Downtime from Ransomware More Lethal to Small Businesses Than the Ransom
New survey of small-to midsized businesses (SMBs) shows half of SMBs infected with malware suffer 25 hours or more of business disruption.
Of more than half of all small-to midsized businesses (SMBs) infected with ransomware in the past year, attackers demanded ransom of $1,000 or less – a drop in the bucket in comparison to the downtime these attacks cause, a new report shows.
The survey of more than 1,000 SMBs in the US, UK, France, Germany, Australia, and Singapore, found that while 65% have not been hit with a ransomware attack in the past 12 months, nearly 30% have suffered one to five such incidents; 5%, six to 10 ransomware incidents; and 1%, 11- to 20-plus such incidents.
Ransomware indeed is becoming the darling of attackers, with 70% of malware distributed in June of the ransomware type, according to Malwarebytes’ data from a report earlier this month. And with two major ransomware attacks this year, WannaCry and Petya, spreading around the globe rapidly via worm-type exploits, SMBs appear to consider malware a clear and present danger.
Around seven in 10 SMBs are either “concerned” or “extremely concerned” about ransomware, the Malwarebytes SMB report shows.
“Ransomware wasn’t necessarily the most expensive aspect of a ransomware attack: downtime, revenue loss, and fallout were more expensive and far more damaging, especially when you’re talking about small businesses,” says Adam Kujawa, head of malware intelligence at Malwarebytes. He says it’s easier for larger organizations to recover from a ransomware attack because they have more resources to do so than an SMB does.
In some 22% of organizations, ransomware attacks halted business immediately, while 37% say their users, customers, and vendors were affected by the attack, and 15% say they lost revenue due to the attack.
Downtime-wise, 27% were down for one- to eight hours; 23%, nine- to 16 hours; 24%, 17- 24 hours; and 15%, 25- to 100 hours.
Nearly 30% of SMBs don’t know the origin of their ransomware infection. “Most do not know where the ransomware comes from. It just shows up one day on their endpoints, and then they say ‘oh crap, what do I do.'”
Higher ransom rates were less common for SMBs. More than 10% were above $10,000, and around 3% were higher than $50,000.
Most SMBs don’t believe ransomware victims should pay up, and just 28% say they paid the ransom. Even so, 32% of those that didn’t pay ransomware attackers ended up losing their files for good.
The debate over whether or not to pay ransomware attackers has caused confusion and angst among the business world. While most security experts say victims should not to comply with the data kidnappers’ monetary demands, others say there are times that it’s best to pay up.
“You can avoid it if you have backups or some method of getting your files back,” Kujawa says. “If the data’s not important to you, you do not need to pay. There’s a 50% chance you’re going to get it back, anyway.”
But if the loss of the locked-down files is costly, paying up may be the best bet. “If there’s a legitimate or steep fine for not having those files, paying ransom may be an option,” he says.
That doesn’t necessarily mean paying the full amount the attackers demand. “Try the best way to communicate them and try to negotiate the price … for a few files, for example,” he says. “They’re still happy to get some money.”
Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio