August 6, 2021 By David Bisson 2 min read

Think ransomware is expensive now? It’s not predicted to get any cheaper over the next decade. Ransoms could cost victims a collective total of $265 billion by 2031. The estimate is based on the prediction that the price tag will increase 30% every year over the next 10 years.

Read on to learn what factors are helping to drive this forecast.

Ransomware Costs Growing

Cybersecurity Ventures predicted in 2015 that ransomware would cost victims $325 million. Its predictions grew from there, suggesting a rising cost in related damages.

In 2017, for instance, the firm predicted that ransomware would cost victims $5 billion — 15 times more than it predicted two years ago. This cost projection grew to $20 billion for 2021, or 57 times what it was in 2015.

Looking ahead, Cybersecurity Ventures noted that more frequent attacks will factor in to rising costs. It estimated that there will be a new attack every two seconds by 2031.

Recent Attacks with High Price Tags

The current threat landscape supports these estimates.

For their part, victims are paying more in the aftermath of an attack. In May 2021, a U.S. insurance company paid a ransom of $40 million — the largest publicly reported payment made by any ransomware victim to date. This reflects the growth of the average ransom payment to between $50 million and $70 million.

That’s just ransom payments. Victims are also spending more to recover from an infection. Indeed, the average cost of remediating a ransomware attack more than doubled from $761,106 in 2020 to $1.85 million in 2021.

At the same time, threat actors are getting more creative with their attacks. Some are using a technique known as triple extortion to prey upon the customers of an organization victimized by ransomware. Others use double encryption, where they’re encrypting a victim’s apps and systems with multiple ransomware strains, thwarting recovery efforts and increasing payouts.

How to Defend Against a Ransomware Attack

The findings discussed above highlight the need for businesses and agencies to defend themselves against ransomware attacks. They can do this in part by training their staff to become familiar with phishing attacks, exploit kits and other common delivery vectors for ransomware. As part of this effort, they can use threat intelligence to inform their ongoing security awareness training modules.

Organizations can then complement those security measures with technical controls. By implementing multi-factor authentication and user behavior analytics, for instance, they can find and fix suspicious behavior that could be a sign of a ransomware attack.

More from News

Research finds 56% increase in active ransomware groups

4 min read - Any good news is welcomed when evaluating cyber crime trends year-over-year. Over the last two years, IBM’s Threat Index Reports have provided some minor reprieve in this area by showing a gradual decline in the prevalence of ransomware attacks — now accounting for only 17% of all cybersecurity incidents compared to 21% in 2021. Unfortunately, it’s too early to know if this trendline will continue. A recent report released by Searchlight Cyber shows that there has been a 56% increase in…

Cyberattack on American Water: A warning to critical infrastructure

3 min read - American Water, the largest publicly traded United States water and wastewater utility, recently experienced a cybersecurity incident that forced the company to disconnect key systems, including its customer billing platform. As the company’s investigation continues, there are growing concerns about the vulnerabilities that persist in the water sector, which has increasingly become a target for cyberattacks. The breach is a stark reminder of the critical infrastructure risks that have long plagued the industry. While the water utility has confirmed that…

CISA and FBI release secure by design alert on cross-site scripting 

3 min read - CISA and the FBI are increasingly focusing on proactive cybersecurity and cyber resilience measures. Conjointly, the agencies recently released a new Secure by Design alert aimed at eliminating cross-site Scripting (XSS) vulnerabilities, which have long been exploited to compromise both data and user trust. Cross-site scripting vulnerabilities occur when a web application improperly handles user input, allowing attackers to inject malicious scripts into web pages that are then executed by unsuspecting users. These vulnerabilities are dangerous because they don't attack…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today