Ransomware has emerged as one of the most virulent cybersecurity risks, affecting public and private sector alike.[i] In recent years, ransomware attacks have become more focused, sophisticated, costly, and numerous. Threat actors have shifted their tactics and techniques to include the destabilizing combination of encryption, data exfiltration, and company-shaming to attempt to extract sizable payments from their victims. According to the FBI, there was a 37% annual increase in reported ransomware cases and a 147% annual increase in associated losses from 2018 to 2019.[ii] The number of ransomware incidents continues to increase in 2020.[iii] Ransom payment amounts also reportedly are on the rise. The average ransom payment in the second quarter of 2020 was $178,254 – a 60% jump from the previous quarter.[iv] Seven-figure demands are not uncommon. Security experts say that even these numbers underestimate the true cost of ransomware attacks, which have disrupted factories and basic infrastructure and forced businesses to shut down.
Ransomware has been forging new ground in 2020, with cyber criminals using COVID-19 as another deployment lure.[v] This threat is not expected to go away anytime soon, with the FBI’s anticipating that malign actors will exploit increased use of virtual environments as a result of the pandemic.[vi]
What is an organization to do when faced with a ransomware attack?
On the threshold question of whether to pay, the FBI “advocate[s]” against it, in part because payment does not guarantee an organization will regain access to its data. The FBI nonetheless acknowledges “that when businesses are faced with an inability to function, executives will evaluate all options to protect their shareholders, employees, and customers.”[vii]
Ransomware victims and the white hat organizations with whom they work to address an attack (such as cyber insurance, digital forensics and incident response, and financial services that may involve processing ransom payments) also should be mindful of the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) recent advisory on potential sanctions risks associated with ransomware payments.[viii]
Key takeaways from this advisory are:
There are no easy answers to the difficult question of whether to pay. Companies must balance potential near-term benefit of decrypting data, which is not always guaranteed, against the risk of legal exposure for making a payment to a prohibited person or entity – not to mention the risk of increased targeting by threat actors once a payment has been made. Waiting until right-of-boom to assess these issues only will complicate the situation. As OFAC’s advisory makes clear, companies should have a plan in place before an attack ever occurs.
[i] Ransomware is a form of malware designed to block access to a computer system or data, often by encrypting data or programs on information technology systems to extort ransom payments from victims in exchange for decrypting the information and restoring victims’ access to their systems or data. In some cases, in addition to the attack, malign actors threaten to publicly disclose victims’ sensitive files that they have stolen from victims’ systems. The malign actors then demand a ransomware payment, usually through digital currency, in exchange for a key to decrypt the files and restore victims’ access to systems or data. FBI IC3 PSA, High-Impact Ransomware Attacks Threaten U.S. Business and Organizations, available at https://www.ic3.gov/media/2019/191002.aspx (Oct. 2, 2019).
[ii] See FBI IC3, 2018 Internet Crime Report, available at https://pdf.ic3.gov/2018_IC3Report.pdf; FBI IC3, 2019 Internet Crime Report, available at https://pdf.ic3.gov/2019_IC3Report.pdf.
[iii] See Verizon, 2020 Data Breach Investigations Report, available at https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf.
[iv] See Coveware, Ransomware Attacks Fracture Between Enterprise and Ransomware-as-a-Service in Q2 as Demands Increase, available at https://www.coveware.com/blog/q2-2020-ransomware-marketplace-report (Aug. 3, 2020).
[v] See FBI Press Release, FBI and Secret Service Working Against COVID-19 Threats, available at https://www.fbi.gov/news/pressrel/press-releases/fbi-and-secret-service-working-against-covid-19-threats (Apr. 15, 2020); FBI IC3 PSA, FBI Sees Rise in Fraud Schemes Related to the COVID-19 Pandemic, available at https://www.ic3.gov/media/2020/200320.aspx (Mar. 20, 2020).
[vi] See FBI IC3 PSA, Cyber Actors Take Advantage of COVID-19 Pandemic to Exploit Increased Use of Virtual Enviroments, available at https://www.ic3.gov/media/2020/200401.aspx (Apr. 1, 2020).
[vii] See FBI IC3 PSA, High-Impact Ransomware Attacks Threaten U.S. Business and Organizations, available at https://www.ic3.gov/media/2019/191002.aspx (Oct. 2, 2019).
[viii] See U.S. Dep’t of Treasury, Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments, available at https://home.treasury.gov/system/files/126/ofac_ransomware_advisory_10012020_1.pdf (Oct. 1, 2020).