Here's another reason not to negotiate with ransomware scammers

Ransomware
(Image credit: Shutterstock)

Only a small proportion of companies who pay up to ransomware hackers ever see all their data returned in full, new research has claimed.

A report from Kaspersky polling 15,000 of its customers found just below half (46%) paid the ransom - but for just over a tenth of those companies (11%), paying up did not guarantee the return of stolen data.

Analyzing all the victims (paying and non-paying ones), less than a fifth (18%) managed to restore the locked files, while the majority (55%) managed to partially retrieve them. A third (35%) lost a “significant amount”, while 13% lost almost all of their data, with a fifth saying they had lost some files.

Ransomware is a form of malware in which the victim’s devices, networks, and cloud-based solutions are encrypted. The victim is required to pay for the decryption key, most often in Bitcoin, or other cryptocurrencies. In many cases, criminals will also steal the files before encrypting them and will threaten to sell or release the data online unless the demand is met. 

Unlike the advice recently given out by the FBI, Kaspersky recommends not paying the ransom, arguing that it does not guarantee the victim its files back, but it does guarantee criminals being additionally motivated for more ransomware attacks. It also does not guarantee that the victim won’t be targeted again in the future.

Instead, the company says victims should notify law enforcement agencies and try to find out the name of the Trojan that was used, as there is a chance that cybersecurity experts could find a decryptor. Employers are also encouraged to educate their workforce on the dangers of phishing and online fraud, as well as set up industry-standard back-up solutions. Obviously, a strong antivirus solution is a must.

“This data shows we have seen a significant proportion of consumers paying a ransom for their data over the past 12 months. But handing over money doesn’t guarantee the return of data, and only encourages cybercriminals to continue the practice. Therefore, we always recommend that those affected by ransomware do not pay as that money supports this scheme to thrive,” said Marina Titova, Head of Consumer Product Marketing at Kaspersky.

 “Instead, consumers should make sure to invest in initial protection and security for their devices and regularly back up all data. This will make the attack itself less appealing or lucrative to cybercriminals, reducing the use of the practice, and presenting a safer future for web users.”

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Bad news - businesses who pay ransomware attackers aren’t very likely to get their data back
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Less than half of ransomware incidents end in payment - but you should still be on your guard
A computer being guarded by cybersecurity.
The impact of the cyber insurance industry in resilience against ransomware
Representational image of a cybercriminal
Should ransomware payments be illegal?
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
More reports claim 2024 was the worst year for ransomware attacks yet
Representational image of a hacker
Best ransomware protection of 2025
Latest in Security
A graphic showing fleet tracking locations over a city.
Lost & Found tracking site hit by major data breach - over 800,000 could be affected
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
US set to pause cyber-offensive operations against Russia - but CISA says it won't stop
Web DDoS attacks see major surge as AI allows more powerful attacks
Polish space agency says it was hit by a cyberattack
Illustration of a hooked email hovering over a mobile phone
AWS misconfigurations reportedly used to launch phishing attacks
A concept image of someone typing on a computer. A red flashing danger sign is above the keyboard and nymbers and symbols also in glowing red surround it.
Microsoft Teams and other Windows tools hijacked to hack corporate networks
Latest in News
Google Gemini iPhone Lock Screen
You can now access Gemini from your iPhone's lock screen
Michelle, Keats, and Doctor Amherst looking unimpressed and worried in The Electric State
Netflix drops trailer for The Electric State, and I'm getting serious District 9 vibes
YouTube TV
YouTube TV might be planning a big Netflix update that puts the best streaming services first
Google Pixel 9 Pro
Here are the 7 best Pixel 9 and Pixel Watch 3 features landing in March’s Pixel Feature Drop
Bang & Olufsen Beogram 4000C Saint Laurent Rive Droite Edition
Bang & Olufsen's latest reworked turntable is a masterpiece of retro revival, in a breathtaking wooden presentation box
Apple Watch Series 10
Apple unveils new Apple Watch bands – here's what's in the Spring 2025 collection