The report, “State of Ransomware,” was sponsored by Malwarebytes and conducted by Osterman Research to explore ransomware attack frequency, how it works in an enterprise environment, ransom cost, infiltration points, impact, preparedness and more.
“Over the last four years, ransomware has evolved into one of the biggest cyber security threats in the wild, with instances of ransomware in exploit kits increasing 259 percent in the last five months alone,” said Nathan Scott, Senior Security Researcher at Malwarebytes and ransomware expert. “Until now, very few studies have examined the current prevalence and ramifications of actual ransomware incidents in the enterprise.”
Additional international findings include:
• Nature of attacks: 46 percent of all ransomware attacks originated from email.
• Cost of attacks: Nearly 60 percent of all ransomware attacks in the enterprise demanded over $1,000. Over 20 percent of attacks asked for more than $10,000, 1 percent even asked for over $150,000.
• Many are paying the ransom: Globally, more than 40 percent of victims paid the ransom demands.
• Significant time spent on remediation: More than 60 percent of attacks took more than 9 hours to remediate.
• Attacks frequent in certain industries: Healthcare and financial services were the leading industries attacked with ransomware globally, both of which were targeted well above the average ransomware penetration rate of 39 percent.
• Potential loss of life: Amazingly, 3.5 percent even said lives were at stake because of ransomware’s debilitating effects.
• Severe downtime: 63 percent spent more than an entire business day trying to fix endpoints.
• Switch from protection to disaster planning: The most popular way of addressing the problem is not through protection, but by backing up data (over 71 percent).
In the United States alone, nearly 80 percent of companies have suffered a cyber attack in the last year and more than half experienced a ransomware incident. Seventy percent of attacks impacted mid-level managers or higher, while 96 percent of U.S. organizations aren’t very confident in their ability to stop ransomware.
Key U.S. findings include:
• Security attacks with ransomware are increasing: Nearly 80 percent of U.S. companies have suffered a cyber attack in the last year and more than half experienced a ransomware incident. US organizations are the most attacked among the countries surveyed.
• Ransomware attacks target healthcare and financial services: Healthcare and financial services were the leading industries attacked with ransomware globally, both targeted well above the average ransomware penetration rate of 39 percent.
• Email is the top vector for spreading ransomware: More than half of the U.S. attacks originated with email. Germany (61 percent) and the United States (59 percent) both see the highest level of ingress for ransomware through email, either through email attachments or malicious links in email messages. Email is much less common in the United Kingdom as an entry point for ransomware (39 percent) and in Canada (30 percent).
• Upper management and C-Level executives are at a higher risk: 68.4 percent of U.S. respondents noted ransomware attacks impacted mid level managers or higher. 25 percent of incidents attacking senior executives and the C-Suite.
• Cybercriminals held high-value data for ransom: Nearly 80 percent of the U.S. organizations breached had high-value data held for ransom.
• Attacks are impacting more than initial endpoints: More than 40 percent of ransomware attacks in all four countries were successful in impacting more than a single endpoint, with nearly 10 percent of the attacks affecting more than one-quarter of the endpoints in the business.
• Security organizations are not confident in their defenses: Decision makers in U.S. organizations have a relatively low level of confidence in their ability to effectively stop ransomware and are less confident about ransomware prevention than their counterparts in Canada, Germany and the United Kingdom. 96 percent of U.S. organizations aren’t very confident in their ability to stop ransomware.
• Current enterprise security measures are weak against ransomware: Almost half of ransomware incidents in the U.S. occurred on a corporate desktop within the enterprise security environment.
• Ransomware remediation takes hours: 44 percent of attacks on U.S. companies forced IT staff to work more than nine hours to remediate the incident. Globally, the figure is 63 percent of incidents that took more than nine hours to remediate.