2023 Ransomware Report Bullwall - FINAL
2023 Ransomware Report Bullwall - FINAL
RANSOMWARE
REPORT
INTRODUCTION
In the ever-evolving landscape of ransomware threats, cybersecurity professionals must reassess defense
strategies and proactively stay ahead of these menacing cyber-attacks. This 2023 Ransomware Report
presents insights gathered from a survey of 435 cybersecurity professionals, shedding light on organizations’
preparedness and approaches to combating ransomware. The report identifies gaps and obstacles that hinder
robust security posture, and outlines strategies for prevention and remediation of ransomware attacks.
Thank you,
Holger Schulze
Holger Schulze
CEO and Founder
Cybersecurity Insiders
A majority of respondents (87%) see ransomware as a moderate to extreme threat to their business. This shows a
high level of awareness and concern regarding the potential consequences of a successful attack.
87%
of respondents see malware as
a moderate or extreme threat
46%
41%
11%
2%
Extreme Moderate Small No threat
threat threat threat at all
79%
of respondents said an attack is
moderately to extremely likely
Very
likely Moderately
likely
32% 31%
Slightly
likely
Extremely
likely 17%
16%
Not at all
likely
4%
Organizations are most concerned about safeguarding sensitive information, as a breach could have severe
consequences, including reputational damage, loss of customer trust, and operational downtime for affected
organizations. An extreme example of the consequences of a ransomware attack can be seen in the healthcare
industry. When hospitals and medical facilities are targeted, essential systems are significantly disrupted, leading
to delayed patient care, the postponement of surgeries, and the inability to access vital medical records. In some
cases, these disruptions can be life-threatening for patients who require immediate treatment or care.
65%
Customer
55%
Financial
50%
Employee
41%
Company
information data information intellectual property
To tackle this issue, it’s essential to implement a multi-layered security approach that includes real-time monitoring
and rapid response to ransomware attacks. The rapidly evolving nature of ransomware attack vectors makes
effective response critical, including a focus on file-level activity and automatic isolation of compromised users and
devices to significantly reduce risk and maintain operational continuity.
64% 36%
NO YES
Understanding the extent of data exposure following ransomware attacks helps organizations assess potential
reputational and compliance risks. The survey results reveal that 5% of respondents confirmed their data was
exposed on a ransomware leak site. 60% reported no exposure, and 35% were unsure.
60%
64% 5% 36%
35%
The high degree of uncertainty underscores the importance of proactive monitoring and incident response. To
tackle this issue, organizations should implement a comprehensive security approach that rapidly detects and
responds to ransomware attacks to minimize data exposure risk.
NO YES Don’t know
NO YES
If your organization suffered from a ransomware attack, was your organization’s data
exposed on a ransomware leak site?
60% 5% 35%
NO YES Don’t know
Other notable impacts of ransomware attacks include system downtime (31%), loss of confidence in existing
cybersecurity solutions (20%), and revenue loss (16%).
What has been the impact of ransomware attacks on your organization in the past
12 months?
BUSINESS IMPACT
Productivity loss 42%
System downtime 31%
Revenue loss 16%
IT OPERATIONS/SECURITY IMPACT
Increased spending on IT security 40%
Change of IT security strategy to focus on mitigation 33%
Loss of confidence in existing cybersecurity solutions 20%
Negative press/bad publicity 13% | Damage to company reputation 13% | Loss of confidence from customers
and/or partners 9% | Senior IT staff (CIO, CISO) lost their jobs 7% | Other 4%
To tackle this evolving threat, organizations should adopt a proactive and comprehensive security strategy. This
includes real-time monitoring, rapid response to ransomware attacks, and automatic isolation of compromised
users and devices. By focusing on detecting malicious file encryption and preventing data exposure, organizations
can better defend against extortion attempts and maintain operational continuity.
If your organization suffered from a ransomware attack, how did your organization
recover from the attack?
47%
12%
Reinstalled/
restored backups
Brought in
10%
third-party
5%
Decrypted
files ourselves
Paid the
ransom
To minimize unauthorized access and its potential impact, organizations should implement an active defense
strategy focused on real-time monitoring and rapid detection of malicious activities to limit the scope of attacks and
their impact on the business.
What percentage of access did hackers have of company data before you detected
them in your organization?
80%
52%
7% 10%
3%
0-25% 26-50% 51-75% 76-100%
The increasing sophistication of ransomware renders many prevention solutions inadequate in defending against it.
To improve detection capabilities, organizations should consider incorporating multiple layers of security, including
user behavior monitoring and file monitoring, to strengthen their defenses. Assuming innovative ransomware will
enter an organization’s network and systems, companies need to focus on mitigation and rapid containment of
active attacks. Additionally, leveraging third-party threat intelligence can provide valuable insights into emerging
threats and help organizations stay ahead of potential attacks.
49%
Intrusion detection
38%
system
51%
Email and web
Network behavior
monitoring
gateways
35%
Detected by
82%
compromised
user
35%
Anti-malware/
antivirus/endpoint
security tools
Detected by
analyst/security
team
User behavior monitoring 26% | Third party threat intelligence 22% | File monitoring 22% | Detected by a third party
21% | Don’t know/other 7% | We cannot detect malware/ransomware 1%
This over-confidence could stem from a false sense of security or an underestimation of the evolving sophistication
of cyber threats. It’s crucial for organizations to recognize that even the most robust defenses may not always be
sufficient to fend off advanced ransomware attacks.
The disconnect between high confidence levels in organizations’ defenses and the high rates of ransomware attacks
can be partly attributed to the fact that cybercriminals are continually innovating and staying one step ahead of
preventative measures. This situation is similar to the transition from traditional antivirus solutions to EDRs: Just
as antivirus solutions became insufficient, prevention alone will never be enough in the current threat landscape.
Containment of active attacks is now necessary to effectively combat ransomware.
A stark example of this reality is that, in a significant number of pentests conducted with existing security tools in
place, 100% fail to prevent all ransomware. This further highlights the need for a multi-layered approach to security,
including detection, prevention, response, and recovery. By incorporating containment strategies alongside regular
employee training, network segmentation, and frequent backups of critical data, organizations can better protect
themselves from the growing and evolving threat of ransomware.
How confident are you that your organization’s defenses are capable of detecting and
blocking malware/ransomware before it spreads and infects critical systems and files?
Extremely
confident 8% 40%
of security professionals are very
Very
confident 32% to extremely confident in their
ability to detect and block an attack
Moderately
confident 38%
Slightly
confident 15%
7%
Not at all
confident
The survey further reveals that only 5% of respondents are extremely confident in their organization’s ability to
remediate ransomware after an attack, while 30% are very confident. This significant difference in confidence
levels between preventing attacks and dealing with post-attack ransomware containment highlights a potential
gap in organizations’ cybersecurity strategies. High confidence in prevention could be attributed to organizations
investing heavily in endpoint security tools, email and web gateways, and other proactive measures, which might
offer a false sense of security against incoming threats.
29% 71%
However, the lower confidence in post-attack ransomware remediation suggests that organizations might be
underestimating the need for robust response and recovery plans. As ransomware attacks continue to evolve
and become more sophisticated, including the potential growth of AI-generated malware, relying solely on
prevention measures will prove insufficient. To address this gap and prepare for future threats, organizations
NO that complement their existing
should adopt automated containment solutions YES resources. These tools can
enhance their ability to respond to and remediate ransomware attacks, allowing stretched cybersecurity teams
to focus on more strategic tasks.
Does your organization have an Incident Response team in place to detect, investigate,
and contain malware/ransomware attacks?
29% 71%
NO YES
How confident are you in your organization’s current ability to remediate ransomware
AFTER it locks or encrypts data within your systems?
Extremely
confident 5%
Very
confident 30%
35%
65%
Moderately
confident
Slightly
confident 18% are, at best,
Extremely
confident 5% moderately
Not at all
confident Very 12% 30% confident
confident
35%
Moderately
2023 RANSOMWARE REPORT confident ©2023 Cybersecurity Insiders. All Rights Reserved. 12
SPEED OF RECOVERY
The speed of ransomware recovery is crucial, as it directly affects an organization’s downtime, productivity, and
potential revenue loss.
According to the survey, 38% of respondents believe they can recover from a ransomware attack within a day, while
35% think they can do so within a few days. This seems to reflect a high degree of optimism among cybersecurity
professionals as real-world ransomware cases show recovery times often measured in weeks and months, not days.
To address this issue, organizations should adopt solutions that can shut down attacks in progress before
ransomware can spread through the organization, thereby significantly reducing damage and recovery time.
How fast do you believe you can recover from a ransomware attack?
73%
of customers need at most a few days
11%
to recover after a ransomware attack Potentially never
recover
Interestingly, only 2% would choose to pay the ransom, indicating that organizations are increasingly aware of the
risks involved in engaging with attackers.
To tackle ransomware, organizations should focus on developing a robust incident response plan that outlines
clear procedures to be followed during an attack. This plan should include regular backups, network segmentation,
employee training, and effective communication with stakeholders. Implementing such a strategy can help minimize
the attack’s impact and ensure faster recovery.
68%
Isolate and shut down offending systems and accounts,
recover encrypted files from backups, and mitigate
the initial attack vector if possible
Attempt to decrypt files ourselves 27% | Contact cybersecurity technology vendor 27% | Notify customers 20%
Attempt to negotiate with the attackers 10% | Pay the ransom 2%
76%
Protecting confidential
data related to the
business and clients
64%
Mitigating the financial
costs arising from
ransomware attacks
60%
Protecting the
reputation of the brand
48%
Staying a step ahead
of emerging threats
Organizations should recognize that EDR alone is not enough to prevent all ransomware attacks, particularly
considering the constantly evolving tactics and techniques used by cybercriminals. To enhance their defense,
companies should adopt a comprehensive approach that includes solutions designed to shut down active
ransomware attacks before they spread too far and cause significant damage.
Can your endpoint security solution(s) protect your servers against malware attacks?
23% NO
77%
YES
The survey highlights that organizations perceive the evolving sophistication of attacks (47%), lack of budget (45%)
and growing proliferation of attacks (35%) as their biggest challenges in improving ransomware defense. These
factors contribute to the difficulty in maintaining an effective security posture and underscore why organizations
need to move beyond prevention and into automated containment.
47% 45%
35% 34%
32%
Evolving Lack of Growing Lack of Poor user
sophistication budget proliferation human awareness
of attacks of attacks resources
Uncertainty what security solution to use 23% | Lack of executive sponsorship 18% | Our partners’ lack of
preparedness or response 8% | Other 3%
CAREER LEVEL
Director Manager/Supervisor CTO, CIO, CISO, CMO, CFO, COO Specialist Consultant Owner/CEO/President
Administrator Other
DE PA R T ME N T
C OMPA N Y S I Z E
8% 18 % 18 % 15 % 14% 9% 11% 7%
Fewer than 10 10-99 100-499 500-999 1,000-4,999 5,000-9,999 10,000-50,000 More than 50,000
INDU S T R Y
19 % 13 % 10 % 10 % 8% 8% 8% 4% 20%
Technology, Software & Internet Financial Services Professional Services Healthcare, Pharmaceuticals & Biotech Manufacturing
Education & Research Retail Non-Profit Other
I T S E C UR I T Y T E A M
11% 18 % 40% 13 % 18 %
Employee Education and Awareness: It’s important to acknowledge that employees are often
the first line of defense against ransomware attacks. Implementing regular cybersecurity training
and promoting a security-aware culture will help reduce the risk of successful phishing and social
engineering attacks.
Robust Backup and Recovery: Ensuring a robust backup and recovery strategy is crucial because
it minimizes downtime and data loss in case of a ransomware attack. Implementing frequent and
tested backups, storing them offsite or in the cloud, and having a clear recovery plan will greatly
enhance the organization’s resilience.
Rapid Containment of Active Attacks: Focusing on solutions that can quickly shut down an
ongoing attack is critical for limiting damage. Implementing tools and processes that identify and
contain ransomware activity in real-time significantly reduces the impact of an attack.
Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring multiple
forms of authentication before granting access to sensitive data or systems. Implementing MFA
helps protect against unauthorized access, even if an attacker obtains valid credentials.
Threat Intelligence and Information Sharing: Staying informed about emerging threats and
sharing information with relevant stakeholders helps organizations proactively prepare for potential
attacks. By leveraging threat intelligence and collaborating with other organizations, businesses can
identify and respond to threats more effectively.
Incident Response Plan and Team: Having a well-defined incident response plan and a dedicated
team ensures a quick and efficient reaction to ransomware attacks. Regularly reviewing and testing
the plan keeps the organization prepared for a swift response, minimizing damage and downtime.
Network Segmentation: Segmenting networks limits the attack surface and prevents the spread
of ransomware within the organization. By dividing the network into smaller, separate segments
and implementing strict access controls, organizations can better protect sensitive data and critical
systems.
By following these best practices, organizations can build a more resilient defense against ransomware and reduce
the likelihood and impact of successful attacks.
Copyright © 2023 Cybersecurity Insiders. All Rights Reserved. Data can be reproduced
or referenced as long as it is sourced and linked to www.cybersecurity-insiders.com.
2023 RANSOMWARE REPORT ©2023 Cybersecurity Insiders. All Rights Reserved. 21