"Unfortunately, this approach is highly effective in infecting organizations with ransomware"
Research from the Neustar International Security Council (NISC) found that 60% of businesses would consider paying in the event of an attack, with one in five potentially willing to spend more than 20% or more of their annual revenue.
Ultimately, this is about ensuring an organization has a strong overall cyber resilience framework. The first step to achieving this is by assessing the current risk, then identifying all online assets and where they reside. Additionally, organizations should consider exactly what needs protecting to ensure business continuity.
Organizations should then be able to gauge the strength and extent of the security solution they need. Then they can form and implement mitigation strategies, including what to do in the event the system goes down, what is backed with redundancies and what the escalation protocols are, among other preventative systems in place. Of course, what is essential to all of this is having a security partner with anti-DDoS capabilities.
The study also showed that large numbers of RDDoS and ransomware victims are being targeted multiple times. How does this finding inform the debate surrounding whether it is ever right to pay a ransom?
While it is understandable why organizations decide to pay in order to regain business operations, it’s not the answer. Paying makes a company more likely to be targeted again. Instead, companies should think of cybercrime as a business — by paying up, a business is making itself a viable target, with ‘success rate’ chances historically higher than those that haven’t paid. This means it makes business sense for the criminals to target that company again, which could have catastrophic consequences.
What advice do you have for organizations who find themselves on the receiving end of an extortion letter from RDDoS attackers?
Do not pay. Letters typically come with a timeline, so companies should work with their DDoS security provider to best prepare for any attacks. Additionally, companies should ensure they’ve got an open communication established with their DDoS security provider, especially on day zero. If companies can, they should provide systems access or monitoring too to the provider. Finally, making sure an organization’s disaster recovery platforms are up to date and ready to go can prevent RDDoS from impacting business continuity.
Do you think the wider industry and governments can do more to help organizations when they do fall victim to ransomware?
There’s an education piece in this. When faced with an RDDoS, many companies panic and become willing to fork out potentially millions in ransom yet don’t invest relatively minimal sums in defense software and services. As an industry, we need to make it easier for CISOs and security managers to argue for robust cyber resilience investment by businesses in the context of attack likelihood and expense.