Endpoint

10/31/2017
08:00 AM
50%
50%

Majority of Employees Hit with Ransomware Personally Make Payment

Office workers pay an average ransom of $1,400, according to a new report.

A whopping 59% of employees who have sustained a ransomware attack at work personally paid the extortion money, according to a report released today by Intermedia.

The 2017 Data Vulnerability Report Part 2, a survey of 1,000 office workers at small-to midsized businesses, also found 68% of business owners and executives personally paid ransom payments. The average ransom paid was approximately $1,400, the study notes.

Potential Payment Drivers

"I think employees pay it because it's fast," speculates Jonathan Levine, Intermedia's CTO. "While everyone is trying to figure out the company's policy on paying ransom, the people still need to get the work done."

He believes most employees do not back up their work, and adds it's not surprising a majority of the workers personally paid the ransom.

But Chris Hornick, president-elect of the Northern California Human Resources Association and CEO of HBSC Strategic Services, has a different view on why employees are willing to shell out hundreds of dollars of their own money.

If an employer learns that company equipment is used for non-work related activities, it could be a fireable offense, Hornick says.

For example, if an employee clicks on a bogus email attachment touting details for a free luxurious vacation to the Bahamas and it results in a ransomware attack, the employee may face termination.

"This could be why employees don't want to disclose it and pay the ransom themselves," Hornick says. "It's a double-edged sword because usually employees know their employer wants them to disclose ransomware attacks."

Workforce Ransomware Education

The survey also reports that 70% of respondents say their employer regularly communicates about cyberthreats, and that 69% are familiar with ransomware. However, given that the majority of office workers still pay the ransom themselves, Levine says it suggests companies have not yet taken the extra step to inform employees what to do if they are attacked by ransomware.

"A lot of the security education is around how not to get hit, versus what to do once you get hit," Levine says, adding, "People are bad when it comes to planning for low-probability events, even catastrophic ones."

Thirty-seven percent of survey respondents note their employers paid the ransom. The Intermedia report advises companies to inform workers about the possible dangers of dealing with ransomware attackers directly.

The report also advises creating an environment where employees realize there is no shame in becoming a ransomware victim, and that personally paying ransom should never be an option.

Related Content:

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.