News

Ransomware Report: Don't Pay the Attackers

 According to a recent report, paying the ransom for an organization's hijacked data doesn't ensure return of the stolen data.   

This comes from the "2022 Ransomware Trends Report" released by backup and data recovery firm Veeam this week at its VeeamON conference. The report also found that 24 percent of organizations that paid the amount demanded by ransomware attackers ended up not recovering their stolen data.

The report, compiled by surveying 1,000 global IT leaders. also found that 19 percent of those affected by ransomware were able to recover their data through their own means and without having to pay off the attackers. According to Veeam, this shows that ransomware attacks, when countered, are possible to reverse.

It also indicates that most organizations don't have the tools or know-how to try to recover their hijacked data before they end up paying for their data back.

"One of the hallmarks of a strong Modern Data Protection strategy is a commitment to a clear policy that the organization will never pay the ransom, but do everything in its power to prevent, remediate and recover from attacks," said Danny Allan, CTO at Veeam. "Despite the pervasive and inevitable threat of ransomware, the narrative that businesses are helpless in the face of it is not an accurate one."

Allan added that IT should routinely test their data protection solutions and protocols and ensure that employees are well-versed in spotting possible ransomware attacks.

When data is eventually recovered after remediation through payment, data recovery took an average of 18 days. And, in some cases, longer. Some organizations (22 percent) reported it took one to two months to fully recover the data, and 3 percent said they were down for two to four months.

While some of that time was spent decrypting the encrypted stolen data, much of the downtime could be attributed to deep scans of restored systems to confirm they were "clean" from any ransomware remnants.

According to the report, phishing e-mails and malicious links and Web sites continue to be the top (44 percent) ransomware entry points, with infected patches and software coming right behind with 41 percent of all ransomware attacks by those surveyed. Here are the remaining entry point sources:

  • Compromised credentials and spraying attacks (35 percent).
  • Insider threats (32 percent).
  • Zero-day vulnerabilities (26 percent).

The good news is that according to those surveyed, only 1 percent of those who experienced a ransomware attack were not able to identify the entry point. Veeam credits the improvements in monitoring tools and a concerted effort toward ransomware prevention by many IT shops for the high success in identifying the source of ransomware.

As for what attackers go for when a system is infiltrated, the report finds that backup repositories were targeted 94 percent of the time. Further, specific production platforms or application types were targeted in 80 percent of successful ransomware attacks, making ransomware prevention not just a duty of IT security.

"This alone should drive broader conversations within IT, so cyber security isn't just the delegated to the security team; database administrators should also help ensure that database servers are secure and administrators should help ensure hypervisors are patched, that Windows updates are routinely run, etc.," read the report.

About the Author

Chris Paoli (@ChrisPaoli5) is the associate editor for Converge360.

Featured

  • 2022 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • Datto Goes Private as Its Acquisition by Kaseya Is Finalized

    Kaseya's $6.2 billion acquisition of Datto, in the works for two years, is now complete, taking Datto from a publicly traded company to a private one.

  • Nebula

    Microsoft Expands on AI Face Standardization Rules and Guidelines

    Microsoft on Tuesday announced Version 2 of Microsoft's "Responsible AI Standard" document, which includes a disclosed a use-case approval process for its Azure Face API, Computer Vision, and Video Indexer customers, was released this week.

  • Road with Ocean Image

    Metaverse Standards Forum Created in the Spirit of Cooperation

    More than 30 tech organizations have come together to form the Metaverse Standards Forum, which will work towards standardizing requirements for future metaverse tech.