{"id":19193,"date":"2022-05-31T06:40:03","date_gmt":"2022-05-31T14:40:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/31\/news-12926\/"},"modified":"2022-05-31T06:40:03","modified_gmt":"2022-05-31T14:40:03","slug":"news-12926","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/31\/news-12926\/","title":{"rendered":"Paying Ransomware? Should You Really Pay Ransom Settlements?"},"content":{"rendered":"<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12\">\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\"><\/div>\n<\/p><\/div>\n<div class=\"cmp cmp-text aem-GridColumn aem-GridColumn--default--12\">\n<p>Ransomware is one of the top threats facing organizations and individuals today. In fact, according to a recent survey, <a href=\"https:\/\/www.fortinet.com\/blog\/business-and-technology\/new-fortinet-ransomware-survey-shows-many-organizations-unprepared?utm_source=blog&amp;utm_campaign=ransomware-survey\">85% of organizations<\/a> are more worried about a ransomware attack than any other cyber threat. By simply clicking a link or downloading a malicious file, anyone can unwittingly initiate a ransomware attack. And while often someone may feel desperate and want to pay the ransom or a <a href=\"https:\/\/www.fortinet.com\/blog\/industry-trends\/qa-ransomware-settlements-and-cyber-insurance?utm_source=blog&amp;utm_medium=blog&amp;utm_campaign=settlement\">ransomware settlement<\/a> to re-gain access to critical data, it is a decision that should be considered very carefully.<\/p>\n<p>Just like as a child, when kids steal a bookbag and demand lunch money to get it back, cybercriminals are doing the same thing to organizations after successfully deploying ransomware and taking sensitive data hostage by encrypting it. Unfortunately, in many cases doing more than just ransom.<\/p>\n<p>Obviously, the stakes are higher for an organization that\u2019s attacked. An organization\u2019s survival may depend on getting the encryption key from the cybercriminals to decrypt and get back their stolen data. But the dilemmas seem surprisingly similar for both set of victims.<\/p>\n<h2>Should You Pay Ransomware Attackers?<\/h2>\n<p>The question of whether you should pay the ransom in either case comes with the fear that you won\u2019t get your bookbag back or the encryption key after paying. It is hard to put any faith in the goodwill of bullies or cybercriminals. Instead of returning \u00a0your stuff (information) you likely want to keep private, they could simply empty your \u201cbookbag\u201d and all its contents, including sensitive data, on internet for all to access and use.<\/p>\n<p>Or they could give your data to another bully or criminal to do what they will with it. In this instance, paying doesn\u2019t solve your problem, and makes you considerably poorer.\u00a0 In other words, paying ransomware could mean your organization has no \u201cbookbag\u201d and no \u201cmoney for lunch,\u201d and perhaps, worst of all, you now have a reputation as an easy mark and a \u201cpayer\u201d that can be easily and frequently bullied.<\/p>\n<h2>The Problems Paying Ransomware Creates<\/h2>\n<p>An organization doesn\u2019t want to have a reputation as a \u201cpayer\u201d in the cybercriminal underworld, because that could be the equivalent of painting a target on the company\u2019s back.<\/p>\n<p>While I appreciate that some organizations may have no option but to pay ransomware attackers, I recommend not doing so unless you absolutely must take the risk because if you don\u2019t your business is guaranteed to fail. In addition to becoming a repeat victim, paying ransomware emboldens the bad guys and funds more of their future attacks on you and others.<\/p>\n<h2>Is Paying Ransomware Illegal?<br \/> <\/h2>\n<p>Victims of ransomware attacks who feel compelled to pay cybercriminals often wonder if it is illegal to do so. There is no law against paying ransom when an organization\u2019s data and\/or systems are taken hostage. However, it is strongly discouraged by U.S. government authorities and those of us in the cybersecurity industry to pay cyber ransoms or succumb to extortion demands.<\/p>\n<p>Victims of ransomware are warned against paying <a href=\"https:\/\/www.fortinet.com\/blog\/ciso-collective\/cybercriminals-seek-ransomware-payments-and-settlements?utm_source=blog&amp;utm_campaign=ransomware-settlements\">ransom settlements<\/a> by such organizations as CISA, NCSC, the\u00a0<a href=\"https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/ransomware\" title=\"https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/ransomware\" target=\"_blank\">FBI<\/a>,\u00a0and HHS. Payment does not guarantee files will be recovered. It may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and\/or fund illicit activities which could potentially be illegal according to a\u00a0<a href=\"https:\/\/home.treasury.gov\/system\/files\/126\/ofac_ransomware_advisory_10012020_1.pdf\" title=\"https:\/\/home.treasury.gov\/system\/files\/126\/ofac_ransomware_advisory_10012020_1.pdf\" target=\"_blank\">U.S. Department of Treasury\u2019s Office of Foreign Assets Control (OFAC)<\/a>\u00a0advisory.<\/p>\n<h2>Can Law Enforcement Help?<br \/> <\/h2>\n<p>Unfortunately, legal authorities\u00a0sometimes have massive workloads and\u00a0priorities\u00a0which means their resources may not be assigned in a manner that is needed for your organization. Mission goals may also not entirely align in all cases when enforcement might be\u00a0prioritizing an investigation and your organization may\u00a0prioritize a return to business processes and tasks. Regardless, law\u00a0enforcement can be a great asset, but they should be part of your organization\u2019s incident response plan not in lieu of one, which has been considered by your\u00a0executive leaders, IT and InfoSec staff, and legal among others.\u00a0<\/p>\n<p>Looking for help after an attack is a key problem and the definition of \u201creactive.\u201d You never to want to get to the point where you must pay the ransom. The way to avoid ransomware attacks is having a good defense.<\/p>\n<h2>How to Prevent Ransomware Attacks<\/h2>\n<p>The best practices for organizations and individuals to protect themselves from ransomware attacks is to incorporate <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/how-to-prevent-ransomware?utm_source=blog&amp;utm_campaign=ransomware-prevention\">these actions<\/a> into your cyber defense posture:<br \/> <b><\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/training.fortinet.com\/?utm_source=blog&amp;utm_campaign=nse-institute\">Take cybersecurity training<\/a> seriously and encourage employees to do so as well<\/li>\n<li>Avoid clicking on suspicious links, practice good cyber awareness<\/li>\n<li>Download only from trusted sources<\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/solutions\/small-business\/stop-ransomware-phishing?utm_source=blog&amp;utm_campaign=ransomware-phishing\">Scan emails for malware<\/a><\/li>\n<li>Employ firewalls and endpoint security products that are integrated with actionable threat intelligence<\/li>\n<li>Back up important data<\/li>\n<li><a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/vpn-wifi?utm_source=blog&amp;utm_campaign=vpn-wifi\">Use a VPN when on public Wi-Fi<\/a><\/li>\n<li>Have a incident response plan in place<\/li>\n<\/ul>\n<p><i>You can <\/i><a href=\"https:\/\/www.fortinet.com\/blog\/business-and-technology\/new-fortinet-ransomware-survey-shows-many-organizations-unprepared?utm_source=blog&amp;utm_campaign=ransomware-survey\"><i>read more<\/i><\/a><i> details about proactive strategies for protecting against ransomware online.<\/i><\/p>\n<h2>What to Do If You Are the Victim of a Ransomware Attack<\/h2>\n<p>Organizations can limit the ransomware\u2019s impact by taking quick action. The first you must take is to isolate the ransomware. This can prevent horizonal attacks, where the ransomware spreads from one device to another via network connections.<\/p>\n<p>To isolate the ransomware, you muct shut down the infected system. Then disconnect anything that links the infected machine to the network or other devices on the network. By &quot;pulling the plug&quot; on the system, you can stop the further spread of the ransomware.\u00a0This is when prior implementation of\u00a0<a href=\"https:\/\/www.fortinet.com\/blog\/industry-trends\/why-network-segmentation-matters?utm_source=blog&amp;utm_campaign=network-segmentation\">segmentation<\/a>\u00a0is really helpful to make this process a lot easier and effective.<\/p>\n<p>Next, you need to figure out what type of malware has infected your system with ransomware. It\u2019s typically not just a ransomware attack. Ransomware is usually the last part of a bigger attack. Understanding what kind of malware is involved can assist the security incident response team crafting a solution or, in some cases, use a decryption key that is already available for certain malware.<\/p>\n<h2>Data Recovery<\/h2>\n<p>To successfully recover data, your organization needs to have had a data recovery program set up prior to an attack. If backups are scheduled for several times a day, a ransomware\u00a0 attack might only cost your organization a few hours.<\/p>\n<p>Whether you use cloud services or on-premises hardware to make copies of your data, it doesn\u2019t matter. You just need to be able to access the backup files from an unaffected device.\u00a0<\/p>\n<p><i>Learn more about Fortinet\u2019s <a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?utm_source=blog&amp;utm_campaign=fortiguard-labs\">FortiGuard Labs<\/a> threat research and intelligence organization and the FortiGuard Security Subscriptions and Services <a href=\"https:\/\/www.fortinet.com\/fortiguard\/labs?tab=security-bundles&amp;utm_source=blog&amp;utm_campaign=security-bundles\">portfolio<\/a>.<\/i><\/p>\n<p><i>Read more on threat research and protection from the FortiGuard Labs team: &#8211; <a href=\"https:\/\/www.fortinet.com\/blog\/tags-search?tag=fortiguard-labs-perspectives\">FortiGuard Labs Perspectives<\/a><\/i><\/p>\n<\/p><\/div>\n<div class=\"raw-import aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"text-container\">\n<div id=\"om-b2dxtopzidsdt3fkzfsv-holder\"><\/div>\n<\/div><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.fortinet.com\/blog\/industry-trends\/paying-ransomware\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/fortinet\/blog\/threat-research<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is one of the top threats facing organizations and individuals today. While often organizations may feel compelled to pay ransom settlements, it is a decision that should be considered very carefully. Read more.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-19193","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19193"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19193\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19193"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}