Cargando clima de New York...

Why more companies are paying ransomware demands in 2023

Ransomware, one of the fastest growing cyber threats, has seen a resurgence in recent years, and continues to be a foremost concern among security professionals. Splunk’s most recent CISO report, which collected data from 350 CISO’s across 17 global industries, found that 90% reported suffering a disruptive attack on their organizations over the last year, and 47% of those experienced multiple attacks.

A staggering 96% of respondents were victims of ransomware attacks, with 52% experiencing one that significantly impacted their business systems and operations. While virtually all governments and law enforcement agencies recommend against paying a ransom, 83% of CISO respondents confirmed that they paid the ransom directly (18%), through cyber insurance (37%), or through a third party (28%). Ransoms ranged between $25,000 to $99,999 (44%), and half of respondents paid more than $100,000. Approximately 9% paid $1 million or more.

Ransomware data

Ransomware threats are often featured prominently in the media and can have catastrophic financial outcomes. This is evident with recent high profile targets like Fidelity National Financial, where operations were paralyzed for a week, as they took down their own systems to contain the threat. In addition to ransoms paid, companies often bear the additional costs of security breaches, including loss of business, reputational damage, third-party liabilities, data loss, and regulatory notification costs.

In 2022, the FBI reported the Internet Crime Complaint Center (IC3) received 800,944 complaints, with reported financial losses of $10.3 billion. Ransomware attacks are not always reported, but 2,385 of these complaints were identified as ransomware with losses exceeding $34.3 million. Kapersky reported that targeted ransomware nearly doubled in 2022, as new groups have changed their techniques to favor precisely tailored ransomware attacks over opportunistic assaults. Payments are also better enabled by the maturing cryptocurrency industry.

The increasing costs of ransomware attacks is a contributing factor to the cost of cybercrime worldwide. Statista’s “Estimated Cost of Cybercrime” in the cybersecurity market is forecast to continuously increase between 2023 and 2028 in total by $5.7 trillion dollars (+69.94%).

Estimated Cost of Cybercrime

These forecasts and the current financial burden of crisis management following ransomware attacks has contributed to the growth of the cybersecurity insurance market. As businesses are increasingly adding cybersecurity insurance as part of their incident response plans, the market’s value is expected to reach $84.62 billion by 2030.

Who’s Paying Ransoms and How Much?

If you think you have been hit with inflation at the grocery store in the traditional marketplace, the rising cost of ransom demands demonstrates a similar trend within the ominous landscape of cyber threats. Covewear’s Q3 ransomware report pins the average ransomware payment at $850,700, a significant15% increase from the preceding quarter. Similarly, the median ransom payment experienced a modest uptick, reaching $200,000, reflecting a 5% rise from the previous quarter.

Who’s Paying Ransoms and How Much?

There is a profound disconnect between official advice from law enforcement and the vast majority of company policies when it comes to paying ransoms. Most respondents on Fortinet’s 2023 Global Ransomware Report whose enterprises fielded a ransomware attack have a policy that dictates they pay the ransom as requested. The report states that despite 72% detecting the incident within hours, sometimes minutes, more than 70% said they paid at least a portion of the ransom demanded, despite FBI guidance recommending no payment, as it doesn’t guarantee organizations will recover their data.

Claroty, a cyber-physical systems protection company, released new research this week on the state of industrial cybersecurity in 2023, which surveyed 1,100 information technology (IT) and operational technology (OT) security professionals. The research showed 75% of respondents worked at organizations that were targeted by ransomware attacks this year, and 69% confirmed they paid the ransom. More than half (54%) of those paid $100,000 USD or more. The demand for cyber insurance was high among respondents, as 80% of organizations already have cyber insurance policies and 49% are insured for half a million dollars or more.

The stakes are getting higher while almost 50% of organizations plan to reduce cybersecurity headcounts and infrastructure spending, while also reporting higher numbers of security incidents, according to a report from Observe. This necessitates a faster, more proactive response to the current threat landscape, from companies that plan to reduce security staff.

Adding more tools to the toolbox isn’t a guarantee that companies will be immune to attacks. Security teams need smarter tools that work in the background as a natural part of their workflows, with actionable alerts that continually raise the standard of security in response to more sophisticated threats.

It’s widely believed that large enterprises are the primary targets for ransomware, as they receive the most media attention, but reports show it’s not all “big game hunting.” Large institutions represent a much smaller percentage of lucrative targets.

Coveware’s Q3 ransomware report shows a third of ransomware impacted companies have 101-1,000 employees, and nearly 28% have 11 to 100 employees. Just 1.6% of impacted companies have more than 100,000 employees. This hasn’t changed much since 2021, when the National Association of Insurance Commissioners reported that between 50 and 75% of ransomware attack victims are small businesses.

Ransomeware impact

Although open source software has enabled engineering teams, both small and large, to move faster than ever before, it can also cause systems to come to a screeching halt when used to deliver malicious payloads as part of a ransomware attack. RDP compromise and email phishing remain the primary two attack vectors, but software vulnerability is trending higher as an entry point.

Ransomware attack vectors

Coveware’s report infers that software vulnerability is likely a more common ransomware attack vector than this chart shows:

While the most common conclusion to an investigation in Q3 was unknown/undetermined entry vector, the subtext behind this trendline is as follows:

(1) a greater incidence of software vulnerability exploitation that leaves little-to-no forensic footprints that can be used to conclusively identify it as such, AND 

(2) a continued reliance of ransomware actors on access brokers who may establish a foothold weeks or months ahead of the actual incident, whose access points cannot be confidently proven due to the expiration of critical forensic artifacts from the time of initial access.While the most common conclusion to an investigation in Q3 was unknown/undetermined entry vector, the subtext behind this trendline is as follows:

Ransomware lurking in malicious open source packages is also a rising concern. Vulnerabilities in widely-used internet-facing technologies, such as the Log4j vulnerability, can and have been exploited by ransomware operators with a high impact.

Ransomware Attacks Are Driving Up the Demand for Cyber Insurance#

As ransomware attack methods become increasingly more sophisticated, security professionals are moving to implement tools that utilize artificial intelligence (AI) and machine learning (ML) to speed up threat detection. Enterprises with inefficient processes that are slow to patch vulnerable systems will fall victim to breaches regardless of having the best tools in place.

Socket’s AI-driven threat analysis was created to help engineering teams get out ahead of these threats but cyber insurance sits on the other end of the spectrum, as a tool for remediating the damage following a security incident. The surge in ransomware attacks has driven up the demand for cyber insurance, as many businesses don’t have the financial capacity to pay the increasingly large sums that are often demanded by attackers.

report from AM Best on the cyber insurance market’s first hard market cycle showed a 50% increase in premiums in 2022 to $7.2 billion:  Direct premiums written (DPW) has tripled in the past three years with surging demand, far outpacing that of the broader commercial lines industry by a wide margin. Calendar-year results improved dramatically in 2022 following two straight difficult years, as insurers benefited from continued rate increases, tighter underwriting and a decrease in ransomware attacks. Compared with 2021, the loss ratio fell 23 percentage points to 43% on standalone policies, and 18 percentage points to 48% on packaged policies.

Direct premiums written (DPW) has tripled in the past three years with surging demand, far outpacing that of the broader commercial lines industry by a wide margin. Calendar-year results improved dramatically in 2022 following two straight difficult years, as insurers benefited from continued rate increases, tighter underwriting and a decrease in ransomware attacks. Compared with 2021, the loss ratio fell 23 percentage points to 43% on standalone policies, and 18 percentage points to 48% on packaged policies.

Underwriters have managed to reduce their loss ratio on both standalone and packaged policies using tools to manage exposures.

“In addition to the rate increases, underwriters have cut limits, increased insureds’ own retention and improved risk selection,” AM Best senior industry analyst Christopher Graham said. “With the cyber universe expanding and becoming more complex with artificial intelligence creating new exposures and ransomware attacks returning to prominence in 2023, the demand for cyber coverage will only increase.”

The emerging cyber insurance market has a complicated relationship with ransomware response. Although it would be easy to conclude that cyber insurance companies are enabling the ransomware ecosystem by covering payments, the situation is more nuanced. Law enforcement’s black and white approach to ransom requests has resulted in a dearth of best practices for incident response.

Certainly if companies never paid ransoms, the ransomware industry would not have the lucrative business model that it operates on today. Combating ransomware requests has become even more complicated in the face of the emerging Ransomware-as-a-Service (RaaS) model where affiliates flock to the most effective ransomware strains.

Companies pay ransoms for a multitude of complex reasons. Sometimes paying is more economical than rebuilding IT systems and repairing reputational damage. Other times it’s driven by the threat of sensitive customer data being exposed. The company risks getting sued or investigated by a regulator. Lawyers frequently play a strong role in advising the company during incident response. Often the encrypted data stolen is vital for business continuity and companies may have no other way of recovering their losses to remain operational.

An exhaustive study from the Royal United Services Institute (RUSI) examined the role of cyber insurance in addressing the threats posed by ransomware. Researchers contend that there is “no compelling evidence that victims with cyber insurance are much more likely to pay ransoms than those without.” They concluded that “by linking improvements in security practices to coverage, cyber insurance is currently one of the few market-based levers for incentivizing organizations to implement security controls and resilience measures.”

RUSI’s research highlights the unique role that cyber insurance companies play in bringing some semblance of order to a ransomware victim’s process for navigating sensitive decisions:

For victims, the decision to pay a ransom is a complex dilemma involving many factors, and it is rarely a silver bullet. Crucially, there is no strong evidence that insurers are encouraging victims to pay ransoms. In fact, it seems likely that most ransomware victims with cyber insurance make more informed decisions about ransom payments and generally handle incidents better than those without insurance. 

At the same time, the potential role that cyber insurance could play in actively reducing the profitability of ransomware is limited by a lack of market-wide best practices for ransomware response, a lack of clarity over what constitutes a reasonable last resort for a ransom payment, and limited market penetration.

Cyber insurance companies have been instrumental in requiring companies to improve their security controls as a prerequisite for obtaining coverage and for setting acceptable limits for ransomware coverage. Many insurance companies are also willing to work together with those they insure to reduce their attack surface and respond in a timely way to known vulnerabilities. RUSI’s report includes an example of an underwriter that helped identify and remediate a critical Microsoft Exchange vulnerability in 2021:

“We were able to scan our entire book immediately as soon as that hit and find out how many of our clients had that vulnerability, and then we were on the phone, on the emails, getting them to remediate. So, we narrowed that down from 750 companies in our book that had that vulnerability to five or six within a matter of a couple of weeks.”

The 2023 cyber insurance market is responding to the rise in ransomware with higher premiums, more restricted and conditional coverage, and more rigorous security requirements, which can have a positive impact on reducing the profitability of ransomware operations. This is a rapidly evolving market where insurers are currently incentivized to help companies adopt better security practices to mitigate their risk.

This article originally appeared on Socket.dev and was syndicated by MediaFeed.org.

More from MediaFeed:

The biggest scams in America

The biggest scams in America

The 2017 Better Business Bureau (BBB) Scam Tracker Annual Risk Report is out and there are a few changes that consumers should take note of.

Before we get to the big list, consider this: In 2017, Americans reported more than 47,000 scams to the BBB, and that’s likely only a very small fraction of the scams that actually occur.

SIphotography / Getty

Scammers pose as the Feds, call or email victims and tell them that they’ve won a government grant. All they need to do is provide their checking account information. 

2017 Rank: 10

2016 Rank: 11

Olivier Le Moal / Getty

Scammers text or email posing as a friend or relative in trouble. They ask for money to help them out of a jam, and often get it.

2017 Rank: 9

2016 Rank: 9

BrianAJackson / Getty

Interested in a time share? How about one that costs next to nothing? Scammers tease too-good-to-be-true vacation offers, and victims are told they need to act fact or else they’ll lose out. They send the cash and end up taking a vacation from their money.

2017 Rank: 8

2016 Rank: 12

misscherrygolightly / Getty

Scammers pose as employees of computer and software companies and tell victims that their computers are at risk. They offer to protect the machine from viruses or malware, gain access to it, then often hold it hostage or demand money to “fix” it. If you’ve ever gotten one of these calls – and chances are you will if you haven’t already – read this tech support scam explainer.

2017 Rank: 7

2016 Rank: 6

Zinkevych / Getty

Need a new roof? How about windows? These scammer often go door to door, offering great deals on what can be very expensive home repairs. All they need is a deposit. Victims pay it and the repairs never happen. (Worried about home improvement scams? Read this.)

2017 Rank: 6

2016 Rank: 1

Antonio_Diaz / Getty

There are quite a few variations of the old fake check scams. Some scammers are actually able to cash fake checks at banks. Others send “prizes” in the form of fake checks to consumers and all they need in return is some cash to cover the taxes. Beware!

2017 Rank: 5

2016 Rank: 2

AndreyPopov / Getty

If you’re desperate for a loan and come across a lender you’ve never heard of who promises low interest rates, big loan amounts, easy payment terms, and all with no credit check, you could be dealing with a scammer. They might be after your personal information or a sizable “application fee.”

2017 Rank: 4

2016 Rank: 5

istockphoto

People in search of a job are often particularly susceptible to scams. They often fall victim to scammers offering easy ways to make lots of money, all in exchange for a fee.

2017 Rank: 3

2016 Rank: 3

mangpor_2004 / Getty

This one has been around a while too. Scammers claim they’ve got a hot investment opportunity and put the pressure on to fork over money or risk missing out. In one version of this scam, criminals pose a government regulators in order to lure people into investments with “guaranteed” returns.

2017 Rank: 2 

2016 Rank: 6

William_Potter / Getty

This scam happens to buyers and sellers alike. Sometimes people buy something online and never get the item, or get something very different from what they expected. Other times, a seller on a site like eBay receives a check and sends the item to the buyer, only to discover that the check was a fake. (Worried you could fall victim to online shopping scams? Read this.)

2017 Rank: 1

2016 Rank: 4

Learn more about 20 different types of identity theft and fraud.

This article originally appeared on Experian News and was syndicated by MediaFeed.org.

Rasulovs / Getty

Featured Image Credit: DepositPhotos.com.

Previous Article

Brad and Kimberly Paisley opened a free toy store to help families in need

Next Article

Your daily horoscope for Dec.16 according to ChatGPT

You might be interested in …

29 simple strategies for retiring early

According to the Federal Reserve, fewer than four in 10 Americans feel they are on track with their retirement savings, but some are bolstering their accounts through extreme savings strategies in hopes of retiring early.  […]