In the underground cybercrime circles of the Dark Web, ransomware attacks are a particularly lucrative enterprise. These attacks are on the rise. And they’re disrupting the stalwart IT industry.
The average cost of a ransom attack in 2023 was $1.54 million, almost double the previous year’s average. And research we gathered for The CISO Report show that 83% of organizations hit by a ransomware attack paid their attackers. Curious which industry is most likely to pay the ransom? Retail.
Arguably more concerning is this trend: instead of simply locking users out of the data, more ransomware attacks aim to extort your data, holding it ransom until you pay up. In 2023, over 33 million data records were extorted via ransomware and phishing attacks — that’s a data extortion incident every 11 seconds.
So, with that grim background, let’s look at the state of ransomware today.
Ransomware is the catch-all term for malicious software (malware) that prevents legit users from accessing a particular asset or dataset.
Typically, ransomware works like this: a threat actor breaks into a system, encrypts the target asset, and demands financial compensation in exchange for decryption keys.
The asset that’s being held ransom is where the power lies. That is, the more powerful or valuable an asset is, the more leverage the threat actor can have. For example, servers compromised by ransomware can cripple entire business operations.
Indeed, it’s this impact that causes businesses to adopt ransomware risk mitigation strategies as part of business continuity planning. These strategies include backups and redundancy: if a server is compromised in a ransomware attack, it is simply shut down and the application container may run on another machine.
(Understand the most common types of ransomware.)
A key step in ransomware execution is the payload delivery and execution. This is achieved by cleverly manipulating unsuspecting users, convincing them to:
Typically, payload execution is developed in such a manner that it installs and executes in the background, without getting noticed by the user or raising security alarms. Such a payload need not be sophisticated to be successful: ransomware can be simple, employing basic encryption algorithms — yet still inflicting severe damages and impact on the victims.
More than half of respondents in The CISO Report paid ransoms of $100,000 or more. Some organizations paid more than $1 million.
Today, the Dark Web is home to both a cybercriminal gig economy and a connected ecosystem, where malicious actors offer their botnets and data exfiltration services. Instead of writing sophisticated ransomware attacks that involve complex encryption algorithms, cybercriminals may:
Any variety of data exfiltration mechanism may be employed to access and leak sensitive information on compromised servers. In a typical ransomware attack, the data is not leaked to external servers — it’s encrypted only at the target server. Instead of paying ransomware to decrypt the compromised files Victims can minimize the damages in this scenario by restoring backups.
(How fast can ransomware encrypt data? Under a minute.)
Over the last few years, a new trend is taking ransomware out of the domain of specialized threat actors. Ransomware as a Service (RaaS) treats ransomware attacks as a service that anyone can purchase.
Effectively, ransomware as a service enables any “customer”, to launch a social engineering attack on target victims, compounding what used to be an inherent limitation in ransomware.
(Meet the family: get to know the most common ransomware families.)
The case of extortionware is different.
Extortionware refers to any attack where a target data asset is exfiltrated and threatened to be released publicly, unless the ransom is paid.
Formerly, ransomware attacks would prevent you, the victim, from accessing your data. Extortionware goes further — now the threat is not that you cannot access your data, it’s that anyone could access your data. In a business context, the risk is that your sensitive trade secrets and intellectual property assets will be disclosed publicly.
Examine the three defining attributes of extortion in a ransomware attack. A typical ransomware scenario has three defining characteristics:
Now, consider extortionware: not only is your data compromised — it is also controlled by the attacker, who leaks it to an external server and threatens to disclose it publicly. This contrasts with traditional ransomware, where the attacker lacks the ability to modify, control, or release information publicly.
The other two characteristics remain consistent in an extortionware attack, with the added nuance that users cannot attempt to revert the data leakage to external servers.
Another crucial difference is that of risk exposure. The risk exposure of an extortionware attack is significantly higher than mere ransomware attacks. Depending on the sensitivity of the compromised data, your options for mitigation may be limited: Unlike in traditional ransomware attacks, where access is merely blocked, extortionware perpetrators threaten to publicly expose already compromised and leaked sensitive business information on third-party servers.
(Know the differences: risk appetite vs. risk tolerance.)
To invalidate such threats, ensure that preemptive security measures are in place:
Curious about more cybersecurity practices? Splunk offers the only unified security and observability data platform — powering security, DevOps, and data use cases across the enterprise. Learn more about what Splunk can help you do.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.