{"id":46006,"date":"2022-03-31T21:09:53","date_gmt":"2022-03-31T21:09:53","guid":{"rendered":"https:\/\/www.darkreading.com\/attacks-breaches\/ransomware-should-companies-ever-pay-up-"},"modified":"2022-03-31T21:09:53","modified_gmt":"2022-03-31T21:09:53","slug":"ransomware-should-companies-ever-pay-up","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/","title":{"rendered":"Ransomware: Should Companies Ever Pay Up?"},"content":{"rendered":"<p>In a world increasingly rocked by cyber threats, ransomware is one of the most prolific. Stories about the Colonial Pipeline attack and strikes against JBS have earned massive news coverage. No business is &#8220;too small,&#8221; thanks to a rise in cyberattack automation.<\/p>\n<p>What happens, then, when ransomware strikes your business? Do you pay up quickly to control the damage, or is it possible to fully recover on your own? And does paying a ransom <em>really <\/em>solve the problem?<strong><br \/><\/strong><\/p>\n<p><strong>Anticipate Attacks and Prepare Accordingly<br \/><\/strong>We posed these questions and more to a panel of experts in cybersecurity and managed services delivery at the <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/acronis.events\/summit2021\/singapore\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q2-darkreading-sp-gobig-ransomware_payup\">Acronis #CyberFit Summit in Singapore<\/a>.<\/p>\n<p>The panel was unanimous: While no organization can become immune to cyberattacks, a proactive defense strategy is crucial. <\/p>\n<p>&#8220;With the proper [backup and disaster recovery] systems in place, most businesses \u2026 are able to get back to work,&#8221; says Kenny Tay, General Manager at Cloudable Solutions, a Singapore-based provider of managed IT services. &#8220;But for businesses who have not planned for these events \u2026 they may not have the tools to get their data back, and they may have to negotiate with the cybercriminals.&#8221;<strong><br \/><\/strong><\/p>\n<p><strong>Evolving Threats Create New Challenges<\/strong><br \/>As data backup and disaster recovery becomes commonplace, cybercriminals are shifting their tactics. Modern ransomware often attempts to disable security software and delete or encrypt backups, rendering victims unable to recover. Even if you can &#8220;get back to work,&#8221; it&#8217;s not always the end of the problem.<\/p>\n<p>Double extortion tactics, in which ransomware operators steal data from infected systems before encryption, have become widespread. Cybercriminals threaten to publicly release this data \u2014 which often contains sensitive information, like customer profiles or trade secrets \u2014 if their ransom demands are not met. Naturally, this adds considerable pressure on victims to pay up.<\/p>\n<p><strong>Is Paying a Ransom Ever the Right Move?<br \/><\/strong>With the business itself at risk, an underprepared victim may see little choice but to negotiate for the restoration of their data and systems. But this is an expensive prospect that comes with no guarantees.<\/p>\n<p>&#8220;From a law enforcement perspective, we would not recommend you pay,&#8221; says Jacqueline de Lange, Interpol Head of Africa Cybercrime Operations Desk. &#8220;If you make a ransomware payment \u2026 you are involved in a criminal activity. You could be funding organized crime syndicates \u2014 it could be a terrorism organized crime group \u2014 and [you risk running afoul of] anti-money laundering legislation.&#8221; <\/p>\n<p>The ransom resolution process can be painfully slow. After last year&#8217;s attack, Colonial Pipeline&#8217;s owners paid $5 million in ransom, yet the decryptor they received was so slow that they ended up relying on their own backups.<\/p>\n<p>The US Department of the Treasury advises organizations to focus their resources on defensive and resilience measures, noting that paying a ransom only emboldens attackers and may introduce legal risks to the victim. Conversely, any actionable measures you&#8217;ve taken to <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.acronis.com\/en-us\/blog\/posts\/transitioning-reactive-proactive-evolution-disaster-recovery\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q2-darkreading-sp-gobig-ransomware_payup\">proactively reduce your risk posture<\/a> can be seen as &#8220;mitigating factors&#8221; that limit your liability for the leak of sensitive data resulting from a ransomware attack.<\/p>\n<p><strong>Prepare Now for Ransomware<\/strong><br \/>&#8220;Whenever an organization faces this kind of event, it&#8217;s a bit of a wake-up call,&#8221; says Bryce Boland, Head of Security, ASEAN, at Amazon Web Services. &#8220;A lot of what happens next comes down to how you&#8217;ve prepared.&#8221;<\/p>\n<p>The panel agrees that the first steps in any <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.acronis.com\/en-us\/solutions\/business\/ransomware-protection\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q2-darkreading-sp-gobig-ransomware_payup\">ransomware<\/a><br \/>\nincident plan should always be to <strong>contact law enforcement<\/strong> and <strong>convene your legal and security teams <\/strong>for a risk assessment and forensic investigation. In many jurisdictions, reporting data breach events (including ransomware strikes) to the local authorities is a legal obligation.<\/p>\n<p>If you&#8217;ve established comprehensive data backup and disaster recovery capabilities \u2014 and put them to the test \u2014 you could be in a strong position to restore business operations without paying up. But that doesn&#8217;t mean the threat is over.<\/p>\n<p>&#8220;One of the key things you need to understand is <em>how did the attacker get in? \u2014 <\/em>and <em>what did they do? <\/em>\u2014 because you might only be seeing the tip of the iceberg,&#8221; says Boland. &#8220;But what else have they done? They might have left backdoors, they may have left additional malware in place, they may have stolen all of your credentials \u2026 having an understanding of all of the things that have happened is part of any response to a breach.&#8221;<\/p>\n<p>Ultimately, the best defense is a proactive approach to security. It&#8217;s critical to act in anticipation of ever-growing attacks and adopt solutions that support <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/www.acronis.com\/en-us\/products\/cyber-protect\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q2-darkreading-sp-gobig-ransomware_payup\">complete cyber protection<\/a>. A solid cyber resilience plan enables organizations to respond quickly and keep any business continuity interruptions to a minimum, while a cyber-insurance policy can help to offset costs associated with recovery, forensics, and legal defense.<\/p>\n<p>For more insights and advice from today&#8217;s industry leaders, discover more <a rel=\"nofollow sponsored noopener\" target=\"_blank\" href=\"https:\/\/acronis.events\/summit2021\/?utm_source=darkreading&amp;utm_medium=referral&amp;utm_campaign=fy22-q2-darkreading-sp-gobig-ransomware_payup\">on-demand sessions from the 2021 Acronis #CyberFit Summit World Tour<\/a>.<\/p>\n<p><strong>About the Author<\/strong><\/p>\n<p>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" data-image=\"3j5hac8c42h6\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" data-sys-asset-uid=\"blt0bf6225e0c57c7c3\" alt=\"Candid_150x125_(002).jpg\">\n<\/picture><\/p>\n<p>Candid W\u00fcest is the VP of Cyber Protection Research at Acronis, where he researches new threat trends and comprehensive protection methods. Previously, he worked for more than 16 years as the tech lead for Symantec&#8217;s global security response team. W\u00fcest is a frequent speaker at security-related conferences, including RSAC and AREA41, and is an adviser for the Swiss federal government on cyber-risks. He holds a master&#8217;s in computer science from ETH Zurich and various certifications and patents.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/ransomware-should-companies-ever-pay-up-\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is a major threat, and no business is &#8220;too small to target.&#8221; So what should you do after an attack? Is negotiating with criminals ever the answer?Read More <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/ransomware-should-companies-ever-pay-up-\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-46006","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: Should Companies Ever Pay Up? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: Should Companies Ever Pay Up? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-31T21:09:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ransomware: Should Companies Ever Pay Up?\",\"datePublished\":\"2022-03-31T21:09:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/\"},\"wordCount\":892,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0bf6225e0c57c7c3\\\/62461acc1be9642985b7379c\\\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/\",\"name\":\"Ransomware: Should Companies Ever Pay Up? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0bf6225e0c57c7c3\\\/62461acc1be9642985b7379c\\\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"datePublished\":\"2022-03-31T21:09:53+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0bf6225e0c57c7c3\\\/62461acc1be9642985b7379c\\\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt0bf6225e0c57c7c3\\\/62461acc1be9642985b7379c\\\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-should-companies-ever-pay-up\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: Should Companies Ever Pay Up?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: Should Companies Ever Pay Up? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: Should Companies Ever Pay Up? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-03-31T21:09:53+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ransomware: Should Companies Ever Pay Up?","datePublished":"2022-03-31T21:09:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/"},"wordCount":892,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/","url":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/","name":"Ransomware: Should Companies Ever Pay Up? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","datePublished":"2022-03-31T21:09:53+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt0bf6225e0c57c7c3\/62461acc1be9642985b7379c\/Candid_150x125_(002).jpg?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-should-companies-ever-pay-up\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware: Should Companies Ever Pay Up?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46006"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46006\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}