Paying Cybercriminals A Ransom Will Double Your Recovery Costs

Paying those cyber criminals any ransom to recover your data adds over half a million dollars to the cost of organisational recovery, say the experts at the leading advanced threat protection firm Sophos.
 
They commissioned an independent survey of 5,000 IT managers across 26 countries. The findings provide brand new insight into what actually happens once ransomware hits.  It reveals the percentage of attacks that successfully encrypt data; how many victims pay the ransom; how paying the ransom impacts the overall clean-up costs; and the role of cyber security insurance. 
 
The survey was conducted during January and February 2020 and respondents came from 26 countries across six continents. Cyber ransomware victims who take the difficult decision to pay cyber criminals to prevent their data from being leaked or to regain control of their systems double the costs of recovering from the initial attack, according to statistics gathered by Vanson Bourne on behalf of Sophos.
 
In its latest annual State of Ransomware report, which has just been released, Sophos reported that the average cost of recovery from a ransomware attack clocked in at £588,000 for victims that don’t cough up, but £1.1m for those that choose to pay. Across the survey sample, 5,000 IT decision-makers in 26 countries in the Americas, Asia-Pacific and central Asia, and Europe, the Middle East and Africa, Sophos found that 27% of organisations hit by ransomware admitted paying up.
 
The survey also found that 51% of organisations had experienced a significant ransomware attack in the past 12 months, down from 54% in 2017, with data encrypted in 72% of successful attacks. 
 
2020 Ransomware Reality
The survey provides fresh new insight into the experiences of organisations hit by ransomware, including:
  • Almost three quarters of ransomware attacks result in the data being encrypted. 51% of organisations were hit by ransomware in the last year. The criminals succeeded in encrypting the data in 73% of these attacks.
  • 26% of victims whose data was encrypted got their data back by paying the ransom. A further 1% paid the ransom but didn’t get their data back. Overall, 95% of organisations that paid the ransom had their data restored.
  • 94% of organisations whose data was encrypted got it back.
  • More than twice as many got it back via backups (56%) than by paying the ransom (26%).
  • • Paying the ransom doubles the cost of dealing with a ransomware attack. The average cost to rectify the impacts of the most recent ransomware attack (considering downtime, people time, device cost, network cost, lost opportunity, ransom paid etc.) is US$732,520 for organisations that don’t pay the ransom, rising to US$1,448,458 for organisations that do pay.
  • Despite the headlines, the public sector is less affected by ransomware than the private. 45% of public sector organisations were hit by ransomware last year, compared to a global average of 51%, and a high of 60% in the media, leisure, and entertainment industries.
  • One in five organisations has a major hole in their cybersecurity insurance. 84% of respondents have cyber security insurance, but only 64% have insurance that covers ransomware.
  • Cyber security insurance pays the ransom. For those organisations that have insurance against ransomware, 94% of the time when the ransom is paid to get the data back, it’s the insurance company that pays.
  • Most successful ransomware attacks include data in the public cloud. 59% of attacks where the data was encrypted involved data in the public cloud. While it’s likely that respondents took a broad interpretation of public cloud, including cloud-based services such as Google Drive and Dropbox and cloud backup such as Veeam, it’s clear that cyber criminals are targeting data wherever it stored.
“Organisations may feel intense pressure to pay the ransom to avoid damaging downtime. On the face of it, paying the ransom appears to be an effective way of getting data restored, but this is illusory,” said Sophos principal research scientist Chester Wisniewski.
 
Sophos found that  56% of the sample group said they had been able to recover their data from backups without paying the ransom, but of those which did pay, only about 1% got none of their data back, rising to 5% of public sector  organisations.
 
Contrary to popular belief, the public sector was less affected by ransomware than many others, with attacks reported by 45% of organisations in that category, compared with 60% of media, leisure and entertainment businesses, according to Sophos. 
 
Given that  51% of organisations experienced ransomware in the last year and with average remediation costs of US$761,106, organisations should question the value of insurance that excludes ransomware. 
 
Notable in the survey data is that there is no single main attack vector. Rather, attackers are using a range of techniques and whichever defense has a weakness is how they get in. When one technique fails they move on to the next, until they find a weak spot. 
 
This data demonstrates the need for an effective layered defense that covers your endpoints, servers, public cloud instances, email, network gateway, and supply chain. Just focusing on a single technology is a recipe for infection. 
 
Recommendations 
The survey has confirmed that ransomware remains a very real threat for organisations today. It’s also provided insight into how to minimise your risk of being held hostage: 
  •  Start with the assumption that you will be hit. Ransomware it doesn’t discriminate: every organisation is a target, regardless of size, sector, or geography. Plan your cybersecurity strategy based on the assumption that you will get hit by an attack. 
  •  Invest in anti-ransomware technology to stop unauthorised encryption. 24% of survey respondents that were hit by ransomware were able to stop the attack before the data could be encrypted. 
  •  Protect data wherever it’s held. Almost six in 10 ransomware attacks that successfully encrypted data include data in the public cloud. Your strategy should include protecting data in the public cloud, private cloud, and on premises. 
  • Make regular backups and store offsite and offline. 56% of organisations whose data was encrypted restored their data using backups last year. Using backups to restore your data considerably lowers the costs of dealing with the attack compared with paying the ransom. 
  • Ensure your cyber insurance covers ransomware. Make sure that you’re fully covered if the worst does happen. 
  • Deploy a layered defense. Ransomware actors use a wide range of techniques to get around your defenses; when one is blocked, they move on to the next one until they find the chink in your armor. You need to defend against all vectors of attack. 
Sophos Intercept X Endpoint offers advanced protection technologies that help your organisation to disrupt the whole attack chain. 
 
In the words of Chester Wisniewski, “Sophos’s findings show that paying the ransom makes little difference to the recovery burden in terms of time and cost. This could be because it is unlikely that a single magical decryption key is all that’s needed to recover. Often, the attackers may share several keys, and using them to restore data may be a complex and time-consuming affair.”
 
Sophos:     Sophos:         Computer Weekly:       Search Security:       
 
You Might Also Read: 
 
New Ransomware Formats Double:
 
 
 
 
 
« Employees Lack Cyber Protection In Lockdown
German Government Hit By Russian Hackers »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

inBay Technologies

inBay Technologies

inBay Technologies' idQ Trust as a Service (TaaS) is a unique and innovative SaaS that eliminates the need for user names and passwords.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

42Gears

42Gears

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

TRU Staffing Partners

TRU Staffing Partners

TRU Staffing Partners is an award-winning contract staffing and executive search firm for cybersecurity, eDiscovery and privacy companies and professionals.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

KATIM

KATIM

KATIM is a leader in the development of innovative secure communication products and solutions for governments and businesses.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.

ZeroThreat

ZeroThreat

ZeroThreat, a vulnerability scanning and automated pentesting tool, accelerates vulnerability detection 5x faster with unprecedented accuracy and efficiency in real-time.