Generally, no. Paying funds criminal enterprises, doesn't guarantee recovery, marks you as someone who pays, and may have legal implications. But this is a business decision that depends on your specific situation. Get expert advice before deciding.
Quick answer: Generally, no. Paying funds criminal enterprises, doesn't guarantee recovery, marks you as someone who pays, and may have legal implications. But this is a business decision that depends on your specific situation. Get expert advice before deciding.
Why You Shouldn't Pay
It doesn't guarantee recovery
Payment statistics vary, but:
- Many organisations pay and still don't get working decryption keys
- Some get keys that don't work properly
- Some get keys and then get re-encrypted
- Recovery using provided tools is often slow and incomplete
It funds criminal enterprises
Your payment funds:
- More ransomware development
- More attacks on other organisations
- Organised crime infrastructure
- Potentially sanctioned entities
It marks you as a payer
Criminal organisations share intelligence. Paying once:
- Marks you as willing and able to pay
- Makes you a target for future attacks
- May result in higher demands next time
Legal implications
Sanctions risk: Some ransomware groups are connected to sanctioned entities. Paying may violate sanctions laws.
Regulatory implications: Some jurisdictions restrict ransom payments. This is evolving and may tighten.
Insurance complications: Policies vary on payment coverage and may require specific processes.
It doesn't address root cause
The attackers got in somehow. Paying for decryption doesn't:
- Remove the vulnerability they exploited
- Guarantee they're not still in your network
- Prevent them from attacking again
- Address data theft that often accompanies encryption
When Organisations Consider Paying
Despite the above, some organisations pay. Situations include:
Life safety: Healthcare organisations where patient care is at risk.
Business survival: Where extended downtime means going out of business.
No viable alternative: Truly no backups, no recovery path, catastrophic impact.
These situations shouldn't exist with proper preparation.
The Decision Framework
If you're considering payment:
1. Assess recovery alternatives
- What's your backup status?
- Can you rebuild without paying?
- How long would recovery take?
- What's the business impact of that timeline?
2. Understand what you're paying for
- Are they threatening data publication? (Paying doesn't guarantee deletion)
- Is it just encryption? (Focus on recovery)
- Have they exfiltrated data? (Payment doesn't un-steal data)
3. Consider sanctions exposure
- Which group is it?
- Are they connected to sanctioned entities?
- Get legal advice before any payment
4. Involve appropriate parties
- Legal counsel
- Cyber insurance (if you have it)
- Incident response specialists
- Law enforcement (they recommend against payment but provide intelligence)
5. Negotiate if you do pay
- Initial demands are often negotiable
- Proof of decryption capability (test on sample files)
- Professional negotiators can help
- Don't pay full amount upfront
What You Should Do Instead
Before an attack
Make payment unnecessary:
- Immutable, tested backups
- Incident response plan
- Business continuity planning
- Cyber insurance
During an attack
Focus on:
- Containment (stop spread)
- Investigation (how did they get in?)
- Recovery (can you restore from backups?)
- Evidence preservation
- Legal and regulatory obligations
After recovery
Regardless of payment:
- Root cause analysis
- Close the vulnerability
- Assume they're still inside until proven otherwise
- Improve defences
- Document lessons learned
Our Position
We advise against payment. We focus on:
- Prevention: Controls that stop ransomware
- Resilience: Backups and recovery capability that make payment unnecessary
- Response: Expert help if the worst happens
---
about prevention and recovery.
---
