Trending

HomeBlog
Organizations are Paying Ransom — the trend is growing!
Organizations are Paying Ransom — the trend is growing!

Organizations are Paying Ransom — the trend is growing!

Cybercriminal’s main motive behind executing a ransomware attack is the ransom amount, which is to be paid by the organizations to get themselves free from the hands of the cybercriminals. A rise in the number of ransomware attacks in the past year has contributed to the increased number of organizations opting to pay the ransom amount as demanded by the cybercriminals to restore their systems. The results of the recent Security Attitude Survey stated that the total number of organizations around the world that opt to pay the Ransom after falling victim to the ransomware attacks has increased from 14% to 39%. Recently, the Maze ransomware group attacked the computer systems of Hammersmith Medicines Research and then published personal details of thousands of former patients after the company declined to pay the ransom amount. Recently, the Cyble Research Unit (CRU), detected the Maze ransomware group exposing sensitive files of BetUS, an Online Sports Betting Company. By looking above, in this case, also the cybercriminals might have opted to expose the files due to the refusal of paying the ransom amount by BetUS.

Snapshot of leaked files of BetUS detected by CRU

In most cases, the organizations opt to pay out the ransom amount to cybercriminals due to various reasons which include the loss of reputation of their company, increased disruption in the organization’s operations, etc. which can ultimately lead the organization to suffer from huge financial losses. Generally, the main cost of ransomware is the associated downtime that the organization has to experience. Usually, the average ransom amount being asked is less than the average cost of downtime which the company has to face. This economic factor tends to make the organization pay out the ransom amount to the cybercriminal. In accordance with these ransomware attacks, Cyble not only holds the largest data breach monitoring search engine but also provides the services which include enabling faster detection of cyber threats via Cyble Vision and providing clear visibility to third-party cyber threats and risks via their Third-Party Cyber Risk Intelligence Platform.

On limited cases where organization have no choice but to pay the Ransom to sustain their business, they must improve their internal cybersecurity controls maturity to prevent themselves from landing into such situations.

About Cyble:

Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.

Cyble strives to be a reliable partner/facilitator to its clients allowing them with unprecedented security scoring of suppliers through cyber intelligence sourced from open and closed channels such as OSINT, the dark web and deep web monitoring and passive scanning of internet presence. Furthermore, the intelligence clubbed with machine learning capabilities fused with human analysis also allows clients to gain real-time cyber threat intel and help build better and stronger resilience to cyber breaches and hacks. Due to the nature of the collected data, the company also offer threat intelligence capabilities out-of-box to their subscribers.

report-ad-banner

THIS POST HAS BEEN EXPORTED FROM OUR MEDIUM CHANNEL

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading