Data Recovery: Paying Extortionists to Protect Customers Is Not Illegal, But It May Be Risky
- Date:June 24, 2019
- Author(s):
- Sean Sposito
- Report Details: 4 pages, 2 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
The popular conversation around ransomware has shifted from detection to remediation. Hospitals, municipalities, and other victims frequently end up paying their extortionists through third parties promising data recovery services. A recent spate of media reports discuss the convenience and dilemmas of giving in to extortion:
- In May, Propublica, a nonprofit news organization dedicated to investigative journalism, reported that vendors who promise ransomware solutions mostly end up negotiating with their clients’ extortionists.1
- Earlier in the month, CBS’ “60 Minutes” described “why,” in the case of ransomware, “the best solution is often paying a ransom.”2
- And a Boston Globe Q&A with the author of the Propublica report, in part, put the city of Baltimore’s decision not to pay its extortionists demands for 13 bitcoins – roughly $104,000 – into context.3
But what about broader data recovery practices? All of this media coverage has no doubt created internal business questions about both the ethics of paying for decryption keys and the practice of paying cybercriminals in general. These are questions that security executives should be prepared to answer in the elevator, over email, and in meetings.
Book a Meeting with the Author
Related content
Data Transparency in the Age of Cyber and Privacy Risk
As open banking and new privacy regulations accelerate, financial institutions face rising pressure to enhance privacy and cybersecurity transparency to strengthen consumer trust. ...
Quishing and the Resurgence of BYOD Cyber-Attack Exposure
North Korean attackers’ latest efforts to target foreign policy experts through a technique known as quishing expose long-standing bring-your-own-device vulnerabilities that U.S. o...
SMS Blasters: An Expanding Frontier in Smishing Attacks
Cybercriminals use SMS/text blasters in smishing attacks, sending a wide range of fraudulent messages. By mimicking legitimate cell towers, SMS/text blasters bypass carrier-level p...
Make informed decisions in a digital financial world