Menu

Filter by
content
PONT Data&Privacy

0

Ransomware in SMEs: Cybercriminals raise ransom on cyber insurance

Cybercriminals are becoming increasingly sophisticated in selecting their victims and determining the amount of the ransom. For example, they are targeting companies in high-paying industries and demanding more ransom if a company is insured.

Digital Trust Centre April 14, 2025

News press release

News press release

This is evident from the doctoral research by Tom Meurs, cybercrime specialist with the police, after he examined more than 500 ransomware incidents between 2019 and 2023 among SMEs. 

Criminals scavenge for cyber insurance and backups

One of the most striking conclusions from the study is that companies with cyber insurance pay an average of 2.8 times more in ransom than those without insurance. Cybercriminals deliberately try to find out if a company is insured. Tom explains, "Once they have gained access to a system, they actively look for documents with names like 'insurance' or 'policy.' This additional information gives cybercriminals a better bargaining position, leading to higher ransom payments."

The study also shows that companies with a well-established backup system are 27 times less likely to pay ransom in cyber attacks. "Cybercriminals who are in a victim's network deliberately look for backups, and delete them," says Tom. "So just having backups is not enough to recover your files. It is important to have backups that cannot be modified by unauthorized people on your network. Offline backups are the simplest solution for that, but I've also seen cloud solutions come along."

Trade, construction and ICT most often affected

Trade companies, including retail and wholesale, are the most frequent victims of ransomware (32.6% of attacks), with an average ransom amount of €112,793. The construction sector follows with 17.9% of cases, and the ICT sector is less frequently affected (14.7%), but does have the highest ransom payments with an average of €268,039. 

According to Meurs, cybercriminals take a targeted approach: "I often read in instant messages that cybercriminals send to each other, or on illegal marketplaces where login credentials are sold, that companies from high-paying sectors are specifically sought."

Companies must take their own measures

The government, including the Digital Trust Center (DTC), advises ransomware victims not to pay a ransom. Paying does not guarantee that data will be returned or remain unchanged. In addition, it increases the likelihood of repeated extortion and encourages cybercrime. Police are seeing ransomware being used directly to buy login credentials from (new) victims. 

Meurs' research shows that companies often have no choice but to pay a ransom: "In roughly 5 out of 100 cases in which payment is made, victims do have the option of recovering in a way other than paying, but choose to pay anyway - for example, to recover faster or avoid reputational damage. In the remaining 95 cases, there is no other option to recover. In those cases, their entire IT infrastructure is broken and unrecoverable, making paying a ransom the only option to avoid bankruptcy."

Police interventions play an important role in combating ransomware, but no single approach proves sufficient on its own. Above all, companies must take measures themselves to drastically reduce the chances of a successful attack.

Are you prepared for a cyber attack?

More on the study

Share article

Comments

Leave a comment

You must be logged in to post a comment.