• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Paying for ransomware could cost you more than just the ransom

Paying for ransomware could cost you more than just the ransom

  • Posted on:March 22, 2017
  • Posted in:Industry News, Security
  • Posted by:
    Trend Micro
0
Paying for ransomware could end up costing you more than you anticipated.

 

Ransomware attacks are now incredibly sophisticated and occurring with increasing frequency.  In fact, many called 2016 “the year of ransomware,” and for good reason: Trend Micro found there were 752 percent more new ransomware families discovered compared to 2015.

With the rise of ransomware, it’s very likely that your business will be affected by one of these attacks in the near future. When this happens, how would you respond? Would you pay the hacker or seek an alternative? You might want to reconsider the former because paying for ransomware could end up costing you more than you anticipated, leaving you to handle the fallout.

Demands escalating

Attackers are not only making their ransomware more sophisticated, they are also increasing their financial demands to restore your systems. According to TechRadar, the average ransom at the beginning of 2016 ran around $294. However, within six months, that rose to $679. While this might seem like a small price to pay, the payment demands are escalating to take advantage of businesses that require their sensitive data , such as those in health care and finance sectors.

If you fail to pay, ransomware might delete your files.If you fail to pay, ransomware might delete your files.

While some hackers simply ask for payment, others have punishments attached to their demands. Jigsaw ransomware comes with a countdown clock that initiates upon startup. According to Norton, the longer it takes for you to pay up, the more of your files will be deleted. If you try to restart your computer or tamper with the ransomware, 1,000 files will be deleted as a consequence. These tactics are likely to spur you into action, but it shouldn’t involve paying the hacker.

“There’s no guarantee that the hacker will live up to his or her word.”

Never pay the ransom

Ransomware may seem to put you in the palm of the attacker’s hand. You might feel that you have no other choice but to pay up and restore your data quickly. However, there’s no guarantee that the hacker will live up to his or her word and give back your files.

According to Trend Micro research, nearly 33 percent of firms that pay the ransom fail to get their data back. Hackers might simply restore your data a little at a time and ask for more money to recover the rest.

Ransomware is a dangerous and expensive game for businesses to play, and the stakes are mounting. You should never pay the ransom – instead, take preventative action to ensure you can avoid this situation altogether.

Prepare your systems for recovery

The popularity and prevalence of ransomware are not expected to wane anytime soon. New ransomware strains are being created to tap into the mobile user base, which can impact both personal and business information, Trend Micro stated – and that could lead to a corporate system comprise down the line.

Rather than waiting for the inevitable, you should fortify your network with ransomware protection and prepare your systems to recover from a ransomware attack. Back up critical files and have them readily accessible. If ransomware ever gets past your defenses, you simply have to clean your device and restore it with the archived assets. You won’t have to pay the attacker, and you’ll ensure that your essential data remains secure.

Related posts:

  1. What Happens When Victims Pay Ransomware Attackers?
  2. Ransomware 101: What Organizations Need to Know
  3. Ransomware Updates: Newest Threats, Protection Best Practices
  4. Don’t Pay the Ransom, Get Trend Micro Anti-Ransomware

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Fujitsu and Trend Micro Demonstrate Solution To Secure Private 5G
  • Trend Micro Receives 5-Star Rating in 2021 CRNÂŽ Partner Program Guide
  • Smart Factory Cyber Attacks Knock Out Production for Days
  • Eliminate Hesitations: Security Simplified For Those Building In The Cloud
  • Nuffield Health Depends on Managed XDR with Trend Micro Vision One
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.