Southern Jewelry News
  • Featured
    • All
    • Featured
    • Featured Retailers
    • Retailer Roundtable
    • Sponsored Content
    • Supplier Spotlight
    Jeweler brings Midwest to the Southwest
    Tara Fine Jewelry: Atlanta’s not-so-secret, best-kept secret
    Finding the Big Ones; Zambian Trophies for the Ages
    The Golden Girls of Gemstones
  • Latest News
    • All
    • COVID-19
    • Furry Friends
    • Industry Awards
    • Industry Events
    • NRF
    • On The Move
    • Other News
    • Tradeshow News
    • Video
    • What's New
    Jewelry Marketing Survival Guide
    JCK Industry Fund announces over $250,000 allocated to 2021 grant recipients
    JCK Industry Fund announces 2023 grant recipients
    diamonds on plant
    How to drive more sales and referrals through social media
    545 fifth ave building
    IGI moves to expanded New York offices and gem laboratory
  • Podcast
  • Columnists
    Jewelry Marketing Survival Guide
    The Story Behind the Stone: Out of the Blue
    What’s Hot Now!: Latest Designer Trends 2023
    A Winning Strategy: How SEO and buying intent can skyrocket your sales
    business people shaking hands
    Networking for small business owners
    Is the customer always right?
    Successful Custom: A Clean Disaster
    Brad Huisken
    A quick note about technology
    Computer with a Jewelry website
    Why starting SEO earlier in the year will benefit your jewelry store
  • Classifieds
  • Subscriptions
    • Newsletter Signup
    • Print Subscription
No Result
View All Result
Southern Jewelry News
  • Featured
    • All
    • Featured
    • Featured Retailers
    • Retailer Roundtable
    • Sponsored Content
    • Supplier Spotlight
    Jeweler brings Midwest to the Southwest
    Tara Fine Jewelry: Atlanta’s not-so-secret, best-kept secret
    Finding the Big Ones; Zambian Trophies for the Ages
    The Golden Girls of Gemstones
  • Latest News
    • All
    • COVID-19
    • Furry Friends
    • Industry Awards
    • Industry Events
    • NRF
    • On The Move
    • Other News
    • Tradeshow News
    • Video
    • What's New
    Jewelry Marketing Survival Guide
    JCK Industry Fund announces over $250,000 allocated to 2021 grant recipients
    JCK Industry Fund announces 2023 grant recipients
    diamonds on plant
    How to drive more sales and referrals through social media
    545 fifth ave building
    IGI moves to expanded New York offices and gem laboratory
  • Podcast
  • Columnists
    Jewelry Marketing Survival Guide
    The Story Behind the Stone: Out of the Blue
    What’s Hot Now!: Latest Designer Trends 2023
    A Winning Strategy: How SEO and buying intent can skyrocket your sales
    business people shaking hands
    Networking for small business owners
    Is the customer always right?
    Successful Custom: A Clean Disaster
    Brad Huisken
    A quick note about technology
    Computer with a Jewelry website
    Why starting SEO earlier in the year will benefit your jewelry store
  • Classifieds
  • Subscriptions
    • Newsletter Signup
    • Print Subscription
No Result
View All Result
Southern Jewelry News
No Result
View All Result
Home Featured Articles Featured

Ransomware attack – Should you pay the ransom?

Find out why that’s a bad idea

Greg C Holland-Merten, Director HMH Consultants by Greg C Holland-Merten, Director HMH Consultants
August 2, 2021
Share on FacebookShare on Twitter
Reading Time: 8 minutes

Ransomware has been a plague on businesses small and large. An estimated 61% of organizations worldwide experienced a damaging ransomware incident in 2020, a 20% increase over the same period in 2019, according to security specialists HMH Consultants. A successful ransomware attack is inevitably an expensive, disruptive disaster. Ransomware cyber insurance claims grew by 260% in 2020. This flood of ransomware has led to a wave of questions from businesses wondering what to do to stay safe and what to do if they get hit – including whether they should pay the ransom.

Ransomware Attack

This huge surge in cybercrime has helped produce a thriving dark web economy for stolen data. And where there’s demand, there will be cybercriminals ready to supply eager buyers. The most common way for them to do that is through ransomware. An organization that falls prey to ransomware doesn’t just lose its data. Those unfortunate organizations also lose an average of six working days to system downtime, with 37% saying downtime lasted one week or more after that incident. Not to mention the exorbitant costs of investigation, remediation, and recovery; it’s no wonder that 60% of companies that are hit by a cyberattack go out of business.

One solution that cybercriminals eagerly present to businesses they’ve attacked is to pay the ransom. An estimated 52% of organizations choose to negotiate with the extortionists or simply pay the ransom that is demanded. Paying off a ransomware demand isn’t cheap; the average ransomware payment in the third quarter of 2020 was $233,817, up 31% from the second quarter of last year. In some ransomware variants, like the current weapon of choice double extortion ransomware, victims can be on the hook for two payments – or even three if they’re ensnared by the new triple extortion variety.

If a company doesn’t pay the ransom, the cybercriminals will still profit from selling the victim’s data. If a company does pay the ransom, their money gets disseminated all over the dark web. Ransoms don’t just go to one person or organization – even an ancillary participant in a ransomware attack will profit. Ransomware practitioners have a high chance of walking away with substantial cash, and everyone gets paid. Major gangs often run their scams through affiliates, so the actual attacker is very likely an independent contractor of sorts. They’ll be responsible for running everything about the operation from planning to execution. The affiliate may be a smaller gang or just a group of freelancers getting together for one job. The boss gang may supply the tech, or the affiliate may be bringing their own. Frequently, the attackers will hire freelancers through dark web forums and gather resources from dark web data markets and dumps.

If the operation is a success, the attackers will then notify the victims that they’ve got their data. Many gangs maintain their own dark websites where they announce their wins by supplying a sample of the stolen data and the ransom demand. Some cybercrime gangs are regularly in contact with industry journalists. The larger gangs maintain their own publicity operations, contacting industry publications directly with evidence and press releases. The REvil organization, a major Russia-based gang, has its own website to announce successful hits and a communications staff that handles press releases, announcements, and interviews with journalists just like any other business.

For the attackers affiliated with the DarkSide ransomware gang that just conducted a successful attack against Colonial Pipeline, that payday was an estimated $5 million. But they were victims of their own success. Pulling off that operation drew intense scrutiny from law enforcement and terrorism officials, ultimately driving the gang to announce that they were shutting down.

This is not uncommon. Ransomware gangs frequently break up when the heat is on. The gang will pay out its funds to its stakeholders who freelance until the coast is clear. Before the gang went dark, DarkSide had received $90 million in bitcoin ransom payments, according to blockchain analysts at Elliptic. Of the total haul, experts estimate that $15.5 million went to DarkSide’s developer while $74.7 million went to its affiliates. They further estimated that the average ransomware payment in a DarkSide operation was about $1.9 million.

How well does paying off the gang work out? Not very well at all. Just like any other extortion racket, the results of paying the ransom are wildly variable, but none of them are good. An estimated 66% of organizations that pay the ransom can recover their data at least in part. Another 34% of companies that pay the ransom never see their data again. Paying the ransom to cybercriminals carries no guarantees that your data won’t be copied, or they won’t leave a backdoor into your systems that allows them to return at their leisure. Payment is also unlikely to be covered by cyber-insurance. While in the past insurers may have covered it, many are saying no these days.

It’s also illegal. In October 2020, The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced that paying ransom to cybercriminals is unlawful. In an official advisory, the agency stated that organizations that facilitate ransomware payments to hackers on behalf of ransomware victims, including financial institutions, cyber insurance firms and companies involved in digital forensics and incident response, are violating OFAC regulations. Also included in the advisory, OFAC said that they may impose civil penalties for sanctions violations if a person or organization is paying a ransom to a gang located in a country that the US government has sanctioned.

Even before OFAC’s ruling, experts across the cybersecurity spectrum agreed: never pay cybercriminals the ransom. Instead, use a smart, strong defensive strategy to avoid being a victim of ransomware.

HMHHMH Consultants can help you provide essential protection for your systems and data from intrusion by cybercriminals with a stolen or phished password, including single sign-on (SSO), multifactor authentication (MFA), automated password resets and simple remote management.

To learn more about how the HMH Consultants digital risk protection platform simply call or arrange an interview and learn how they can help you to secure your business and your customers against ransomware threats.

Greg C Holland-Merten, Director HMH Consultants

Greg C Holland-Merten, Director HMH Consultants

Greg “Dutchy” Holland-Merten is Director at security specialists HMH Consultants, the only company that is able to combine physical security with cyber security in a dual-Atlantic manner. HMH offers web-based analyses aimed at identifying vulnerabilities within any website, as wells as infrastructure assessments to prevent hackers stealing customer data or corrupting your systems. HMH has a cyber intelligence license to find data breaches (business and personal) already for sale on the dark web. Learn more at https://hmhconsultants.com/

Related Posts

Jewelry Marketing Survival Guide

March 15, 2023
JCK Industry Fund announces over $250,000 allocated to 2021 grant recipients

JCK Industry Fund announces 2023 grant recipients

March 15, 2023
diamonds on plant

How to drive more sales and referrals through social media

March 15, 2023
545 fifth ave building

IGI moves to expanded New York offices and gem laboratory

March 15, 2023

Latest News

Columnists

Jewelry Marketing Survival Guide

March 15, 2023
On The Move

JCK Industry Fund announces 2023 grant recipients

March 15, 2023
Other News

How to drive more sales and referrals through social media

March 15, 2023

Other News

IGI moves to expanded New York offices and gem laboratory

The Story Behind the Stone: Out of the Blue

What’s Hot Now!: Latest Designer Trends 2023

Costar releases 2023 Bridal Book

Select Show adds Ritz Carlton in Tysons Corner, VA to Fall venue lineup

2023 Chicago Responsible Jewelry Conference to be held August 11-12

Southern Jewelry News

© 2022 Southern Jewelry News.

Additional Information

  • About
  • 2023 Jewelry Trade Shows & Events
  • Media Kit
  • Contact
  • Sitemap
  • Newsletter Signup

Get Social with Us

No Result
View All Result
  • Featured Articles
    • Featured
    • Featured Retailers
    • Retailer Roundtable
    • Supplier Spotlight
    • Sponsored Content
  • Latest News
    • What’s New
    • Industry Events
    • Tradeshow News
    • On The Move
    • Other News
    • Furry Friends
  • Podcast
  • Columnists
  • Classifieds
  • Subscriptions
    • Newsletter Signup
    • Print Subscription

© 2022 Southern Jewelry News.