Think ransomware is expensive now? It’s not predicted to get any cheaper over the next decade. Ransoms could cost victims a collective total of $265 billion by 2031. The estimate is based on the prediction that the price tag will increase 30% every year over the next 10 years.

Read on to learn what factors are helping to drive this forecast.

Ransomware Costs Growing

Cybersecurity Ventures predicted in 2015 that ransomware would cost victims $325 million. Its predictions grew from there, suggesting a rising cost in related damages.

In 2017, for instance, the firm predicted that ransomware would cost victims $5 billion — 15 times more than it predicted two years ago. This cost projection grew to $20 billion for 2021, or 57 times what it was in 2015.

Looking ahead, Cybersecurity Ventures noted that more frequent attacks will factor in to rising costs. It estimated that there will be a new attack every two seconds by 2031.

Recent Attacks with High Price Tags

The current threat landscape supports these estimates.

For their part, victims are paying more in the aftermath of an attack. In May 2021, a U.S. insurance company paid a ransom of $40 million — the largest publicly reported payment made by any ransomware victim to date. This reflects the growth of the average ransom payment to between $50 million and $70 million.

That’s just ransom payments. Victims are also spending more to recover from an infection. Indeed, the average cost of remediating a ransomware attack more than doubled from $761,106 in 2020 to $1.85 million in 2021.

At the same time, threat actors are getting more creative with their attacks. Some are using a technique known as triple extortion to prey upon the customers of an organization victimized by ransomware. Others use double encryption, where they’re encrypting a victim’s apps and systems with multiple ransomware strains, thwarting recovery efforts and increasing payouts.

How to Defend Against a Ransomware Attack

The findings discussed above highlight the need for businesses and agencies to defend themselves against ransomware attacks. They can do this in part by training their staff to become familiar with phishing attacks, exploit kits and other common delivery vectors for ransomware. As part of this effort, they can use threat intelligence to inform their ongoing security awareness training modules.

Organizations can then complement those security measures with technical controls. By implementing multi-factor authentication and user behavior analytics, for instance, they can find and fix suspicious behavior that could be a sign of a ransomware attack.

More from News

The White House on Quantum Encryption and IoT Labels

A recent White House Fact Sheet outlined the current and future U.S. cybersecurity priorities. While most of the topics covered were in line with expectations, others drew more attention. The emphasis on critical infrastructure protection is clearly a top national priority. However, the plan is to create a labeling system for IoT devices, identifying the ones with the highest cybersecurity standards. Few expected that news. The topic of quantum-resistant encryption reveals that such concerns may become a reality sooner than…

Malware-as-a-Service Flaunts Its Tally of Users and Victims

As time passes, the security landscape keeps getting stranger and scarier. How long did the “not if, but when” mentality towards cyberattacks last — a few years, maybe? Now, security pros think in terms of how often will their organization be attacked and at what cost. Or they consider how the difference between legitimate Software-as-a-Service (SaaS) brands and Malware-as-a-Service (MaaS) gangs keeps getting blurrier. MaaS operators provide web-based services, slick UX, tiered subscriptions, newsletters and Telegram channels that keep users…

New Survey Shows Burnout May Lead to Attrition

For many organizations and the cybersecurity industry as a whole, improving retention and reducing the skills gap is a top priority. Mimecast’s The State of Ransomware Readiness 2022: Reducing the Personal and Business Cost points to another growing concern — burnout that leads to attrition. Without skilled employees, organizations cannot protect their data and infrastructure from increasing cybersecurity attacks. According to Mimecast’s report, 77% of cybersecurity leaders say the number of cyberattacks against their company has increased or stayed the…

Alleged FBI Database Breach Exposes Agents and InfraGard

Recently the feds suffered a big hack, not once, but twice. First, the FBI-run InfraGard program suffered a breach. InfraGard aims to strengthen partnerships with the private sector to share information about cyber and physical threats. That organization experienced a major breach in early December, according to a KrebsOnSecurity report. Allegedly, the InfraGard database — containing contact information of over 80,000 members — appeared up for sale on a cyber crime forum. Also, the hackers have reportedly been communicating with…