Most ransomware victims pay up, but many never recover their data

ransomware avast
(Image credit: Avast)

Most businesses that fall victim to a ransomware attack decide to pay the criminals for their data, but many still end up empty-handed, according to a report from Veeam.

The backup, recovery, and data management solutions provider, recently polled 1,000 IT leaders (CISOs, security pros, backup admins, and IT operators) whose organizations suffered a ransomware attack.

The report found 76% of victims decided to pay up, in order to get their data back as soon as possible. However, just 52% were able to recover their encrypted files, while the remaining 24% were left empty-handed. In other words, the researchers are saying, there is a one in three chance that despite paying the ransom, you might still not be able to recover your lost files.

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Aspiring to strong backups

Veeam noted that 19% of customers did not pay any ransom, because they were able to recover their data from a backup, something the remaining 81% “must aspire to”. 

As a conclusion, the report states that businesses are not helpless in the face of ransomware attacks, and that with good prevention and backup strategies, they can stay relatively safe.

Keeping backups safe is also going to be a challenge, as 72% of organizations have had either partial, or complete attacks, on their backup repositories - and almost all attackers tried to destroy backup repositories.

“Educate employees and ensure they practice impeccable digital hygiene; regularly conduct rigorous tests of your data protection solutions and protocols; and create detailed business continuity plans that prepare key stakeholders for worst-case scenarios,” advised Danny Allan, Veeam’s CTO.

However, before doing any of those - businesses need to keep their software up to date. Veeam says 80% of successful attacks have targeted known vulnerabilities with malware, putting emphasis on the importance of patching and software upgrades. 

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Bad news - businesses who pay ransomware attackers aren’t very likely to get their data back
Ransomware
Ransomware defenses are being weakened by outdated backup technology, limited backup data encryption, and failed data backups
A computer being guarded by cybersecurity.
The impact of the cyber insurance industry in resilience against ransomware
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Less than half of ransomware incidents end in payment - but you should still be on your guard
Representational image of a cybercriminal
Should ransomware payments be illegal?
Hands typing on a keyboard surrounded by security icons
35 years on: The history and evolution of ransomware
Latest in Security
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Latest in News
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 9 (game #1140)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 9 (game #371)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 9 (game #637)
WhatsApp
WhatsApp just made its AI impossible to avoid – but at least you can turn it off