Ransom payments put organisations at risk from criminal prosecution and civil penalties as the average cost of a ransomware breach touches £300k in the CNI sector.
Three-in-ten UK-based critical national infrastructure (CNI) organisations (30%) that have fallen victim to a ransomware attack have risked legal repercussions by paying a ransom.
The findings are in our new research, surveying 521 staff responsible for cyber security at UK CNI organisations in sectors such as civil aviation, telecommunications, energy, transport, media, financial services and water supply.
60% of organisations surveyed have experienced at least one ransomware attack over the previous 12 months. More than a third (35%) suffered up to five ransomware attacks, but a small percentage of organisations (2%) experienced more than a hundred attacks.
In certain situations, for example, when an organisation has no ability to recover from a successful attack, there may be no choice other than to pay the ransom. However, payment can risk infringing UK and US laws that prohibit dealings with sanctioned individuals or entities. In the UK, for example, payments could be in breach of the Sanctions and Anti-money Laundering Act 2018. Ransom payments could also incur financial penalties from the Office of Financial Sanctions Implementation. At present, prosecutions are uncommon, however the UK and US governments have floated the idea of implementing a payment ban.
The research findings expose the multiple consequences of a ransomware attack on UK CNI. More than a quarter of respondents, for example, cited a psychological impact on employees (27%). Disruption, (42%), downtime (40%) and data-loss (39%) are all repercussions that respondents say their organisations have suffered, along with reputational damage (35%).
But, almost a third of organisations (32%) are also facing increased insurance premiums, and 34% have also incurred financial losses from legal fees or fines. The average cost of a ransomware attack on UK CNI organisations is now £295,230, the research reveals.
Impacts are exacerbated by the length of time it takes organisations to respond to ransomware attacks, with the average now being 11.4 hours. Without a proactive strategy to address this significant challenge of response-delays, more organisations risk paying a ransom.
Almost nine-in-ten (87%) UK respondents in the research agree that attacks are more sophisticated, with ransomware-as-a-service (RaaS) deployed with greater knowledge and cunning. Threats are on the rise through increasing professionalisation in the ransomware world and the entry of organised crime groups from other areas of criminality.
“If you fall victim to a ransomware attack, paying the ransom should always be your last resort. Aside from the risk that cyber criminals may not restore access upon payment, there are also potential legal consequences to consider,” said Anthony Young, CEO at Bridewell. “That being said, there are certain situations where organisations have no choice other than to pay. If the organisation has no ability to recover, then paying the ransom may represent the only viable option to resume operations other than rebuilding their systems from scratch. However, this difficult choice is avoidable by having a security strategy to reduce the risk of threat actors gaining access and transversing through your systems without discovery and effective removal. Building a relationship with a trusted security partner who understands your environment and the complex challenges faced by critical infrastructure can help you mitigate this risk by having the right expertise, resources, and support if the worst was to happen.”