Continue reading this on our app for a better experience

Open in App
Floating Button

It doesn't pay to pay a ransom: Cybereason study

Nurdianah Md Nur
Nurdianah Md Nur • 2 min read
It doesn't pay to pay a ransom: Cybereason study
Photo: Cybereason
Font Resizer
Share to Whatsapp
Share to Facebook
Share to LinkedIn
Scroll to top
Follow us on Facebook and join our Telegram channel for the latest updates.

Is it worth paying the ransom in response to a ransomware attack? The short answer is no, according to the Ransomware: The True Cost to Business Study 2022 by cybersecurity firm Cybereason.

The majority of organisations in Singapore that paid the first ransom demand were hit again in less than a month (88%), with nearly two-thirds (62%) stating that threat actors demanded a higher ransom the second time.

Photo: Cybereason

Forty-five percent of those who opted to pay a ransom demand in order to regain access to their encrypted systems also had some or all of their data corrupted during the recovery process.

“When ransomware gangs attack a second, third or fourth time in a matter of weeks, it can bring an organisation to its collective knees. Deploying effective anti-ransomware solutions is easier said than done, and the hackers know it,” says Eric Nagel, general manager for APAC at Cybereason.

See also: Tesla Cybertruck to go on tour in China to burnish tech cred

He adds: “After being hit the first time by a ransomware attack, organisations need time to assess their security posture, determine what are the right tools to deploy, and then find the budget to pay for it. The ransomware gangs know this, and it is the biggest reason they strike again quickly.”

The study also found that 63% of Singapore respondents believe ransomware gangs got into their network via one of their suppliers or business partners.

More importantly, over 90% admitted that ransomware gangs were in their network up to six months before they discovered them. This points to the double extortion model where attackers first steal sensitive data before threatening to make it public if the ransom demand is not paid.

See also: Samsung races Apple to develop blood sugar monitor that doesn't break skin

Apart from business disruptions, ransomware attacks have also led to C-level resignations (40%) and staff layoffs (20%).

These findings underscore why it does not pay to pay ransomware attackers, and that organisations should instead focus on detection and prevention strategies to end ransomware attacks at the earliest stages before critical systems and data are put in jeopardy.

Highlights

Re test Testing QA Spotlight
1000th issue

Re test Testing QA Spotlight

Get the latest news updates in your mailbox
Never miss out on important financial news and get daily updates today
×
The Edge Singapore
Download The Edge Singapore App
Google playApple store play
Keep updated
Follow our social media
© 2024 The Edge Publishing Pte Ltd. All rights reserved.