Americas

Asia

Oceania

Evan Schuman
Contributor

Will the public nature of ransom payments change CISO strategy over whether to pay?

News Analysis
01 Aug 20244 mins
CSO and CISORansomwareSecurity

Reports identifying a $75 million ransom payment made in March by a Fortune 50 company raise some questions.

man reacting to ransomware attack
Credit: Shutterstock

Reports that a Fortune 50 company paid a $75 million ransom to the Dark Angels ransomware group back in March is raising questions about whether CISOs should revisit their ransomware decision processes.

The payment, which Zscaler said is almost double the previous top ransom paid, is concerning, not solely for the large dollar amount, but in how public these payments have become. There are many ways these payments can become public — Zscaler confirmed that they know specifically who made the payment — especially if they are processed via Bitcoin, which is ransomware groups’ favorite payment mechanism.

If a ransom is paid via Bitcoin, “there’s a good chance that it will get out,” said Brett Stone-Gross, the senior director for threat intelligence at Zscaler. “There are a large number of ways to potentially identify these companies.”

Stone-Gross said the company was identified as making this transaction not solely from the public ledger, but also via other sources that he did not want to disclose. 

There are many other mechanisms for paying ransoms, but Bitcoin is the favorite among the ransomware groups. Other cybercurrencies, such as Monero, are better at keeping identities secret, but they are “kind of a second choice for these ransomware groups,” Stone-Gross said.

Although the identities can absolutely be revealed, as happened with this Fortune 50 company, today’s crypto payments can be exceedingly difficult to track. There are often multiple middle players and payments are frequently split into many payments of smaller amounts. That said, companies will often reuse Bitcoin wallet addresses, which gives investigators something to track.

Does this change payment decisions?

All this might start to change the nature of discussions about whether it makes sense to make the payment. Does this public a payment make the paying enterprise a target for every other ransomware group on the planet? Will it pressure companies and their extortionists to move away from public ledgers and find a more secretive means of paying?

“Paying the ransom, especially one of this size, may have the unintended consequence of emboldening cybercriminals to ramp up their activities, now knowing that large-scale payoffs can be attained,” said Jacob Kalvo, CEO at Live Proxies, an IP firm. “This could translate to greater frequency and more complex attacks, since the ransomware groups take an instance of successful extortion as vindication of their actions. It basically boils down to the immediate alleviation from recovery of the data versus the prospect of future vulnerabilities and attacks for organizations.”

Brian Levine, a managing director at Ernst & Young overseeing cybersecurity strategies, agreed, saying that enterprises need to seriously consider their options when it comes to paying ransom today.

“If an organization pays a ransom, it should assume that the fact of the payment and payment amount will eventually become public. And ‘eventually’ may come a lot sooner than they think,” Levine said. “The increase in the size of ransomware payments will hopefully incentivize organizations to take greater efforts to avoid having to make such payments.”

He added that he did not “think the possibility of the payment becoming public materially changes the calculation of whether to or not to pay. For the most part, I think organizations are only paying ransom when they feel they have little other choice.”

A Zscaler report on ransomware also noted some other patterns. 

“The manufacturing, healthcare, and technology sectors were the top targets of ransomware attacks, while the energy sector experienced a 500% year-over-year spike as critical infrastructure and susceptibility to operational disruptions make it particularly attractive to cybercriminals,” the report said. “The energy sector experienced a 527.27% year-over-year increase in ransomware attacks, likely due to its critical nature and the high ransom potential it offers to attackers.”

The report listed the most prolific ransomware groups today, with the largest being LockBit (988 identified attacks), BlackCat (410), 8Base (352), Play (345), Clop (291), BianLian (268), Akira (224), Black Basta (202), Medusa (169), and NoEscape (126). 

It also noted what it described as the “newest ransomware groups on the scene”: Cloak, RansomHub, and Slug, which all surfaced this year. 

Evan Schuman

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at http://www.linkedin.com/in/schumanevan/. Look for his blog twice a week.

The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

More from this author