Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business Resilience

How cybercriminals use sales best practices in ransomware attacks

By Marcus J. Carey
Cybercriminals take a play from sales best practices
February 21, 2021

Just like every company in the business world, cybercriminals are looking to boost their sales. With ransomware, they’ve found a way to force victims to pay. And in their quest, cyber attackers are borrowing a playbook from sales teams in legitimate businesses. I’ve noticed the similarities between ransomware criminal tactics and those of corporate sales operations. It’s important to understand the similarities because ransomware attacks won’t be stopping anytime soon. 

Cybercriminals have been moving toward legitimate business models for years. Cybercrime-as-a-service operations allow unskilled criminals to outsource their botnets, phishing and ransomware attacks to more specialized hackers. Help desks, invoices, and even money-back guarantees have become standard in the criminal underground. Ransomware has become such big business in its own right that cyber gangs are giving it the white glove treatment. Here are some ways that ransomware attackers are mirroring traditional sales techniques:

Prospecting and Reconnaissance

The first step in acquiring customers is to define your target audience. For ransomware attackers, reconnaissance is similar to traditional prospecting where they are trying to find victims who can be forced to consider paying. Like legitimate businesses, cybercriminals do their homework to find out which organizations and in which sectors are the most likely to end up paying ransom to get their data and services back in their control. They’ll use social networks like LinkedIn and Twitter to find personnel to target.

Launching a Campaign

Cybercriminals need to have deep insight into the organization they’re targeting. Much like standard sales campaigns, they typically start out with the perfect pretext. Once malware drops they’ll do reconnaissance within the organization’s network. They look for vulnerabilities to exploit and where the critical assets and infrastructure are. The phishing email has to be carefully crafted with just the right message to entice a call to action — the recipient to open it and either download an attachment or click a link. The average open rate for standard email marketing campaigns is 15%-25% with a click through rate of 2.5% compared with 30% of phishing emails that are opened. 

Provide a sample  

In order to turn interested customers into actual buyers, marketers will often provide a product sample or trial. In ransomware attacks, cybercriminals prove to victims that they have compromised the network by providing a sample of stolen data. Often cybercriminals provide proof that the keys to unlock the encrypted data actually work. Cybercriminals typically keep their word and return the data so as not to burnish their reputations. One study found that 58% of victims pay the ransom and another found that criminals don’t decrypt the data after receiving payment a mere 1% of the time. 

Negotiations 

While it’s not common for many merchants to lower their price at the customer’s request, it happens in situations where the market is more fluid and the sales pipeline is limited. Ransomware cybercriminals expect to negotiate on price because they know the data isn’t as valuable to anyone else. If the organization doesn’t pay, the cybercriminal can release the data publicly, which embarrasses the victim. But criminals would rather drop the price than not get paid at all — a big loss when the average ransomware price is more than $110,000. 

Here are some recommendations to help organizations avoid being hit with ransomware and to minimize damage if they are: 

·         Batten down the hatches

Organizations need to try to keep malware out of their networks. One in five breaches involves phishing, according to Verizon, so training employees to identify phishing emails and using anti-phishing and anti-malware tools is crucial. Also, keep up to date on application and operating system updates and patches to prevent attackers from getting in via vulnerable software -- 60% of breaches involve unpatched software.  

·         Back to Basics

Don’t forget to make frequent and regular backups of data and keep back ups separate from everyday networks that are likely to get hit by ransomware attacks. Backups need to be in a place where attackers can’t reach them, such as air gapped or physically separated from the internet-connected network. This requires manual updates, but it’s the safest approach.  

·         Tabletop exercises

Organizations need to practice business continuity planning so they are prepared in case of a ransomware attack and can recover quickly. This involves having everyone from technical and security teams, to legal, finance and PR, on the same page. Teams should run through different scenarios and practice the steps they will need to take in the event of an attack. These tabletop exercises should be done at least quarterly. Teams also should practice recovering data from a backup and make sure they actually get to the data when they need to and that they know where the key data is stored.

For cybercriminals, the Total Addressable Market for ransomware is hard to quantify but really big — basically any company is a potential target. Ransomware may be hitting critical industries like government, healthcare and education right now, but every organization has their threshold for business operations and data they would pay not to lose. 

KEYWORDS: cyber security cyber threats cybersecurity ransomware

Share This Story

Marcus J. Carey is a Security expert and Enterprise Architect at ReliaQuest.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing