Your organization has been hit by ransomware. Systems are down, operations are halted, and the attackers are demanding $2 million in cryptocurrency. Your insurance carrier is on the phone, your legal team is in the conference room, and the board wants answers. Should you pay?
This is one of the most consequential decisions an organization can face. There is no simple answer, but understanding the full picture, including the data, the legal landscape, and the long-term consequences, will help you make the best decision for your situation.
The Case Against Paying the Ransom
The FBI, CISA, and the overwhelming majority of cybersecurity experts advise against paying ransoms. Here is the data behind that recommendation.
No guarantee of recovery
Only 8% of organizations that pay recover 100% of their data. The average is 65% recovery — meaning you lose over a third of your data even after paying.
You become a repeat target
80% of organizations that pay are attacked again, often by the same group. Paying signals willingness and ability to pay.
Funds criminal enterprises
Every ransom payment funds the next attack. The ransomware economy is a $20+ billion industry fueled by victim payments.
Decryption is painfully slow
Even with a valid key, decryption can take weeks. Ransomware decryption tools are notoriously buggy. Many organizations find restoring from backups is faster.
Data may still be leaked
In double extortion scenarios, attackers may leak your data even after payment. There is no honor among criminals.
When Organizations Consider Paying
Despite the strong advice against paying, some organizations do pay. Understanding the circumstances that lead to this decision helps illuminate why prevention is so critical.
No viable backups exist
If backups are encrypted, corrupted, or nonexistent, the organization may face permanent data loss without paying. This is the #1 reason organizations pay.
Life-safety situations
Hospitals with encrypted patient monitoring systems or utility companies with locked critical infrastructure may feel they have no choice when lives are at stake.
Cost calculation favors payment
When the ransom is $200K but the estimated downtime cost is $5M, executives may view payment as the pragmatic business decision.
Insurance covers the payment
Some cyber insurance policies cover ransom payments, which can shift the cost calculation. However, insurers increasingly require evidence that alternatives were explored.
The common thread: Nearly every scenario that leads to ransom payment involves a backup failure. Organizations with tested, immutable, air-gapped backups almost never need to consider payment. This makes backup strategy your single most important ransomware defense.
Legal Implications of Paying
The legal landscape around ransom payments is complex and evolving. Organizations must consider multiple regulatory frameworks before making a payment decision.
OFAC Sanctions Risk
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has issued advisories warning that ransom payments to sanctioned entities or countries can result in civil penalties. This applies even if you use a third-party negotiator. Many prominent ransomware groups are linked to sanctioned nations.
Reporting Requirements
CIRCIA (Cyber Incident Reporting for Critical Infrastructure Act) requires critical infrastructure organizations to report ransom payments to CISA within 24 hours. Additional state and federal reporting requirements may apply depending on your industry and the data involved.
Fiduciary Duty Considerations
Board members and executives have fiduciary duties to shareholders. Both paying and not paying can expose leadership to liability claims. Documenting the decision-making process, including expert consultation, is essential regardless of the outcome.
Insurance Policy Requirements
Many cyber insurance policies require pre-authorization before ransom payment. Paying without insurer approval can void your coverage. Policies increasingly require evidence of reasonable security measures as a condition of coverage.
The Better Answer: Never Face the Decision
The best answer to the question "should you pay the ransom?" is to make the question irrelevant. With proper preparation, you can recover from ransomware without ever considering payment.
Key Takeaways
- The FBI and all major cybersecurity organizations advise against paying ransoms
- Only 8% of organizations that pay recover all their data — and 80% are attacked again
- OFAC sanctions can make ransom payments illegal, exposing your organization to civil penalties
- Nearly every ransom payment scenario traces back to a backup failure
- Prevention and preparation cost a fraction of what recovery costs after an attack
- Immutable backups are the single most important control for making ransom payments unnecessary
Related Articles
What to Do When Hit by Ransomware: Step-by-Step Response
The complete incident response playbook for when ransomware strikes. Every step from containment to recovery.
Read ArticleCyber Insurance for Ransomware: What Coverage Do You Need?
Navigate the complex world of cyber insurance. Learn what to look for, what is excluded, and how to reduce premiums.
Read Article