Skip to main content

Hackers are now favoring ransomware over personal data theft

IBM’s latest X-Force Threat Intelligence Index report reveals that more than 2.9 billion records were leaked through publicly disclosed incidents in 2017. While that sounds horribly bad, there’s a bright side to this stormy disclosure: the number is 25 percent lower than the amount of records leaked in 2016. Why? Because hackers are shifting over to ransomware. They’re becoming more focused on holding files hostage for money than on unleashing all that data to the dark markets. 

According to IBM, this shift to ransomware cost corporations more than $8 billion globally during 2017, a number derived from downtime, ransom payments, and other impacts on day-to-day business. The global logistics and transportation industries alone lost “millions of dollars” in revenue during 2017 due to ransomware attacks. 

Ransomware is a type of malware that infiltrates a network and encrypts files on connected PCs. These files become unrecoverable, and require a “key” generated by the hacker to be released from captivity. These keys are provided after a payment using cryptocurrency, adding to the overall cost corporations incur due to downtime. Hiring a third party to recover the files may or may not work, depending on the level of encryption. 

“With the potentially irreversible encryption lock of crypto-ransomware, victims without up-to-date backups often choose to pay the ransom their attackers demand,” the report states. “Losing one’s files on personal devices may cost a few hundred dollars, but that effect extends much further for organizations where infected users could cause the company to lose massive amounts of data, and possibly to have to pay the criminals considerable sums of money to get it back.” 

The report reveals that many organizations keep cryptocurrency on hand so they can resolve the problem quickly and reduce costly downtime. Law enforcement agencies discourage payments to hackers, but the rising ransomware “epidemic” is getting to the point where it may potentially cost corporations across the globe more than $11.5 billion annually by 2019, according to research by Cybersecurity Ventures. Malware, by contrast, values leaked personal data over the potential financial gain of locking sensitive data on corporate networks. 

In addition to ransomware, the report covers network attack trends, inadvertent insider incidents, insider-inflicted breaches, cybercrime, and cryptocurrency. One of the more alarming entries is the section about misconfigured cloud servers, which resulted in the exposure of more than two billion records in 2017, a whopping 424-percent increase over 2016. The problem actually dates back to 2015, as researchers found they could access the data on these cloud servers without the need for a username or password. 

In 2017 alone, 19 incidents regarding misconfigured cloud storage breached 345,850,453 records, equaling 2.2TB worth of data. Meanwhile, misconfigured cloud databases enabled 11 incidents exposing 566,402,270 records equaling 1.2TB worth of data. Misconfigured rsync, NAS, and backup solutions caused five incidents exposing 393,434,309 records equaling to 1TB of data. 

Financial services saw the largest issues in 2017 for the second year in a row. They experienced the highest volume of security incidents while falling in third place regarding actual cyberattacks. Information and communications technology industries experienced the highest number of attacks and the second-largest in security incidents. Manufacturing fell to third place in both attacks and incidents, followed by professional services. 

Editors' Recommendations

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
How to delete your Gmail account (and what you need to know)
The top corner of Gmail on a laptop screen.

Is it time to part ways with your Gmail account? Whether you’re moving onto greener email pastures, or you want to start fresh with a new Gmail address, deleting your old Gmail account is something anyone can do. Of course, we’re not just going to bid you farewell without a guide all our own. If you need to delete your Gmail account, we hope these step-by-step instructions will make the process even easier.

Read more
How to alphabetize data in an Excel spreadsheet
A Microsoft Excel icon in the dock on a Macbook.

Manually organizing data in Microsoft Excel is a real pain. That's why we don't recommend doing it. One simple task, learning how to alphabetize in Excel, is not necessarily as intuitive as we would like. Here's how to get things sorted in a logical, alphabetical order.

Read more
How to build a table of contents in Microsoft Word
Microsoft word document.

Navigating through a Microsoft Word document can be a tedious task for some. Assignments and contracts can lead to many pages that can be hard to keep track of. One solution Microsoft offers for this is a table of contents. In addition to providing an outline and general overview of the content, the feature gives the document a more professional look.

Here’s a guide on how to create a table of contents in Microsoft Word.

Read more