A Brief Guide To Navigating Ransomware Extortion 

In the current cybersecurity landscape, identities have become the primary target for cybercriminals. Once a threat actor gains control of privileged accounts, they can easily proliferate through an IT network and move laterally to compromise critical assets, especially in organizations which don’t practice network segmentation or lack sufficient detection and monitoring controls. 

In my experience from handling hundreds of incident response cases for scores of organizations across multiple sectors, attacks often commence around 5 p.m. on a Friday when IT teams and other staff are winding down for the weekend.  

Threat actors are strategic, and they do their research thoroughly, in some cases often spending weeks gathering intelligence on a company’s systems before launching a double-extortion campaign. This kind of cyber-attack typically begins with data exfiltration, followed by an encryption event, leading to the unfortunate discovery of a ransom note by the IT team – often the worst and most stressful day in their career. This scenario, which has affected far too many businesses already this year, is a major concern for Chief Information Security Officers (CISOs) and security teams. 

Upon discovering a ransom note, businesses face the critical decision of whether to remain silent or engage with the threat actors. This decision is inherently a business one. Most companies lack experience in handling cybersecurity breaches, which are high-stakes, high-pressure situations requiring professional management.  

Regardless of pre-existing policies, they often get dropped once the full scope of the incident is revealed. 

One common misconception in the current climate where stories of so many cyber-attacks are published by the media is that engaging with cybercriminals always leads to a settlement, with Bitcoin being their preferred currency of payment. However, the truth is that from our frontline exposure only 30% of such engagements over the past year have resulted in a payout.

Engaging with the threat actors can offer several benefits, such as gaining some control over the situation and buying time. 

The decision to pay a ransom depends on several factors: 

  • The perceived value of the data.
  • Whether the data has been encrypted.
  • Availability of data backups.
  • Business interruption costs.
  • Legal implications, including sanctions.
  • National security concerns.
  • The reputation of the threat actor. 

Threat actors often reduce their demands during negotiations, sometimes hoping for a quicker resolution. They might also check if the victim organization has cyber insurance. And they might threaten to publicize the incident to increase the pressure to pay the ransom. 

This is why understanding the threat actor’s identity, history, tactics, and behavior patterns is crucial when dealing with a ransomware attack.

This includes their likelihood of leaking data post-payment and their communication and decision-making speed. If the negotiating team has previously encountered these cybercriminals, this knowledge can be leveraged to benefit the victim organization. 

My advice to organizations facing ransom negotiations is to: 

  • Evaluate, justify, and document decision-making processes.
  • Gather actionable intelligence for informed decisions. 
  • Manage both internal and external expectations. 
  • Understand regulatory obligations. 

And always ask the question, “Is a financial settlement necessary?” 

Ransomware is here to stay, so it's vital for companies to prepare by developing robust incident response plans and playbooks, including for ransomware scenarios. Conduct exercises with the board to test critical decision-making. As cybercriminals primarily seek financial gain from stealing data, understand your IT environment and know your data, and where it resides and who has access to it. Knowing the impact of data theft and its potential publication is critical. It will pay to be proactive: prepare and plan for the worst-case scenario. 

However, if the worst does happen, try to remain calm and avoid the internal blame game. Take a deep breath and contact your cyber security partner.

While this ransom attack is likely to be the first for your organization, a qualified and experienced cyber security team will have the specialist skills and tons of experience to pull you back to business as normal as safely and as quickly as possible.     
 
Dan Saunders is the Director of Incident Response, EMEA for Kivu Consulting, part of Quorum Cyber

Image: Ideogram

You Might Also Read:

Ransom: Prepare For The Worst:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« What Businesses Should Be Doing Instead Of Buying More Tech
Gen Z’s Cybersecurity Complacency Raises Alarm »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Social-Engineer

Social-Engineer

Social-Engineer is a team of outside–the–box thinkers that share a common focus on human-to-human social engineering.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Mastercard

Mastercard

MasterCard is a leading global payments solutions company that serves consumers and businesses in over 210 countries and territories worldwide.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Roke

Roke

Roke is a leading UK innovator in science and engineering. For over 60 years we’ve been improving the world through innovation by combining the physical and digital in new ways.

Rewertz

Rewertz

Rewterz is a cyber security company based out of Dubai, serving customers in UAE, Oman, Qatar, Bahrain, Saudi Arabia, and Pakistan.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

Dracoon

Dracoon

DRACOON is market leader in the German-speaking region for secure enterprise file sharing.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

Q-Net Security

Q-Net Security

Protect your critical networks. Q-Net Security make hardware that provides the strongest drop-in security for your existing critical infrastructure.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

rSolutions

rSolutions

rSolutions delivers managed cybersecurity services to clients in many industry sectors including financial services, telecommunications, energy, government and retail.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.