Tuesday, February 11, 2025
Homecyber securityRansomware Payments Plunge 35% as More Victims Refuse to Pay

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

Published on

SIEM as a Service

Follow Us on Google News

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35% in 2024, falling from $1.25 billion in 2023 to $813.55 million, according to a report by blockchain analytics firm Chainalysis.

This marked the first substantial decline in ransomware payments since 2022, despite a record number of ransomware attacks during the year.

The decrease highlights the growing resilience of victims and the impact of intensified law enforcement actions.

Evolving Tactics Amid Disruptions

The decline in payments is attributed to several factors, including improved cyber hygiene among organizations and international crackdowns on major ransomware groups.

Notable operations included the takedown of LockBit by U.S. and U.K. authorities, which led to a 79% drop in payments to the group during the second half of 2024.

Similarly, BlackCat’s exit from the ransomware ecosystem disrupted its operations, leaving smaller groups and lone actors to dominate the space.

These newer players have targeted smaller markets with lower ransom demands, further reducing overall payouts.

Despite these disruptions, ransomware actors have adapted their strategies.

New strains emerged from rebranded or leaked code, and negotiations with victims often began within hours of data exfiltration.

However, improved organizational defenses allowed many victims to resist demands, opting for recovery through backups or decryption tools rather than paying ransoms.

Victims Increasingly Resist Ransom Demands

Chainanalysis report revealed that only 30% of victims who entered negotiations with attackers ultimately paid a ransom in 2024.

This reflects a growing distrust in hackers’ promises to delete stolen data upon payment and an increased reliance on alternative recovery methods.

Incident response data showed that final payments were often significantly lower than initial demands, with many organizations refusing to pay altogether.

Organizations are now better prepared to recover from attacks without succumbing to extortion.

For example, restoring data from recent backups has proven faster and more cost-effective than paying ransoms.

The drop in ransomware payments underscores the importance of collaborative efforts between law enforcement agencies and private-sector cybersecurity experts.

Crackdowns on laundering mechanisms, such as crypto mixers, have further limited attackers’ ability to cash out their illicit gains.

However, experts caution that ransomware remains a persistent threat as attackers continue to evolve their tactics.

While the decline in payments is encouraging, the record number of attacks in 2024 serves as a reminder that organizations must remain vigilant.

Proactive measures such as robust cybersecurity protocols, employee training, and collaboration with law enforcement will be essential to sustaining progress against ransomware threats.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

FinStealer Malware Targets Leading Indian Bank’s Mobile Users, Stealing Login Credentials

A new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through...

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices

Innovative tools are continually appearing to enhance the capabilities of professionals and enthusiasts alike.One...

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

A newly discovered phishing campaign targeting Facebook users has been identified by researchers at...

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures

Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

FinStealer Malware Targets Leading Indian Bank’s Mobile Users, Stealing Login Credentials

A new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through...

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices

Innovative tools are continually appearing to enhance the capabilities of professionals and enthusiasts alike.One...

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

A newly discovered phishing campaign targeting Facebook users has been identified by researchers at...