Ransomware attackers are going after backup storage to force you to pay up

Ransomware
(Image credit: Pixabay)

When an organization suffers a ransomware infection, it usually has two choices: either pay the ransom demand and hope the decryptor works, or restore the data from a backup solution and continue business as usual. 

However, new research from Veeam has found hackers are increasingly targeting backup solutions in order to force the victims to pay the ransom demand anyway.

The company's Veeam 2023 Ransomware Trends Report, based on insights from 1,200 impacted organizations and almost 3,000 cyberattacks, claims threat actors will almost always (in more than 93% of cases) target backups during cyberattacks. Of that number, they’ll succeed (even partially) in three-quarters (75%) of cases. In more than a third of cases (39%) backup repositories were completely lost. Therefore, the immutability and air-gapping of backup solutions remain pivotal for businesses.

Focusing on the basics

“We need to focus on effective ransomware preparedness by focusing on the basics, including strong security measures and testing both original data and backups, ensuring survivability of the backup solutions, and ensuring alignment across the backup and cyber teams for a unified stance,” says Danny Allan, CTO at Veeam.

It seems that paying the ransom demand is still the most popular way of solving the problem, as 80% did it last year (up 4% year-on-year). While 59% managed to recover their data after paying the criminals, a fifth (21%) paid and still couldn’t get their data back. Furthermore, just 16% managed to recover their assets from backups - down 19% year-on-year.

While best practices (securing backup credentials, automating cyber detection scans of backups, and auto-verifying that backups are restorable) are important, Veeam argues that businesses need to make sure backups can’t be deleted or corrupted, and they can do that by focusing on immutability. 

Among ransomware victims 82% use immutable clouds, 64% use immutable disks, and just 2% don’t have immutability in at least one tier of their backup solution.

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Bad news - businesses who pay ransomware attackers aren’t very likely to get their data back
A computer being guarded by cybersecurity.
The impact of the cyber insurance industry in resilience against ransomware
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
AWS S3 feature abused by ransomware hackers to encrypt storage buckets
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Representational image of a cybercriminal
Should ransomware payments be illegal?
Latest in Security
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Oracle
Oracle denies data breach after hacker claims to hold six million records
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
Latest in News
Tesla Roadster 2
Tesla is still taking deposits on its long overdue Roadster, despite promising it would arrive in 2020
Samsung HW-Q990D soundbar with Halloween theme over the top
Samsung promises to repair soundbars bricked by its disastrous software update for free – but it'll probably involve shipping
Google Gemini AI
Gmail is adding a new Gemini AI tool to help smarten up your work emails
DJI Mavic 3 Pro
More DJI Mavic 4 Pro leaks seemingly reveal launch date, price and key features of the triple camera drone – here's what to expect
Android 16 logo on a phone
Here's how Android 16 will upgrade the screen unlocking process on your Pixel
Man sitting on sofa, drinking coffee, looking at phone in surprise
Thousands of coffee lovers warned to stop using their espresso machines immediately after reports of burns and lacerations