skip to Main Content
Should we pay ransomware?

Should We Pay the Ransomware Ransome?

To pay or not to pay the ransomware ransom: Should we pay to unlock our data, or is there an alternative?

The decision as to whether or not we should pay ransomware demands isn’t an easy one, and ransomware attacks present organizations with one of the most challenging dilemmas and cybersecurity issues today. Not just financial but ethical and potentially a long-term PR choice. When hit with a ransomware attack, organizations must decide whether to pay the ransom to get their data back or to refuse and try to recover the data through other means. This decision is far from simple and involves legal, ethical, and practical consideration, and the facts are worrying:

  • 59% of organizations were hit with a ransomware attack in the last 12 months.
  • 70% of these attacks result in data encryption.
  • There has been a five-fold increase in ransom bills in the last 12 months.
  • 32% of these attacks began with an unpatched vulnerability.

Legal Considerations When Asking If We Should Pay Ransomware

Despite being an obvious response to a criminal act, paying a ransom isn’t technically illegal under many jurisdictions. The forced encryption of someone’s data and the subsequent demand for payment, however, is a federal crime under laws like the Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA).

One argument states that making it illegal for organizations to pay ransoms could deter criminals, as their primary motivation is financial gain. However, implementing such a law would be complex and controversial, given the inferences for organizations under duress, especially when critical operations or sensitive data are at risk.

It is, one might say, “a gray area.”

Ransomware Payment Ethical Considerations

The ethics of paying ransomware demands are a subject of intense debate, and the dilemma of how to handle a ransomware attack is fraught with dependencies. On one side, there are scenarios where paying the ransom could be considered necessary and justified—such as when lives are at risk, critical services need to be restored quickly, or severe harm must be avoided. This pragmatic view supports the idea that the immediate benefits of paying a ransom outweigh the costs.

However, this practical approach to dealing with ransomware payments is often at odds with broader ethical considerations. For example, paying a ransom effectively funds criminal activities, providing financial incentives for criminals to continue their illegal operations. This not only sustains their current activities but also encourages them and others to initiate future attacks, perpetuating a cycle of crime. Moreover, the money received can be used to harm others indirectly, further complicating the ethical landscape.

From an ethical standpoint, negotiating with criminals is fraught with moral risks. By paying a ransom, organizations may inadvertently establish a precedent, signaling to other potential attackers that ransom demands are effective. This could lead to an increase in ransomware attacks, as criminals learn that such tactics are profitable. In this context, the decision to pay a ransom is not just about resolving a single crisis but also about considering the long-term implications of contributing to a broader pattern of criminal behavior.

Practical Implications of Paying for Our Data

From a practical perspective, deciding whether to pay a ransom in response to a ransomware attack is filled with risks and uncertainties. One significant risk is that paying the ransom does not guarantee the recovery of encrypted data. There have been numerous instances where organizations have met the demands of attackers, only to discover that the decryption keys provided were ineffective, or in some cases, no decryption keys were provided at all. This not only results in financial loss but also leaves the organization no closer to regaining access to its critical data.

Furthermore, acquiescing to ransom demands can have reputational consequences. When an organization chooses to pay, it may inadvertently signal to other potential attackers that it is susceptible to such threats. This perception could make the organization a repeated target for ransomware or other types of cyber-attacks. Criminals are likely to target entities that have previously paid ransoms, believing these organizations are more likely to pay again to resolve future disruptions quickly. This cycle can lead to further security breaches and demands, compounding the original problem and undermining the organization’s long-term security and financial stability.

Consequences of Not Paying Ransomware

Opting not to pay a ransom in response to a ransomware attack places an organization in a challenging situation, as it risks losing access to critical data and disrupting operational capabilities. However, this decision can also serve as a catalyst for strengthening the organization’s cybersecurity measures and enhancing its resilience against future attacks.

By refusing to pay the ransom, organizations are motivated to explore and implement alternative recovery strategies. This includes seeking out and using decryption tools, which may already be available for certain types of ransomware. These tools, often developed by cybersecurity experts and made available through collaborative initiatives, can sometimes unlock encrypted data without the need to negotiate with cybercriminals.

Additionally, not paying the ransom underscores the importance of having robust backups and comprehensive disaster recovery plans. This approach emphasizes the need for organizations to prepare in advance for potential cyber threats, ensuring that they can restore their operations quickly and efficiently after an attack, without yielding to the demands of attackers. Ultimately, while refusing to pay a ransom can initially seem daunting due to the immediate risks, it encourages a proactive stance on cybersecurity, potentially reducing vulnerabilities and mitigating the impacts of future incidents.

Beyond the Immediate Crisis: Preventive Measures

An alternative to paying the ransom and suffering the consequences of an attack is investing in preemptive measures, which, considering recent enterprise payments and losses (excluding ransoms), reached an average of $2.73m, an increase of almost $1m since 2023, offers significant cybersecurity ROI. While for some reading this this may be “after the horse has bolted,” organizations can preemptively adopt advanced cybersecurity solutions that focus on behavior-based detection and response. These systems monitor networks and systems for unusual activities with machine learning cybersecurity that could indicate a breach, exercising ransomware containment to prevent spread and flag possible issues before they can be executed. This preemptive approach not only protects against ransomware but also against a wide range of threats.

Moreover, organizations should focus on training and educating their employees about cybersecurity best practices. Human error is often the weakest link in security; therefore, improving awareness and vigilance among all staff members is crucial.

The Big Question

The decision to pay or not to pay a ransomware demand is complex and context-dependent. Legal, ethical, and practical factors all play crucial roles in shaping this decision. While paying the ransom might seem like a quick solution to a pressing problem, it carries significant risks and may encourage future criminal activities. Investing in robust cybersecurity measures, promoting a culture of security awareness, and having effective backup and disaster recovery plans are critical for reducing the likelihood of a successful ransomware attack and mitigating its impacts should one occur.

Share This


Related posts

Back To Top
TrueFort Emblem Logo

Truefort customer support

TrueFort customers receive 24×7 support by phone and email, and all software maintenance, releases, and updates

For questions about our support policy, please contact your TrueFort account manager or our presales team at

Support Hotline

Email Support