{"id":19667,"date":"2021-10-20T20:03:17","date_gmt":"2021-10-20T20:03:17","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19667"},"modified":"2021-10-20T20:43:59","modified_gmt":"2021-10-20T20:43:59","slug":"83-percent-of-ransomware-victims-pay-ransom","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/","title":{"rendered":"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom"},"content":{"rendered":"<p>The bulk of companies hit by <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> are deciding that paying the ransom is the best and fastest way to get their businesses back online, despite growing <a href=\"https:\/\/www.esecurityplanet.com\/threats\/white-house-congress-target-ransomware-payments\/\">pressure from the federal government<\/a> and some in industry to not give into the cybercriminals&#8217; demands.<\/p>\n<p>A <a href=\"https:\/\/thycotic.com\/resources\/ransomware-survey-and-report-2021\/\">report<\/a> this week by researchers at ThycoticCentrify \u2013 the result of the merger earlier this year between <a href=\"https:\/\/www.esecurityplanet.com\/products\/privileged-access-management-pam-software\/\">privileged access management (PAM)<\/a> vendors Thycotic and Centrify \u2013 found that 64 percent of the 300 U.S.-based IT decision makers surveyed were attacked with ransomware in the previous 12 months, and that 83 percent paid the ransom to restore their data.<\/p>\n<p>The study is the latest in a string of similar reports that found ransomware to be the top cybersecurity threat to businesses, and that the rapid evolution of the underground industry will likely make it an even more significant danger in the coming years.<\/p>\n<p>The authors of the report noted that the United States has seen an almost 200 percent increase in attacks in the past two years and that the cost to recover the data from the bad actors averages more than $100,000, 10 times what it was a year ago. They also wrote that cybercriminals are increasingly sophisticated and that the ransom demands are growing.<\/p>\n<h2>Ransomware-as-a-Service Grows in Importance<\/h2>\n<p>It\u2019s also becoming easier for cybercriminals to launch ransomware attacks, regardless of their skill level. The amount of money to be made in the attacks is rising and the cost of the tools to do so is dropping. Ransomware developers are selling their expertise and tools by offering them in <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware-as-a-service (RaaS)<\/a> scenarios and the industry could evolve further, becoming a subscription model where organizations pay ransomware actors not to target them.<\/p>\n<p>\u201cAs the odds for experiencing a ransomware attack grow, it\u2019s not a matter of if an attack will happen, but when it will happen,\u201d they wrote. \u201cThis means that while you are trying to prevent becoming a victim of ransomware, you must also be prepared to respond to attacks with a proven incident response plan that you test regularly.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-19672 size-full\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/10\/Thycotic-ransomware-e1634760095461.png\" alt=\"ransomware data\" width=\"900\" height=\"516\" \/><\/p>\n<p>Read more: <a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/p>\n<h2>Government Responds to the Threat<\/h2>\n<p>In the wake of attacks earlier this year on such companies as energy supplier <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\">Colonial Pipeline<\/a>, global meat processor JBS and managed services provider <a href=\"https:\/\/www.esecurityplanet.com\/threats\/kaseya-breach-underscores-vulnerability-of-it-management-tools\/\">Kaseya<\/a> \u2013 all of which caused ripples throughout the economy \u2013 the Biden Administration has been <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/white-house-says-take-ransomware-threat-seriously\/\">moving on multiple fronts<\/a> to address the threat of ransomware, including <a href=\"https:\/\/www.esecurityplanet.com\/threats\/tech-giants-pledge-big-money-to-cybersecurity\/\">working with tech companies<\/a>, issuing guidelines and investigating attackers and tracking them through their payment methods.<\/p>\n<p>In addition, the government also is trying to deter companies from paying the ransoms, arguing that doing so encourages and finances more attacks. The government also wants organizations to be more forthcoming when they\u2019ve been attacked and when they\u2019ve paid a ransom.<\/p>\n<p>There also is no guarantee that the data can be recovered even if a ransom is paid, according to Jigar Shah, vice president at multicloud security provider Valtix.<\/p>\n<p>\u201cOften, paying the ransom does not even let you recover, as the attacker just vanishes and does not help free locked resources,\u201d Shah told <em>eSecurity Planet<\/em>. \u201cAt this point, the major costs are on how to recover and rebuild. Forward-thinking organizations are investing in building non-fragile infrastructure using infrastructure-as-code. If you plan ahead and start your public cloud journey the right way, then you can build your infrastructure and apps such that they can be re-deployed in minutes if such an incident happens. And you can bake security right into this process.\u201d<\/p>\n<p>Even in a week when <a href=\"https:\/\/www.documentcloud.org\/documents\/21085090-joint-statement-international-counter-ransomware-initiative\">30 countries banded together<\/a> to fight ransomware and the <a href=\"https:\/\/www.commerce.gov\/news\/press-releases\/2021\/10\/commerce-tightens-export-controls-items-used-surveillance-private\">U.S. banned the sale of hacking tools<\/a> to China and Russia and took steps to <a href=\"https:\/\/home.treasury.gov\/news\/press-releases\/jy0410\">curb cryptocurrency ransomware payments<\/a>, ransomware attacks have continued to occur, with one knocking <a href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/912752\/000119312521300540\/d245680dex991.htm\">Sinclair Broadcast Group TV channels<\/a> offline.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">Best Backup Solutions for Ransomware Protection<\/a><\/p>\n<h2>A Focus on Prevention<\/h2>\n<p>That focus on prevention and developing a <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-to-recover-from-a-ransomware-attack\/\">ransomware incident response plan<\/a> is being echoed by the ThycoticCentrify researchers as well as others in the cybersecurity field. Rita Gurevich, founder and CEO of cybersecurity firm Sphere, told <em>eSecurity Planet<\/em> that recent federal government and corporate efforts have shifted the narrative around ransomware from response to prevention, including by ensuring backups are in place, improving training for users and deploying an effective access governance model.<\/p>\n<p>In addition, IT and security professionals need to ensure that their skills have adapted to the increasingly sophisticated modern ransomware attacks.<\/p>\n<p>\u201cWe have seen some success in tracking the methods of payments to the attackers,\u201d Gurevich said. \u201cThis is an interesting development as cryptocurrency has always had the reputation of complete anonymity. \u2018Follow the money\u2019 has always been an investigative technique of law enforcement, and as ransomware attacks increase, the demand for proficiency in <a href=\"https:\/\/www.esecurityplanet.com\/applications\/cybersecurity-blockchain-applications\/\">blockchain<\/a> and cryptocurrency should continue to increase as well.\u201d<\/p>\n<h2>Dwell Time a Threat Factor<\/h2>\n<p>The ThycoticCentrify researchers noted that dwell time \u2013 the time from when the bad actors get into the network to when they launch an attack and the attack is detected \u2013 is becoming a major part of the threat equation. In earlier attacks, cybercriminals would target a single computer or a limited network and the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> downloaded when a user clicked on a malicious link would encrypt the computer or server. Backups could usually be used to restore the data.<\/p>\n<p>&#8220;Today, attackers focus on compromising user credentials and passwords to gain an entry point from which they can exploit our vast connected networks,&#8221; they wrote. &#8220;Once inside the network, undetected, the cybercriminals seek to elevate credential privileges, traverse the network, locate sensitive data, and plan how to exfiltrate and encrypt the data. This dwell time &#8230; enables attackers to understand the network, find and exfiltrate critical data. They will then leave crypto-locking malware on your systems to launch when they are ready. Typically, once an attacker gains access to domain administrator privileges, it is usually only a matter of hours before the ransomware is deployed and business comes to a halt.&#8221;<\/p>\n<figure id=\"attachment_19669\" aria-describedby=\"caption-attachment-19669\" style=\"width: 900px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19669\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png\" alt=\"ransomware dwell time\" width=\"900\" height=\"554\" \/><figcaption id=\"caption-attachment-19669\" class=\"wp-caption-text\">Ransomware dwell time (source: ThycoticCentrify)<\/figcaption><\/figure>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-ransomware-uses-encryption-and-evolves\/\">How Ransomware Uses Encryption \u2013 And Evolves<\/a><\/p>\n<h2>Paying the Ransom<\/h2>\n<p>Once ransomware has locked up a company&#8217;s data, they see paying the ransom as the best option for restoring the data and avoiding damage to their operations or reputations.<\/p>\n<p>Cybercriminals who have used ransomware attacks to steal or access data and hold it hostage while demanding money and threatening to leak the data are increasingly targeting specific companies that, if their operations go down, will cause disruption not only to their services but also society in general. Bad actors understand that in such situations, many times entities will pay to get up and running again, according to Timur Kovalev, CTO at network security vendor Untangle.<\/p>\n<p>\u201cIn addition, ransomware attacks are increasing because companies are paying the ransom,\u201d Kovalev told <em>eSecurity Planet<\/em>. \u201cLook at organizations such as JBS and Colonial Pipeline, who paid a $4.4 million ransom, although a good portion was returned [recovered by the FBI]. Cybercriminals see the large payouts and it encourages them to strike more often and at larger, more lucrative targets.\u201d<\/p>\n<h2>Organizations Respond to Ransomware Threat<\/h2>\n<p>Companies are responding, according to ThycoticCentify. About 72 percent of those surveyed said cybersecurity budgets have increased due to ransomware threats and 93 percent are allocating special budgets specifically to fight those threats.<\/p>\n<p>\u201cOur research shows ransomware is a threat to organizations of all sizes and levels of sophistication,\u201d ThycoticCentrify CEO Art Gilliland said in a statement. \u201cThe first line of defense should be solutions that secure privileged access, including <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication<\/a> (MFA) and other methods of enforcing <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">Zero Trust<\/a>, to keep would-be cyber criminals contained and limit the damage they can inflict.\u201d<\/p>\n<p>Jim Dolce, CEO of cybersecurity vendor Lookout, told <em>eSecurity Planet<\/em> that it\u2019s increasingly important for organizations to understand the rapidly evolving nature of ransomware and the bad actors behind the attacks.<\/p>\n<p>\u201cTraditional security measures cannot keep up with the advanced modern tactics used in these attacks,\u201d Dolce said. \u201cThreat actors are always trying to think a step ahead and their tactics are constantly evolving.\u00a0Security teams need to modernize their security posture by proactively implementing practices and tools across all corporate endpoints to mitigate the risk of these attacks before they can even get started.\u201d<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/application-security-key-ransomware\/\">Application Security is Key to Stopping Ransomware, Vendor Says<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d704b3af9b9-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d704b3af9b9\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d704b3af9b9\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d704b3af9b9\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d704b3af9b9\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d704b3af9b9\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d704b3af9b9\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The bulk of companies hit by ransomware are deciding that paying the ransom is the best and fastest way to get their businesses back online, despite growing pressure from the federal government and some in industry to not give into the cybercriminals&#8217; demands. A report this week by researchers at ThycoticCentrify \u2013 the result of [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":19669,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15,16],"tags":[2478],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31790],"class_list":["post-19667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","category-trends","tag-ransomware","b2b_audience-awareness-and-consideration","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Governments have stepped up cyber defense efforts, but ransomware attacks keep happening - and victims keep paying.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Governments have stepped up cyber defense efforts, but ransomware attacks keep happening - and victims keep paying.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-20T20:03:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-20T20:43:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"554\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom\",\"datePublished\":\"2021-10-20T20:03:17+00:00\",\"dateModified\":\"2021-10-20T20:43:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/\"},\"wordCount\":1389,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png\",\"keywords\":[\"ransomware\"],\"articleSection\":[\"Threats\",\"Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/\",\"name\":\"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png\",\"datePublished\":\"2021-10-20T20:03:17+00:00\",\"dateModified\":\"2021-10-20T20:43:59+00:00\",\"description\":\"Governments have stepped up cyber defense efforts, but ransomware attacks keep happening - and victims keep paying.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png\",\"width\":900,\"height\":554,\"caption\":\"Ransomware dwell time (source: ThycoticCentrify)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom | eSecurity Planet","description":"Governments have stepped up cyber defense efforts, but ransomware attacks keep happening - and victims keep paying.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/","og_locale":"en_US","og_type":"article","og_title":"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom | eSecurity Planet","og_description":"Governments have stepped up cyber defense efforts, but ransomware attacks keep happening - and victims keep paying.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/","og_site_name":"eSecurity Planet","article_published_time":"2021-10-20T20:03:17+00:00","article_modified_time":"2021-10-20T20:43:59+00:00","og_image":[{"width":900,"height":554,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png","type":"image\/png"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom","datePublished":"2021-10-20T20:03:17+00:00","dateModified":"2021-10-20T20:43:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/"},"wordCount":1389,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png","keywords":["ransomware"],"articleSection":["Threats","Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/","url":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/","name":"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png","datePublished":"2021-10-20T20:03:17+00:00","dateModified":"2021-10-20T20:43:59+00:00","description":"Governments have stepped up cyber defense efforts, but ransomware attacks keep happening - and victims keep paying.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/Thycotic-dwell-time-e1634759750841.png","width":900,"height":554,"caption":"Ransomware dwell time (source: ThycoticCentrify)"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/83-percent-of-ransomware-victims-pay-ransom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"ThycoticCentrify Ransomware Report: 83 Percent of Victims Paying Ransom"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19667"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19667"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19669"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19667"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19667"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19667"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}