Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    The Average Ransom Demand of $5.3M in 2021 is Up 518% From Last Year

    Average Ransom Demand

    Cybercriminals appear to be more aggressive with their idealistic ransom demands as some gangs continue to evolve, using new “quadruple extortion” tactics to ensure payment.

    In security vendor Palo Alto Network’s recent Unit 42 Ransomware Threat Report, 1H 2021 Update, we get a taste of some data points that spell future trouble for organizations hit with ransomware. According to the Update:

    • Last year’s average demand was $847,000. Today it’s $5.3 Million
    • The highest demand seen by Unit 42 consultants was $50 Million
    • Not only is the ransom demand up, but the average ransomware payments have climbed 82% since 2020 to a record $570,000 in the first half of 2021
    • The largest disclosed ransom payment was $11 Million by meat producer JBS

    To make matters worse, in addition to the use of threatening to contact customers, business partners, employees and media as the third form of extortion, Unit 42 is now seeing a fourth mode – adding a Denial of Service (DoS) attack against the victim’s websites – now counting as a quadruple extortion.

    The ransomware gangs are getting laser focused on how to turn up the pressure on victim organizations. And it’s evident that if you choose to take your chances, it’s likely going to cost you a lot to pay your way out.

    The less expensive and more effective alternative is to minimize the human attack surface found in phishing attacks through the use of Security wareness Training to educate users on how to avoid becoming a victim of phishing, spear phishing, and social engineering attacks. By teaching them to spot suspicious and/or malicious content, they can eliminate any interaction that would enable a threat actor from continuing their attack.


    Free Ransomware Simulator Tool

    Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    RansIm-Monitor3

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 21 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top