Being seen as dependable is sweet for ‘enterprise’ and ransomware teams care about ‘model fame’ simply as a lot as their victims
11 Dec 2025
•
,
4 min. learn

Black Hat Europe 2025 opened with a presentation by Max Smeets of Digital Rotes titled ‘Contained in the Ransomware Machine’. The discuss centered on the LockBit ransomware-as-a-service (RaaS) gang and Max’s analysis into their practices and operations. At their peak, between 2022-2024, the group had 194 associates, of which 110 had managed to get a cyberattack to the purpose of negotiation, with 80 of the associates succeeding in getting paid by the ransomware group. (As a reminder, the enterprise mannequin of ransomware is layered: ‘affiliate’ refers back to the workforce that researches the sufferer’s networks and identifies and exfiltrates the delicate knowledge to a ransomware gang, equivalent to LockBit.)
Fame is all the things
A key message delivered by Max was concerning fame, each of the sufferer and the ransomware group. The sufferer firm must uphold their fame with their prospects and any trace of an information breach can considerably injury it. Curiously, the analysis confirmed that media protection is bigger for the businesses that pay as opposed to those who don’t pay the extortion demand and face longer disruption. The presenter’s view is that the information story turns into in regards to the fee and doubtlessly offers the indication the sufferer firm has misplaced management and wanted to pay, producing mistrust and injury to their model.
As somebody who has been near the topic for a number of years, I disagree with this view, at the least in some instances. From a purely monetary perspective, paying the demand may very well be the more cost effective resolution, and there are lots of examples the place the ultimate prices of a cyber-incident for people who don’t pay are a number of instances greater than people who do pay – simply assume again to the assaults on Caesers Palace and MGM. Corporations have a duty to shareholders and in some instances the only and quickest methodology to recuperate the enterprise and turn out to be totally operational could also be to pay the ransomware extortion demand.
In the meantime, restoration of methods could be complicated, new {hardware} must be acquired, and backups must be restored and analyzed to make sure they’re clear. The ransomware decryption key unlocking the enterprise in hours quite than days can decrease enterprise disruption and lack of income. Then additionally issue within the affect of an insurance coverage underwriter, who too will wish to decrease their prices and take the trail that minimizes any declare that could be made by the sufferer firm.
In fact, each quick and long-term downsides are simply as apparent. The fee might purchase time and lower the invoice – till it does not. For starters, there isn’t any assure that the decryption key will truly unlock the information. As well as, the victims that comply with ransom calls for could also be seen by attackers as price concentrating on once more and, finally, they could additionally inadvertently validate and reinforce ransomware as a viable ‘enterprise mannequin’.
The ransomware operators are additionally involved about fame – they must be seen as reliable and to be recognized for upholding their finish of any deal. When big quantities of delicate knowledge is exfiltrated and held to ransom, in addition to inside methods encrypted and purchased to a standstill, any negotiation to unlock methods and make sure the safety of the information must be from a belief standpoint.
If the negotiator has heard unfavourable critiques on the ransomware group not offering decryptors or holding onto knowledge, they could advise the sufferer to not pay. It’s vital that when handing over the extortion fee the ransomware group delivers precisely as anticipated, offering the service they’re being paid for in an expert method. The actual problem for any ransomware group is just not that of community entry or the exfiltration of knowledge however quite whether or not the sufferer trusts them sufficient to pay the extortion demand.
Curiously, the operations by regulation enforcement to take down LockBit in 2024 additionally included a marketing campaign to destroy belief within the gang, publicly stating that the gang goes not delete exfiltrated knowledge however maintain on to it. This mistrust marketing campaign could possibly be sufficient for associates to take their alternatives and enterprise to a different group.
What units the worth
My takeaway from the presentation was not one thing the presenter acknowledged outright – it’s in regards to the knowledge and reconnaissance the affiliate conducts in regards to the firm. There was a quick point out of the analysis and transferring round an organization community in search of delicate knowledge, together with monetary knowledge that will point out willingness to pay or an quantity that will be acceptable.
This brought on a lightbulb second: essentially the most beneficial doc to a cybercriminal could possibly be the schedule detailing the corporate’s cyber insurance coverage protection. Understanding whether or not the corporate has insurance coverage that features paying an extortion demand and what the extent of protection is gives the cybercriminal the data on the place to set the extortion demand, in order that the chance turns into a monetary concern not for the corporate, however for the insurer.
The takeaway is that the cyber insurance coverage coverage and all communication concerning the coverage ought to be segmented with extra safety, or utterly air-gapped from the corporate community.
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the newest breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s developments in the present day: learn extra, subscribe to our e-newsletter, and turn out to be a part of the NextTech neighborhood at NextTech-news.com

