{"id":162862,"date":"2022-06-07T08:00:04","date_gmt":"2022-06-07T15:00:04","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=162862"},"modified":"2022-06-10T08:48:43","modified_gmt":"2022-06-10T15:48:43","slug":"average-ransomware-payment-update","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/06\/average-ransomware-payment-update\/","title":{"rendered":"Average Ransom Payment Up 71% This Year, Approaches $1 Million"},"content":{"rendered":"<p>As thousands of cybersecurity practitioners gather in San Francisco for the annual RSA Conference, we thought it would be a good time to take a quick look at ransomware activity that we\u2019ve seen so far in 2022.<\/p>\n<p>The numbers are startling: The average ransomware payment in cases worked by Unit 42 incident responders rose to $925,162 during the first five months of 2022, approaching the unprecedented $1 million mark as they rose 71% <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2022\/03\/ransomware-trends-demands-dark-web-leak-sites\/\">from last year<\/a>. That\u2019s before additional costs incurred by victims including remediation expenses, downtime, reputational harm and other damages.<\/p>\n<p>Those costs are staggering when you consider the trajectory of their growth. The average ransom payment in cases worked by our consultants in 2020 was about $300,000. It\u2019s hard to believe that the majority of transactions seen by our incident responders were $500 or less in 2016.<\/p>\n<p>Details of about seven new victims on average are posted each day on the dark web leak sites that ransomware gangs use to coerce victims into paying ransoms. Called \u201cdouble extortion,\u201d the technique increases pressure on victims by adding a layer of public humiliation to the difficulty of losing access to files \u2013 identifying victims and sharing purported snippets of sensitive data stolen from their networks. The rate of double extortion we\u2019ve observed translates into one new victim every three to four hours, according to Unit 42\u2019s ongoing analysis of leak site data.<\/p>\n<p>The cyber extortion crisis continues because cybercriminals have been relentless in their introduction of increasingly sophisticated attack tools, extortion techniques and marketing campaigns that have fueled this unprecedented, global digital crime spree. Their ransomware-as-a-service (RaaS) business model has at the same time lowered the technical bar for entry by making these powerful tools accessible to wannabe cyber extortionists with easy-to-use interfaces and online support.<\/p>\n<p>The results can be devastating: Costa Rica\u2019s government has suffered multiple ransomware attacks this year, including one in May that <a href=\"https:\/\/apnews.com\/article\/russia-ukraine-covid-politics-technology-health-0e24e6644b09e2737af96814635fcd22\" rel=\"nofollow,noopener\" >disrupted delivery of healthcare services<\/a>. The 157-year-old <a href=\"https:\/\/lincolncollege.edu\/home\" rel=\"nofollow,noopener\" >Lincoln College shut down last month<\/a> after a ransomware attack cut access to all university data, disrupting admissions for Fall 2022 \u2013 a cruel blow to an institution already seeking to recover from the pandemic.<\/p>\n<p>This year\u2019s growth in payments was pushed up by two multi-million-dollar ransoms \u2013 one to a rising group, Quantum Locker, and one to LockBit 2.0, which has been this year\u2019s most active ransomware gang on double-extortion leak sites to date. Unfortunately, we have no reason to believe that extortion groups will stop seeking multi-million dollar payments \u2013 particularly in cases where organizations could be put out of business if they don\u2019t pay up.<\/p>\n<p>To read more insights on ransomware and learn how to protect against it \u2013 gathered from our firsthand knowledge of incident response cases as well as our ongoing monitoring of dark web leak sites \u2013 download the <a href=\"https:\/\/start.paloaltonetworks.com\/unit-42-ransomware-threat-report.html\">2022 Unit 42 Ransomware Threat Report<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The average ransom payment in cases worked by Unit 42 incident responders rose to $925,162 during the first five months of 2022.<\/p>\n","protected":false},"author":65,"featured_media":163012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6769],"tags":[221,7528,1807],"coauthors":[704],"class_list":["post-162862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-public-sector","tag-ransomware","tag-ransomware-threat-report","tag-rsac","sec_ops_category-must-read-articles"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/Light-of-the-Monitor.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=162862"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162862\/revisions"}],"predecessor-version":[{"id":163025,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162862\/revisions\/163025"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/163012"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=162862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=162862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=162862"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=162862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}