The State of Ransomware 2020: Results of An Independent Study of 5,000 IT Managers Across 26 Countries
The State of Ransomware 2020: Results of An Independent Study of 5,000 IT Managers Across 26 Countries
RANSOMWARE 2020
Results of an independent study of
5,000 IT managers across 26 countries
Introduction
Stories of organizations crippled by ransomware regularly dominate the IT news headlines,
and accounts of six- and seven-figure ransom demands are commonplace. But do the
news stories tell the full story?
Within each country, 50% of respondents were from organizations of between 100 and
1,000 employees, while 50% were from organizations of between 1,001 and 5,000 employees.
Respondents came from a range of sectors, both public and private.
Executive summary
The survey provides fresh new insight into the experiences of organizations hit by ransomware,
including:
Ì Almost three quarters of ransomware attacks result in the data being encrypted. 51%
of organizations were hit by ransomware in the last year. The criminals succeeded in
encrypting the data in 73% of these attacks.
Ì 26% of ransomware victims whose data was encrypted got their data back by paying
the ransom. A further 1% paid the ransom but didn’t get their data back.
Ì 94% of organizations whose data was encrypted got it back. More than twice as many
got it back via backups (56%) than by paying the ransom (26%).
Ì Paying the ransom doubles the cost of dealing with a ransomware attack. The
average cost to rectify the impacts of the most recent ransomware attack (considering
downtime, people time, device cost, network cost, lost opportunity, ransom paid etc.)
is US$732,520 for organizations that don’t pay the ransom, rising to US$1,448,458 for
organizations that do pay.
Ì Despite the headlines, the public sector is less affected by ransomware than the
private sector. 45% of public sector organizations were hit by ransomware last year,
compared to a global average of 51%, and a high of 60% in the media, leisure, and
entertainment industries.
Ì One in five organizations has a major hole in their cybersecurity insurance. 84% of
respondents have cybersecurity insurance, but only 64% have insurance that covers
ransomware.
Ì Cybersecurity insurance pays the ransom. For those organizations that have insurance
against ransomware, 94% of the time when the ransom is paid to get the data back, it’s
the insurance company that pays.
Ì Most successful ransomware attacks include data in the public cloud. 59% of attacks
where the data was encrypted involved data in the public cloud. While it’s likely that
respondents took a broad interpretation of public cloud, including cloud-based services
such as Google Drive and Dropbox and cloud backup such as Veeam, it’s clear that
cybercriminals are targeting data wherever it stored.
2017 2020
54% 51%
In the last year, has your organization been hit by ransomware? Base: 5,000 respondents (2020), 1,700 respondents (2017).
This drop, while welcome, is likely due to a change in tactics from the ransomware actors
rather than a reduced focus on this type of attack. In 2017 mass market ‘spray and pray’
desktop ransomware was very common based on insights from SophosLabs. These
attacks were spread widely and indiscriminately, resulting in a high number of organizations
being hit.
Now, in 2020, the trend is for server-based attacks. These are highly-targeted, sophisticated
attacks that take more effort to deploy – hence the reduction in the number of attacks.
However, they are typically far more deadly due to the higher value of assets encrypted and
can cripple organizations with multi-million dollar ransom requests.
For subsequent survey questions, if the organization reported multiple ransomware attacks
in the last year, we asked them to respond for the most significant attack in the last year
only.
Brazil 65%
Turkey 63%
Belgium 60%
Sweden 60%
U.S. 59%
Malaysia 58%
Germany 57%
Netherlands 55%
Spain 53%
Nigeria 53%
France 52%
UAE 49%
UK 48%
Australia 48%
China 45%
Colombia 44%
Mexico 44%
Japan 42%
Italy 41%
Singapore 40%
Canada 39%
Philippines 30%
Poland 28%
Global Average
0% 20% 40% 60% 80% 100%
In the last year, has your organization been hit by ransomware? Base: 5,000 respondents.
Ì India (300 respondents) tops the list with 82% of organizations reporting being hit by
ransomware in the last year. This is not a huge surprise. Cyber hygiene is generally poor
in India, and pirated technology abounds, creating weaknesses in cyber defenses and
making organizations more vulnerable to attack.
Ì The Philippines, Poland, and South Africa report the lowest levels of cyberattacks.
As we discussed earlier, cybercriminals have moved from ‘spray and pray’ desktop
ransomware attacks to more targeted server-based attacks that affect fewer
organizations but with higher ransom demands. They geo-target their attacks to go
after the most lucrative opportunities. The three countries at the bottom of the attack
scale also have lower GDP than many of the other countries higher up the list which
may be why they receive less focus from the cybercriminals.
Ì The move from ‘spray and pray’ to targeted attacks focused on the most lucrative
targets likely contributed to the noticeable reduction in ransomware in South Africa. In
our previous survey (2017) 54% of respondents reported being hit by ransomware in the
last year, but this is now down to 24%, a drop of over 50%.
IT, technology,
56%
telecoms
Other 54%
Business and
professional 50%
services
Construction
49%
and property
Retail,
distribution and 49%
transport
Financial
48%
services
Manufacturing 46%
and production
Global Average
0% 20% 40% 60% 80% 100%
In the last year, has your organization been hit by ransomware? Base: 5,000 respondents.
At first glance this is surprising: the news is full of stories of hospitals and government
organizations that have been held to ransom. However, the survey reveals that those
headlines are creating a skewed picture of reality.
In many countries, public sector organizations are obliged to report ransomware attacks.
However, the private sector often has no such requirements and so can choose to keep the
attack quiet – perhaps to avoid creating concern among customers, reputation damage, or
being perceived as an easy target by other attackers.
These findings are backed up by Sophos’ own research into SamSam ransomware. Working
with cryptocurrency monitoring organization Neutrino, Sophos followed the money and
identified many ransom payments and victims that were previously unknown. Based on the
much larger number of victims now known, it seems that the private sector had actually
borne the brunt of SamSam.
It is, however, encouraging is that in just under a quarter of cases (24%) the attack was
stopped before the data could be encrypted. It seems that anti-ransomware technology is
having an impact on the success rate of ransomware attacks.
73%
Cybercriminals
24%
Attacks stopped
3%
Data not encrypted
succeeded in before the data could but victim still held
encrypting data be encrypted to ransom
One interesting finding from the survey is that 3% of organizations said their data was not
encrypted but they were still held to ransom. This type of attack was particularly dominant
in Nigeria, as well as Colombia, South Africa, China, Poland, Belgium and the Philippines.
You could argue that this is extortion rather than ransomware. Semantics aside, the most
important take-away is this is an attack vector to be vigilant of as crooks look for ways to
make money without the effort of encrypting and decrypting files.
Spain 44%
Italy 38%
Brazil 36%
Singapore 33%
Germany 31%
China 28%
Canada 26%
U.S. 25%
Mexico 24%
Belgium 23%
UK 22%
Netherlands 22%
UAE 22%
Philippines 20%
Colombia 19%
France 17%
Malaysia 17%
Australia 17%
Nigeria 11%
Sweden 8%
India 8%
Japan 5%
Global Average
0% 20% 40% 60% 80% 100%
Percentage of respondents that answered ‘No, the attack was stopped before the data could be encrypted’ to: Did the cybercriminals
succeed in encrypting your organization’s data in the most significant ransomware attack? Question only seen by respondents whose
organization had been hit by ransomware in the last year. Base: 2,538 respondents.
Poland has been removed from this chart as it has a base of below 30 respondents, and the
Philippines has a base of just 30.
59%
Includes data in
the public cloud
41%
On premises/
35% 24%
Data in the public
Data in the cloud and on
private cloud public cloud
data premises/private
cloud data
Did the cybercriminals succeed in encrypting your organization’s data in the most significant ransomware attack? Responses from
respondents whose organization’s data had been encrypted in the most recent ransomware attack. Base: 1,849 respondents.
A word of caution here: it is likely that the respondents took a broad interpretation of public
cloud, including cloud-based services such as Google Drive and Dropbox and cloud backup
such as Veeam, rather than focusing solely on AWS, Azure, and Alibaba Cloud-type services.
Nonetheless, there is a clear takeaway: no data is safe, and you should ensure data stored in
the cloud is as well protected and backed-up as data stored on premises.
26% of ransomware victims got their data back by paying the ransom
26% of those organizations whose data was encrypted got it back by paying the ransom. A
further 1% of organizations whose data was encrypted paid the ransom but didn’t get their
data back – so overall, 95% of organizations that paid the ransom had their data restored
(473 of the 496 organizations that paid the ransom).
When it comes to paying the ransom, we see some noticeable regional variations. In India
two out of three (66%) paid the ransom to get the data back, while 29% used backups.
Conversely, in Spain just 4% paid the ransom while 72% restored the data from backups.
Sweden 50%
Philippines 32%
Belgium 32%
Japan 31%
Nigeria 28%
Brazil 28%
Singapore 28%
U.S. 25%
Netherlands 22%
France 19%
Colombia 19%
UAE 16%
China 15%
Mexico 13%
Malaysia 13%
UK 13%
Germany 12%
Australia 12%
Canada 11%
Italy 6%
Spain 4%
Global Average
0% 20% 40% 60% 80% 100%
Percentage of respondents that answered “Yes, we paid the ransom” to: Did your organization get the data back in the most significant
ransomware attack? Question only seen by respondents whose organization had experienced a ransomware attack where data was
encrypted. Base: 1,849 respondents.
Note, we have removed the Philippines, South Africa, Poland and Turkey from this chart as
they all had bases of 30 or fewer for this question.
As we’ve seen, 26% got their data back by paying the ransom. However, more than double
that (56%) restored their data using backups. The remaining 12% said that they got their
data back through other means.
73%
Of attacks result
94%
Of victims get
56%
Used backups
in data being their data back to get the data
encrypted back
What was the approximate cost to your organization to rectify the impacts of the most recent ransomware attack (considering
downtime, people time, device cost, network cost, lost opportunity, ransom paid etc.)? Question only seen by respondents whose
organization had been hit by ransomware in the last year. Base: 2,538 respondents.
The average cost to the organization to rectify the impacts of the most recent ransomware
attack (considering downtime, people time, device cost, network cost, lost opportunity,
ransom paid etc.) is US$761,106. For smaller organizations of 100-1,001 employees the
average cost was $505,827 and for 1,001 to 5,000 employee organizations the average
cost was $981,140.
Japan $2,194,600.43
Australia $1,122,914.16
India $1,107.407.16
Malaysia $1,059,055.95
Philippines $877,232.14
Netherlands $860,709.42
UK $839,796.42
Singapore $832,423.13
China $828,611.80
UAE $696,305.10
Colombia $694,719.81
Brazil $629,770.42
U.S. $622,596.18
Nigeria $591,011.54
France $474,477.95
Germany $472,077.84
Mexico $465,155.11
Italy $443,552.04
Canada $404,424.29
Belgium $374,027.59
Turkey $356,818.65
Spain $283,629.64
Global Average
0% $500k $1m $1.5m $2m $2.5m $3m
What was the approximate cost to your organization to rectify the impacts of the most recent ransomware attack (considering
downtime, people time, device cost, network cost, lost opportunity, ransom paid etc.)? Question only seen by respondents whose
organization had been hit by ransomware in the last year. Base: 2,538 respondents.
One possible reason for this variation in cost is the labor costs in the different countries.
Sweden and Japan are typically higher salary countries, so the cost of the human hours
required to remediate the ransomware attack will add up. Conversely, South Africa and the
Czech Republic are typically lower labor cost areas.
We have already seen that Sweden has the second highest rate of ransom payment of all
countries surveyed, second only to India. However, unlike India, it also has high labor costs
which combine to deliver a financial double whammy when it comes to cleaning up after
ransomware.
US$1,448,458 US$732,520
Paid ransom Didn't pay
ransom
Did your organization get the data back in the most significant ransomware attack? Data only represents respondents whose
organization’s data had been encrypted in the most recent ransomware attack. Base: 1,849 respondents. Paid the ransom combines
responses "Yes, we paid the ransom" and "No, even though we paid the ransom." Didn’t pay the ransom combines responses "Yes, we
used backups to restore the data," "Yes, we used other means to get our data back," and "No, we didn’t pay the ransom."
This may sound counterintuitive: if you’ve paid the ransom, why does it cost more? Well
even if you pay the ransom, you still need to do a lot of work to restore the data. In fact, the
costs to recover the data and get things back to normal are likely to be the same whether
you get the data back from the criminals or from your backups. But if you pay the ransom,
you’ve got another big cost on top.
84% 64%
Have cybersecurity
20%
Paying for cybersecurity
Have cybersecurity insurance that covers insurance that DOESN'T
insurance ransomware cover ransomware
Does your organization have cybersecurity insurance that covers it if it is hit by ransomware? Base: 5,000 respondents.
Given that, as we’ve seen, 51% of organizations experienced ransomware in the last year, and
with average remediation costs of US$761,106, organizations should question the value of
insurance that excludes ransomware.
Nigeria 70%
45%
Does your organization have cybersecurity insurance that covers it if it is hit by ransomware? Base: 5,000 respondents.
This table looks those data points by country. The blue shows the percentage of
organizations with cybersecurity insurance and the orange shows the percentage with
insurance that covers them for ransomware. What we need to look at here are both the
absolute numbers for each column, as well as the gap between the two bars for each
country.
India tops the list of organizations with cybersecurity insurance, and has the second-
highest level (80%) of organizations with insurance that covers ransomware. Given
that India also reported the highest propensity to be hit by ransomware, this is a logical
correlation.
Turkey reported the third-highest rate of ransomware attacks. However, while it has the
third-highest rate of cybersecurity insurance (93% are covered), it also has one of the
biggest gaps between bars with only 57% of organizations covered for ransomware.
Despite China having a below-average rate of ransomware attacks (45% hit in the last year),
it has the joint-highest level of cybersecurity insurance (94%) as well the highest level of
cybersecurity insurance that covers ransomware (82%). Indeed, it has the smallest gap
between columns of all 26 countries surveyed.
One interesting outlier here is Germany. It is surprising to see a developed economy that
has such a low level of insurance (77%), as well as one of the lowest levels of cybersecurity
insurance that covers ransomware (50%). Germany reported above-average levels of
ransomware (57% of organizations were hit in the last year) which makes the insurance
data even more surprising.
On average, 64% of organizations have insurance that covers ransomware. The financial
services industry has the highest rate of coverage (72%), likely due to the nature of their
industry making them a lucrative target for crooks. IT, telecoms, and technology are not far
behind on 70%.
Manufacturing
63%
and production
Construction
62%
and property
Retail,
distribution and 62%
transport
Other 61%
Global Average
0% 20% 40% 60% 80% 100%
Does your organization have cybersecurity insurance that covers it if it is hit by ransomware? Base: 5,000.
Public sector organizations, however, lag considerably behind their private sector
counterparts. Just 51% are covered by insurance for ransomware costs, a full 10
percentage points behind the next sector. This low rate of protection could be due to costs.
Tight public sector funding is commonplace across the globe and it may be that budgets
don’t stretch to insurance. Either way, this is a short term savings if an attack does breach
their defenses.
73%
Ransomware attacks
26%
Organizations whose
94%
Organizations that paid
resulted in data data was encrypted said the cybersecurity
being encrypted paid the ransom insurance paid
the ransom
However, when we dive deeper, we discover that, in almost all of the incidents when the
ransom is paid – 94% – it’s the cybersecurity insurance that’s paying the ransom. And, as
we’ve seen, paying the ransom doubles the overall clean-up costs.
How did the ransomware attack get into your organization? Question asked to respondents whose organization had been hit by
ransomware in the last year. Base: 2,538 respondents.
What really stands out when we look at this data is that there is no single main attack
vector. Rather, attackers are using a range of techniques and whichever defense has a
weakness is how they get in. When one technique fails they move on to the next, until they
find a weak spot.
This data demonstrates the need for an effective layered defense that covers your
endpoints, servers, public cloud instances, email, network gateway, and supply chain. Just
focusing on a single technology is a recipe for infection.
Recommendations
The survey has confirmed that ransomware remains a very real threat for organizations
today. It’s also provided insight into how to minimize your risk of being held hostage:
1. Start with the assumption that you will be hit. Ransomware it doesn’t discriminate:
every organization is a target, regardless of size, sector, or geography. Plan your
cybersecurity strategy based on the assumption that you will get hit by an attack.
3. Protect data wherever it’s held. Almost six in 10 ransomware attacks that successfully
encrypted data include data in the public cloud. Your strategy should include protecting
data in the public cloud, private cloud, and on premises.
4. Make regular backups and store offsite and offline. 56% of organizations whose data
was encrypted restored their data using backups last year. Using backups to restore
your data considerably lowers the costs of dealing with the attack compared with
paying the ransom.
5. Ensure your cyber insurance covers ransomware. Make sure that you’re fully covered if
the worst does happen.
6. Deploy a layered defense. Ransomware actors use a wide range of techniques to get
around your defenses; when one is blocked, they move on to the next one until they find
the chink in your armor. You need to defend against all vectors of attack.
Ì Encryption rollback - CryptoGuard blocks the unauthorized encryption of files and rolls
them back to their safe state in seconds.
Ì Exploit protection - Detects and blocks more than three dozen exploit techniques used
to download and install malware, preventing attackers getting on your network.
Ì AI-powered threat protection - Sophos’ own deep learning engine predictively prevent
more attacks and has lower false positives than any other security software.
Ì Credential theft - Stops hackers getting your credentials, blocking unauthorized system
access and admin privilege escalation.
United Kingdom and Worldwide Sales North American Sales Australia and New Zealand Sales Asia Sales
Tel: +44 (0)8447 671131 Toll Free: 1-866-866-2802 Tel: +61 2 9409 9100 Tel: +65 62244168
Email: sales@sophos.com Email: nasales@sophos.com Email: sales@sophos.com.au Email: salesasia@sophos.com