Cyber Security

Ransomware: paying the price twice!

29th March 2023
Harry Fowle
0

Ransomware attackers extorted $456.8 million from victims in 2022, 40% down from the $765.6 million in the previous year.

However, before we clink glasses to celebrate victory, there are some significant caveats to consider. The recent hack of Euler Finance where $135 million in staked Ether tokens (stETH), was drained from the protocol, is a case in point. How organisations react to these attacks differs vastly and the outcomes will most definitely shape regulation in this beleaguered asset class.

In a recent poll conducted by Naoris Protocol, a decentralised cybersecurity platform, it would appear that businesses are indeed doubling down on ransomware attackers by refusing to pay the price of clawing back stolen/encrypted data. The poll asked the question  ‘If you or your company were a victim of a ransomware attack, would you pay the attacker (including trying to negotiate a lower fee)?’

Interestingly the majority of respondents, 70.8%, said that they would not pay the ransom and would report the attack to the relevant authorities. This was surprising, as the findings do not correlate to other statistics on ransomware reporting. According to other reports,  just 42% of companies who fall prey to a ransomware attack actually report it.

David Carvalho, CEO and co-founder of Naoris Protocol says ”It’s much easier to take the moral high ground when the question is theoretical. When confronted with the reality of a ransomware attack that could cost your business millions per day, along with potential brand and reputational damage, businesses may be more reluctant to take a moral stance”. 

The next largest group in the poll, 16.55%, said they wouldn’t pay the ransom nor report the attack but would rely on back-ups to restore data.  Other research shows that out of all ransomware victims, 32% pay up, but they only get 65% of their data back, with only 57% of businesses successful in recovering data from backups. So this strategy does not work as an effective measure to retrieve data. To add insult to injury, more than a third of companies who paid a ransom to retrieve their data were targeted a second time and charged even more than the first attack, with 41% failing to recover all of their data. 

While the number of successful ransomware attacks is down year on year, attack methods are evolving. Traditionally, attacks are carried out by encrypting target data and perpetrators charge victims a fee for the decryption key. Now criminals are resorting to  “double extortion” tactics, threatening to sell the data if the ransom isn’t paid. They also use Denial of Service attacks and harassment via email or phone. While the number of ransomware pay-outs has dropped, the average ransomware amount is increasing. Unit 42, a cyber risk assessment company reported that the average ransom demanded in 2021 was approximately $2.2 million, a 144% increase from the average demand of $900,000 from cases analysed in 2020.

Estimating the number of successful ransomware attacks (attacks that resulted either in data leaks or ransom payments) is challenging, as reporting is opaque and inconsistent. It’s estimated that between May 2021 and June 2022, there have been 3,640 successful ransomware attacks globally.

Roughly 73% of organisations have suffered at least one ransomware attack in the past 24 months, and 60% of companies admitted that cybercriminals had been working inside their company for up to 6 months before the attack.

Other respondents in the Naoris Protocol poll, (5.32%) said they would pay the ransom but not report it, and 7.32% said they would pay and report it. Again, figures vary widely, according to a survey of 300 US-based IT decision-makers, 64% had been the victims of a ransomware attack in the last year, and 83% of victims paid the ransom. 

There are several top-class organisations doing analytics on cyber threats, and their reports have brought home the alarming extent and scale of cyber threats. However, it’s important to note that the make-up of sample audiences can vary widely, potentially biassing some results. For example, surveying a group of enterprise CEOs vs an SME cohort would present material variances in the way they approach cybercrime.

Then there is the issue that no one wants to address, what happens to the data that gets stolen? Criminals will still have the files and could sell the information on the dark web with impunity. Ultimately, if the company that has been subjected to an attack gets their data back and manages to dodge a reputational bullet by not reporting it, its clients and networks will still pay the price of the breach, and worse still, they won’t even know their data is in the hands of criminals.

While ethically wrong, it is understandable why companies don't want to reveal they have been a victim of an attack. A report by IBM and Forbes found that 46% of organisations that experienced a cybersecurity breach suffered significant reputational damage. A good example of this is Travelex, a foreign exchange company that collapsed into administration seven months after it suffered a ransomware attack. It disrupted the company for more than a month and they eventually paid the attackers $2.3m.

It’s becoming increasingly clear that companies and institutions will not be able to hide a ransomware breach in the future. Regulators and Governments are suiting up against ransomware amid escalating attacks. It’s a race against time, especially in the areas of critical infrastructure and government. Even though it was not a ransomware demand, the recent attack on NATO's Special Operations Headquarters and Strategic Airlift Capability, both working to deliver humanitarian aid to victims of the recent Turkish-Syrian earthquake, is a prime example of the skills of cyber criminals. In a more recent attack, The U.S. Marshals Service (USMS) reported the theft of sensitive law enforcement information, proof positive that even law enforcement is not beyond the scope of hackers.

Currently, there is legislation on the table making it illegal for companies to pay ransoms. A 2020 ruling by the U.S. The Department of Treasury’s Office of Foreign Assets Control (OFAC) and the Financial Crimes Enforcement Network (FinCEN) states most cases of paying a ransom are illegal. The EU has followed suit, and EU member states can impose fines on paying ransoms under the Security of Network and Information Systems Directive (NIS Directive). Government proposals from leaders in Australia and appeals from Europol are also being tabled.

US President Joe Biden, recently laid down a new cybersecurity strategy, urging all industries to start taking their cybersecurity responsibilities more seriously. Up until now, reporting has been voluntary, with the government encouraging companies to report system intrusions and to regularly “patch” their programs to shut down newly discovered vulnerabilities. The voluntary stance has not delivered the desired results, so Biden’s strategy recommends far broader mandates on private industry, as the vast majority of US digital infrastructure is controlled by this cohort. The US government is particularly concerned by attacks from abroad and the increasingly sophisticated technology that is being used to carry out attacks.

Carvalho says “Ultimately the best cure is prevention, and this starts with the education of employees and individuals on the role they can play in thwarting the attacks of cybercriminals. Emerging technology will also play a massive role in mitigating attacks. In an increasingly networked and decentralised world, every device with an internet connection is a potential point of failure or point of entry for a cyber attack. Traditional cybersecurity works on the premise that the access points are ring-fenced on their closed infrastructure network. However, in an increasingly decentralised and networked business environment, the distribution of devices and cloud servers pose a risk, as they become single points of failure regardless of current cybersecurity controls, e.g. employees’ mobile phones, laptops, servers, etc. IT architectures are centralised, meaning there is a central point of control or authority. This makes it easy for attackers to target and compromise the entire system or take over processes. This heavily impacts resilience to threats and business continuity, even if threats are detected and risks are identified and known, it's usually too late to stop a major breach”.

Decentralised Cybersecurity Mesh is being recognised as an effective tool against cyber threats, in a decentralised cybersecurity environment, when a hacker interferes with code in a system or network through a device, there would be an instant alert and the device could potentially be locked out of the network, preventing the full network infrastructure from being compromised - bringing decentralised trust and security enforcement to centralised spaces. Web 2 cybersecurity is not effective in mitigating web 3 threats, while the technology gap is unresolved, businesses will continue to face cyber threat headwinds. In the meantime, given that 95% of all hackers are let in the front door by individuals clicking on Phishing links and the like, education would be a very worthwhile investment.

Featured products

Product Spotlight

Upcoming Events

View all events
Newsletter
Latest global electronics news
© Copyright 2024 Electronic Specifier