Data Recovery: Paying Extortionists to Protect Customers Is Not Illegal, But It May Be Risky
- Date:June 24, 2019
- Author(s):
- Sean Sposito
- Report Details: 4 pages, 2 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
The popular conversation around ransomware has shifted from detection to remediation. Hospitals, municipalities, and other victims frequently end up paying their extortionists through third parties promising data recovery services. A recent spate of media reports discuss the convenience and dilemmas of giving in to extortion:
- In May, Propublica, a nonprofit news organization dedicated to investigative journalism, reported that vendors who promise ransomware solutions mostly end up negotiating with their clients’ extortionists.1
- Earlier in the month, CBS’ “60 Minutes” described “why,” in the case of ransomware, “the best solution is often paying a ransom.”2
- And a Boston Globe Q&A with the author of the Propublica report, in part, put the city of Baltimore’s decision not to pay its extortionists demands for 13 bitcoins – roughly $104,000 – into context.3
But what about broader data recovery practices? All of this media coverage has no doubt created internal business questions about both the ethics of paying for decryption keys and the practice of paying cybercriminals in general. These are questions that security executives should be prepared to answer in the elevator, over email, and in meetings.
Book a Meeting with the Author
Related content
2025 Dark Web Threat Intelligence Vendor Scorecard
Javelin’s newest cybersecurity scorecard, the 2025 Dark Web Threat Intelligence Vendor Scorecard, evaluates leading dark web threat intelligence vendors on the market today. This i...
2026 Cybersecurity Trends
In the year ahead, financial services will face several trending challenges as they try to keep organizations and customers safe. Zero trust will come to the forefront of supply ch...
Social Signals, Malicious Motives: Emojis as a Cyber Weapon
Cybercriminals leverage emojis to evade defenses and use them in phishing and spoofing attacks to deceive victims and steal sensitive information. Emojis are also used to control c...
Make informed decisions in a digital financial world