the demand will result in the decryption of files.

Days prior to the successful coordinated ransomware attack on 22 Texas state municipalities, Payton was in Texas with small municipal and county groups advising on cyber security when an insurance company attempted to convince a security officer that they could be up and running within a day if they paid a ransom.

"I'm like: 'how', that's not how this works," said Payton. "It's not like buying on Amazon and a drone drops off the key - it doesn't work that way."

The 22 Texas municipalities were the most recent targets in a string of ransomware attacks on US state infrastructure since the start of the year. Starting in Baltimore, a series of other small government bodies across the country have been successfully infected with ransomware with many paying their respective ransoms.

Payton suggested the attacks are taking advantage of outdated systems and underfunding.

"At the city county and even the state-level in some cases, they're still dealing with legacy technology," she said. "It's taxpayer dollars that are required to pull in to do modernisation efforts and taxpayers don't see the cloud, they don't see the other things.

"They want their mobile app that lets them get their permit to do the remodelling on their house, but they don't see how their money goes to protect infrastructure."

She said that most of the technology has gone end of life and so many systems are no longer receiving vendor security updates.

Payton's warning follows a report issued earlier this year that showed ransomware attacks on UK businesses soared 195% in 2019 following a reduction in 2018.

Featured Resources

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief

Download now

Five reasons to move to the cloud

Join the enterprises moving their workloads to the cloud

Download now

Architecting hybrid IT and edge for digital advantage

Why business leaders should consider a hybrid IT strategy

Download now

Six reasons to accelerate remote asset monitoring with AI

How to optimise resources, increase productivity, and grow profit margins with AI

Download now

Recommended

Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021
President Biden and Senator Schumer ready semiconductor supply chain initiatives
Hardware

President Biden and Senator Schumer ready semiconductor supply chain initiatives

24 Feb 2021

Most Popular

Npower shuts down app after hackers steal user data
hacking

Npower shuts down app after hackers steal user data

25 Feb 2021
Hackers publish Bombardier data in wide-reaching FTA cyber attack
cyber attacks

Hackers publish Bombardier data in wide-reaching FTA cyber attack

24 Feb 2021
New monitors for an agile new normal
Sponsored

New monitors for an agile new normal

19 Feb 2021