Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Economics of Ransomware – To Pay Or Not To Pay?

Ransomware

Ransomware

In school, I always loved economics. That is, of course, the absolute opposite sentiment of 97% of people.  The reason I have the feelings towards economics that I do is the fact that economic principles drive the world around us, something that I am reminded of frequently. The Laffer curve, supply-side economics and Keynesian philosophies are all over the news, but there are countless additional clues around us of how economic theory drives everyday decisions.  Like whether to pay to free yourself of ransomware.

Why?  Well, first, you can’t “win.”  There is no winning, not unless you possess unlimited resources and patience.  But you don’t, and you’re not smart enough to outwit them.  I can imagine some folks thinking that their back-up schema is so clever they can just endure the loss of one system or set of systems.  Are you sure those data sets are not infected as well?  

Prevention is key, but after the ransomware has been released, there’s little that can be done.  Prevention in this context means all the same tactics and strategies often written about here in SecurityWeek and elsewhere: identity management, password hygiene, employee training (e.g., avoidance), data back-up best practices, etc.  It’s all much the same – in this case, all we are dealing with is a different payload on a seemingly infinite list of vulnerabilities.

There are technologies in the area of ‘detection’ / prevention – but I’m not going to mention them here because they are currently either (1) generally ineffective (yes, despite vendor promises), (2) are so performance-intensive that they are virtually unusable, or (3) from a small number of vendors you probably you don’t do business with. I have seen some hardware-level assisted technologies in experimental stages that take actions at the lowest level of the stack – but despite their true promise, they’re not quite ready.

Second, paying the ransom is not prohibitively expensive, especially compared to the damage / costs associated with having the payload of the ransomware detonate. Criminals have embraced the art and science of pricing – finding the point where marginal cost equals marginal return.  As an economist at heart, that is a beautiful thing. The criminals behind ransomware are also amateur economists.

While the success of “commodity” ransomware attacks may be declining, more targeted and sophisticated attacks are on the rise against businesses and government organizations across the U.S. and costing many of these entities millions in damages.

A side note on “just pay”: you must actually have money on hand in the format of the day in order to be capable of paying. Think of this like the “petty cash drawer” – quick currency on hand to take care of urgent issues. The bottom line is you can’t pay if you don’t have the right currency.  I’m not going to, in this static column, prescribe a currency to have on hand because the currency frequently changes.  So, your advisors will have to stay on top of this.  Sometimes it’s gift cards, but often it’s cryptocurrencies.  If your organization is a hospital, you must have a robust amount of varied payment methods ready to go in my opinion.  If your organization is of a less time-sensitive nature, you can be less aggressive here.  Think through this though because the key advice here is this: get back to work as quickly as possible. 

You have to think about this as a speeding ticket. You did something wrong (and you probably did), received a fine, and should just pay it. Fighting it is too expensive, too time-consuming, too much of downside risk. The cost and embarrassment stings a bit, but the alternative is much worse.  The important thing is to understand your mistake – and that’s exactly what this is when it happens, a ‘self-inflicted injury’ – and make sure it doesn’t happen again.

Advertisement. Scroll to continue reading.

At the end of the day, I encourage businesses and organizations of all sizes to leave the moral judgments regarding ransomware to the government.  Leave the “fight” to the companies that are paid to fight, that are equipped to fight. Just pay. Just pay and go on with your life. And in the future focus your energy on that ounce of prevention as frequently described by SecurityWeek.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.