In its annual report and review of real-world ransomware experiences, the State of Ransomware 2022, Sophos has revealed that 66% of organisations surveyed were hit with ransomware in 2021 – up from 37% in 2020.
► 46% of organisations that had data encrypted in a ransomware attack paid out
► Average amount paid on most significant attack increased nearly 5X to $812,360
► 3X increase in those paying $1 million or more
The average ransom paid by organisations that had data encrypted in their most significant ransomware attack increased nearly fivefold to reach $812,360, with a three-fold increase in the proportion paying ransoms of $1 million or more. In addition, the survey found that 46% of those that had data encrypted paid the ransom to get their data back, even if they had other means of data recovery, such as backups.
The report summarises the impact of ransomware on 5,600 mid-sized organisations in 31 countries, with 965 sharing details of ransomware payments.
Sophos said there could be several reasons for the escalation in payments and the proportion of victims paying up. Incomplete backups, a desire to prevent stolen data from appearing on a public leak site, and pressure to get back up and running as soon as possible were all listed as potential reasons – but Sophos warned against this as a course of action.
Chester Wisniewski, principal research scientist at Sophos, said: ‘Restoring encrypted data using backups can be difficult and time-consuming, so it can be tempting to think that paying a ransom for a decryption key is a faster option. It’s also an option fraught with risk. Organisations don’t know what the attackers might have done, such as adding backdoors, copying passwords and more. If organisations don’t thoroughly clean up the recovered data, they’ll end up with all that potentially toxic material in their network and potentially exposed to a repeat attack.”
The main findings of the State of Ransomware 2022 global survey, which covers ransomware incidents experienced during 2021, as well as related cyber insurance issues, include:
- Ransom payments are higher – in 2021, 11% of organisations said they paid ransoms of $1 million or more, up from 4% in 2020, while the percentage of organisations paying less than $10,000 dropped to 21% from 34% in 2020
- More victims are paying the ransom – in 2021, 46% of organisations that had data encrypted in a ransomware attack paid the ransom. In addition, 26% that were able to restore encrypted data using backups in 2021 also paid the ransom
- The impact of a ransomware attack can be immense – the average cost to recover from the most recent ransomware attack in 2021 was $1.4 million. It took on average one month to recover from the damage and disruption. A huge, 90% of organisations said the attack had impacted their ability to operate, and 86% of private sector victims said they had lost business and/or revenue because of the attack
- Many organisations rely on cyber insurance to help them recover from a ransomware attack – 83% of mid-sized organisations had cyber insurance that covers them in the event of a ransomware attack – and, in 98% of incidents, the insurer paid some or all the costs incurred (with 40% overall covering the ransom payment)
- 94% of those with cyber insurance said that their experience of getting it has changed over the last 12 months, with higher demands for cybersecurity measures, more complex or expensive policies and fewer organisations offering insurance protection
‘The findings suggest we may have reached a peak in the evolutionary journey of ransomware, where attackers’ greed for ever higher ransom payments is colliding head on with a hardening of the cyber insurance market as insurers increasingly seek to reduce their ransomware risk and exposure,’ said Wisniewski.
‘In recent years, it has become increasingly easy for cybercriminals to deploy ransomware, with almost everything available as-a-service. Second, many cyber insurance providers have covered a wide range of ransomware recovery costs, including the ransom, likely contributing to ever higher ransom demands. However, the results indicate that cyber insurance is getting tougher and in the future ransomware victims may become less willing or less able to pay sky high ransoms.
‘Sadly, this is unlikely to reduce the overall risk of a ransomware attack. Ransomware attacks are not as resource intensive as some other, more hand-crafted cyberattacks, so any return is a return worth grabbing and cybercriminals will continue to go after the low-hanging fruit.’
Sophos recommends the following best practices to help defend against ransomware and related cyberattacks:
- Install and maintain high-quality defences across all points in the organisation’s environment. Review security controls regularly and make sure they continue to meet the organisation’s needs
- Proactively hunt for threats to identify and stop adversaries before they can execute their attack – if the team lacks the time or skills to do this in house, outsource to a managed detection and response (MDR) specialist
- Harden the IT environment by searching for and closing key security gaps: unpatched devices, unprotected machines, open RDP ports, etc. extended detection and response (XDR) solutions are ideal for this purpose
- Prepare for the worst. Know what to do if a cyber incident occurs and keep the plan updated
- Make backups, and practice restoring from them so that the organisation can get back up and running as soon as possible, with minimum disruption
Read The State of Ransomware 2022 report for the full global findings and data by sector.
Contact the Team
If you’d like to talk about protecting your customers (and your own business) from ransomware attacks, please complete the form below to contact TD SYNNEX’s specialist Security Practice. As well as advice and engagement, they can talk to you about increasing your cybersecurity skills and capabilities through the Security Practice Builder. Just provide your details and we will be in touch.