You can’t look at the news these days without reading about layoffs in the technology sector. Roger Lee, founder of told that more than 120,000 tech employees lost their jobs in 2023 as of Feb 27, compared to 161,411 in all of 2022. However, all layoffs aren’t bad news.

Most people don’t think of criminals losing their jobs. But if the criminal activity isn’t making money, then it makes no sense to continue. And that is happening in the cyber crime world.

At least 45 threat actors working at a call center run by former members of the ransomware group Conti lost their jobs last fall. Before getting their pink slips, their job was convincing people over the phone to let them install remote access software onto their computers or networks. With access, the attackers could then infect networks with ransomware. However, the scam wasn’t as successful as planned and the call center lost money.

Data shows cyber crime is slightly less lucrative

Data backs up the trend that cyber crime is becoming less of a big payday. Ransomware especially appears to be less lucrative than it was even a year or two ago. One of the biggest reasons is that fewer victims are paying the ransom than before. Coveware’s CEO Bill Siegel told the Wall Street Journal that only 37% of victims pay the ransom today, compared to 85% four years ago.

Additionally, the IBM Security X-Force study showed a significant reduction in the average length of an attack. The duration went from over two months in 2019 to less than four days in 2021. The IBM 2022 Cost of a Data Breach Report found that the average cost of a ransomware attack went down slightly from $4.62 million in 2021 to $4.54 million in 2022. However, the cost of a ransomware attack is still higher than the overall cost of a data breach at $4.35 million.

Are we moving in the right direction?

Yes. Probably. But now isn’t the time to let up.

Companies improving their cybersecurity measures and creating an incident response plan for ransomware help to reduce the impact of cyberattacks. Additionally, companies are training employees on how to respond to an attack, which can reduce the impact and the duration. By continuing effective measures and putting cyber criminals out of work, organizations and governments can hopefully continue the trend of threat actor layoffs into the future.

More from News

Securing critical infrastructure with the carrot and stick

4 min read - It wasn’t long ago that cybersecurity was a fringe topic of interest. Now, headline-making breaches impact large numbers of everyday citizens. Entire cities find themselves under cyberattack. In a short time, cyber has taken an important place in the national discourse. Today, governments, regulatory agencies and companies must work together to confront this growing threat. So how is the federal government bolstering security for critical infrastructure? It looks like they are using a carrot-and-stick approach. Back in March 2022, the…

650,000 cyber jobs are now vacant: How to tackle the risk

4 min read - How far is the United States behind in filing cybersecurity jobs? As per Rep. Andrew Garbarino, R-N.Y., Chairman of the HHS Cybersecurity and Infrastructure Protection Subcommittee, overseas adversaries have a workforce advantage over FBI cyber personnel of 50 to one. His statements were made during a recent subcommittee hearing titled “Growing the National Cybersecurity Talent Pipeline.” Meanwhile, recent CyberSeek data shows over 650,000 cyber jobs to fill nationwide. Given the rising rate of cyberattacks, these numbers are truly alarming. How…

Will data backups save you from ransomware? Think again

4 min read - Backups are an essential part of any solid anti-ransomware strategy. In fact, research shows that the median recovery cost for ransomware victims that used backups is half the cost incurred by those that paid the ransom. But not all data backup approaches are created equal. A separate report found that in 93% of ransomware incidents, threat actors actively target backup repositories. This results in 75% of victims losing at least some of their backups during the attack, and more than…

Should you worry about state-sponsored attacks? Maybe not.

4 min read - More than ever, state-sponsored cyber threats worry security professionals. In fact, nation-state activity alerts increased against critical infrastructure from 20% to 40% from 2021 to 2022, according to a recent Microsoft Digital Defense Report. With the advent of the hybrid war in Ukraine, nation-state actors are launching increasingly sophisticated attacks. But is this the most prominent danger facing companies today? While nation-state-based attacks cannot be ignored, it looks like insider cyber incidents are far more common. In fact, for the…