Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Attackers help victims pay their ransoms, even offer tips to prevent future attack

By Etay Maor
ransomware-attack-freepik
August 23, 2021

As ransomware is increasingly profitable, it is the obvious choice for many gangs. With the potential to wreak havoc on any organization, the average cost of a ransomware scam soared from $761,106 in 2020 to $1.85 million this year, per the Sophos State of Ransomware 2021 report. Beyond the ransom, victims must shoulder the heavy burden of business interruption, insurance policy consequences, mitigation, potential regulatory fines, third-party crossover harm and reputational damage. 

Attacks are increasingly sophisticated, often involve multiple criminal gangs, and leave many organizations feeling like they have little choice but to pay up. As many as 56% of victims pay the ransom; whether they pay or not, only 29% of victims are able to restore all of their encrypted files; some sources peg that figure at eight percent.

Every organization must prepare for this threat. The question is how best to do it. As an added measure, we can turn to an unlikely source for advice on avoiding a ransomware attack – the criminals themselves. 

 

Ransomware-as-a-Service

While ransomware has been with us for 30 years, the scale, tools and ecosystem have evolved. Ransomware as a service is a popular model. Cybercriminals will infect thousands of devices with malware and offer other criminals the chance to load whatever they want onto systems for a fee. Help Desks are set up to support anyone who licenses these ransomware services, which means attackers don’t need any special technical skills. That technical support even extends to victims for guidance on paying ransoms.

 

Negotiating with Cybercriminals and the “Double Attack”

Most help desks, or support forums, are publicly accessible and reveal the full extent of ransomware negotiations. They are a vital source of information because victims often avoid disclosing their ransomware plight. We now know that victims frequently suffer a double ransomware attack. They may negotiate and pay a ransom to get a decryption key to liberate their files, only to be extorted for another fee under the threat their confidential data will be publicly dumped for all to see. Any cybersecurity insurance policy they hold, which may cover the decryption ransom, will not cover a second payment to prevent data exposure.

It gets worse. Organizations that choose to pay may be penalized for sending funds to cybercriminal groups and state-sponsored hacktivists from economically sanctioned countries blacklisted by U.S. authorities. The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) clarifies this ransomware payment advisory. Large fines on top of two ransom payments, before you factor in the cost of improving your defenses, not only delay mitigation but could disrupt organizational integrity for years. 

Many victims are driven out of business entirely. Consider also that 80% of companies that paid a ransom were attacked again. Most suspected that the same criminal gang was behind the second attack, but attackers could also share or sell intelligence on soft targets.

 

Devising an Incident Response Plan 

Clarity about what needs to be done will defuse panic and minimize disruption. There’s lots of good advice online, and the Cybersecurity & Infrastructure Security Agency is a great place to start. As FBI Supervisory Special Agent Doug Domin, a 20-year veteran of the Boston Criminal Computer Intrusion Squad, told me in a recent webinar, every ransomware plan should include information for contacting the FBI, whether it’s your local field office, CyWatch, or the Internet Crime Complaint Center. 

While the FBI’s support and advice could prove invaluable for mitigation efforts, you’ll want to consider recommendations from actual criminals. 

 

Real-life Tips from Ransomware Extortionists

Attackers use support sites to communicate with targets, even hand-holding victims on converting fiat money and transferring it into crypto. Ransomware negotiators from incident response teams use these platforms to negotiate terms and lower settlements. 

Reuters reported a Ragnar Locker ransomware attack on CWT, a $1.5 billion travel management company that counts one-third of the S&P 500 on its client list. Attackers encrypted two terabytes worth of financial and employee data from 30,000 computers, demanding $10 million.

Screen captures from the CWT-Ragnar session give the best evidence for what the extortionists themselves consider best practices to avoid a repeat attack.

As expected, general protocols that govern password etiquette were offered, such as multi-factor authentication, use of at least eight characters, monthly password updates, avoiding the use of personal information (e.g., mother’s maiden name) and comparing new passwords against published compromised ones. 

What follows (verbatim) are eight security tips the Ragnar group directly suggested to the CWT negotiator: 

  • “Write in a ‘real’ programming language.”
  • “Watch for misconfigured firewalls and secure vulnerable ports.”
  • “Approve to run only necessary applications ONLY.” 
  • “Force end of administrator’s sessions.”

Other suggestions the criminals shared included:

  • “Employ the right people. For huge companies, we suggest at least three system administrators working 24 hours maximum for admin’s working three shifts for eight hours per day that would be enough.”
  • “Check for granted privileges for users, to make them maximum reduce privileges and access only to exact applications. In most cases, there would be enough standard Windows software like an Applocker.”
  • “Don’t count on antivirus, there is no one A.V. that really helps, they can be useful only in long-term infections if hackers for some reasons didn’t attack in short time.”
  • “Install Endpoint Detection and Response security (EDR) and teach the IT-admin to work with it.”

Ultimately, it may prove impossible to prevent a ransomware attack, but cybercriminals will always pick the path of least resistance. If you can make your organization a more challenging target, you can drastically reduce the risk of falling victim. 

KEYWORDS: cyber security ransomware risk management security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Etay maor

Etay Maor is the Senior Director of Security Strategy for Cato Networks. Previously, Maor was the Chief Security Officer for IntSights, where he led strategic cybersecurity research and security services. Maor has also held senior security positions at IBM, where he created and led breach response training and security research, and RSA Security’s Cyber Threats Research Labs, where he managed malware research and intelligence teams. Maor is an adjunct professor at Boston College and is part of Call for Paper (CFP) committees for the RSA Conference and QuBits Conference. He holds a BA in Computer Science and a MA in Counter-Terrorism and Cyber-Terrorism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity-freepik1170x658.jpg

    Convergence is the answer for a defense-in-depth approach

    See More
  • threat-intel-freepik1170x658v78.jpg

    Eliminate threat intelligence false positives with SASE

    See More
  • vertical green text on black screen

    The rise of AI in SASE applications will fend off cyber threats

    See More

Related Products

See More Products
  • into to sec.jpg

    Introduction to Security, 10th Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing