Ransomware is a critical risk for companies across all industries, with the frequency, sophistication and business impacts of attacks increasing significantly over recent years.
Ransomware cannot be underestimated for its ability to inflict significant business interruption and financial and reputational damage on a targeted company. As the methods used continue to evolve in scope and complexity, strategies used to combat ransomware need to also advance at pace.
The nature of ransomware is changing
The increase in ransomware attacks is exponential. In 2023 attacks were up 214 percent on a year-on-year basis in Q4 and 1281 percent when indexed against ransomware frequency before the pandemic (Q1 2019).[1] Ransomware attacks in Asia Pacific were up 200 percent on the prior year.[2]
Neither the public sector nor private organisations — regardless of size or industry — are immune, and many organisations only have basic levels of cyber hygiene and defence. It is encouraging to observe many companies across Asia Pacific report that core controls responsible for managing ransomware attacks — e.g. access management, business resilience and endpoint systems — have improved markedly from ‘basic’ to ‘managed’ levels in recent years.[3] However staying out of the attack path will continue to present new challenges as criminals are increasingly sharing hacking tools and selling malware between groups. Proactive defence has become urgent.
Extortion on the rise
The emergence of double and multi-extortion tactics highlights that secure back-ups cannot be solely relied upon to deal with ransomware demands. Increasingly attackers focus on targets not only because they can easily exploit known vulnerabilities to demand ransom payments, but because they have calculated the potential for a more substantial payday through the threat of a data leak.
Ransomware payments in 2023 varied dramatically in average size between USD $275-$1.946bn depending on the threat actor and campaign[4]
Even when back-ups have not been compromised, attackers can still apply pressure on the victim to pay the ransom by selectively publishing sensitive data as extortion leverage. Complying with the ransom payment demand to gain access to decryption keys is no guarantee against subsequent data leaks, and there are cases of payments being made and criminals later monetising exfiltrated data by auctioning it on the dark web.
Ransomware isn’t simply a ‘pay’ versus ‘don’t pay’ calculation
As the frequency of ransomware attacks increases, business leaders must consider the broader implications of these events beyond the operational impact of encrypted technology systems. As the objectives of bad actors widen to include double extortion and targeting of impacted data subjects to maximise negotiating leverage, decisions on how best to address the implications of an attack become increasingly more complex for executives.
“The response to ransomware has become increasingly more complex,” said Adam Peckman, Head of Cyber Solutions, Asia Pacific at Aon. “Bad actors continue to target sensitive data and leverage online platforms to amplify reputational harm on the targeted business and data subjects — at times through direct harassment of employees, customers, or executives. Risk leadership needs to balance a range of decision-making criteria to navigate through this complexity — the operational and legal challenges of making a payment, the financial and operational impacts of not making a payment, and the duty of care to data subjects (employees, customers) that includes considerations of their mental, and at times physical, wellbeing. Alongside these there are also a range of legal consequences and fiduciary responsibilities to shareholders.”
Recent high-profile attacks in Australia and Asia are emblematic of the myriad of issues that arise following these events, from impacted financial performance, increased regulatory scrutiny, eroded shareholder value, and exposed corporate officers.[5]
Assessing ransomware risks
As an ever-expanding threat, a cyclical approach to assessment will enhance an organisation’s view of mission critical assets, but also allow weaknesses to be easily identified.
This provides the blueprint to make better decisions, whether for vulnerability prioritisation, patching frequency, or new technology investment to achieve risk reduction goals. Alignment with corporate risk registers along with executive-level understanding of the strategic security investment program will enhance governance protocols associated with ongoing improvement and business resilience. Insurance coverage must be a natural complement to this strategy.
Continue Reading