{"id":22701,"date":"2022-03-09T10:43:37","date_gmt":"2022-03-09T10:43:37","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=22701"},"modified":"2025-06-26T20:43:27","modified_gmt":"2025-06-26T20:43:27","slug":"ransomware-to-pay-or-not-to-pay","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/","title":{"rendered":"Ransomware: To Pay or Not to Pay"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/ransomware-attacks-a-complete-guide\/\">Ransomware<\/a> is a dangerous cyberthreat that has made waves in recent years. <\/span><a href=\"https:\/\/purplesec.us\/resources\/cybersecurity-statistics\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">According to PurpleSec<\/span><\/a><span style=\"font-weight: 400;\">, 121 ransomware incidents were reported in the first half of 2021\u2014a 64% increase compared to previous years. The report further stated that the <\/span><b>average ransomware payment<\/b><span style=\"font-weight: 400;\"> increased by 82% yearly to $570,000.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Knowing <\/span><span style=\"font-weight: 400;\">how to detect ransomware<\/span><span style=\"font-weight: 400;\"> is no longer optional, but vital for small and large businesses alike.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The malware locks confidential data, files, or systems that legitimate users can no longer access.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The damage is done, and the attacker now demands a ransom in exchange for restored access. At this point, the company\u2019s executives and stakeholders must decide whether or not to fulfill the demand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-ransomware-works\/\"><span style=\"font-weight: 400;\">how ransomware works<\/span><\/a><span style=\"font-weight: 400;\"> in short. So, <\/span><b>should companies pay ransomware <\/b><span style=\"font-weight: 400;\">attackers? Read on to find out the risks, ethics, and legalities surrounding this dilemma.\u00a0<\/span><\/p>\n<h2><b>The Risks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There are always risks, whether you pay the ransom or not. It\u2019s a tough and nuanced decision for organizations, so all aspects must be considered. Of course, the best way to avoid these risks is to know\u00a0<\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-prevent-ransomware-attacks\/\"><span style=\"font-weight: 400;\">how to prevent ransomware attacks<\/span><\/a><span style=\"font-weight: 400;\"> in the first place.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But that\u2019s not always a foolproof solution. It doesn\u2019t help much if your company\u2019s in the midst of an attack, either. Knowing <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/\"><span style=\"font-weight: 400;\">how to stop ransomware in action<\/span><\/a><span style=\"font-weight: 400;\"> can help mitigate the damage. When you\u2019re left with no option, though, you must weigh up the risks of paying the ransom or not.<\/span><\/p>\n<h3><b>When You Pay<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">First, you should know that paying the ransom doesn\u2019t necessarily mean your organization will get restored access to the encrypted data. Even if the attacker releases it, there\u2019s a chance you\u2019ll end up with corrupt files. Or, they might insert other malware for future attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A typical example was the ProLock ransomware strain in May 2020. <\/span><span style=\"font-weight: 400;\">Bleeping Computer reported<\/span><span style=\"font-weight: 400;\"> that the FBI discovered that ProLock decryptor is likely to corrupt files bigger than 64MB. It was also reported that victims were likely to suffer an integrity loss of about 1 byte per KB for files over 100KB.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What about the <\/span><b>ransomware payment statistics<\/b><span style=\"font-weight: 400;\">?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Well, in a recent Cybereason ebook titled <\/span><span style=\"font-weight: 400;\">Ransomware: The True Cost to Business<\/span><span style=\"font-weight: 400;\">, almost 46% of respondents who paid the ransom gained access to their data, but some (if not all) the data were corrupted. Also, 51% claimed they successfully recovered all their encrypted data after paying, while 3% claimed the attacker didn\u2019t restore access after paying.\u00a0<\/span><\/p>\n<h3><b>When You Don\u2019t Pay<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Making a <\/span><b>ransomware payment <\/b><span style=\"font-weight: 400;\">encourages attackers to keep launching ransomware attacks because they see it as a profitable venture. This is why the <\/span><a href=\"https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/ransomware#:~:text=The%20FBI%20does%20not%20support,this%20type%20of%20illegal%20activity.\"><span style=\"font-weight: 400;\">FBI<\/span><\/a><span style=\"font-weight: 400;\"> insists that you <\/span><b>do not pay ransomware<\/b><span style=\"font-weight: 400;\"> attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What happens if you <\/span><b>don\u2019t pay the ransomware <\/b><span style=\"font-weight: 400;\">demand, though? The next course of action lies in your hands. First, attackers can threaten to leak your confidential information to the public or sell it on the dark web. This can damage your reputation and ruin the trust relationship with your customers and business partners.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, if the encrypted data is critical to your operations, you might suffer a setback until access is restored. However, this can only happen if you have an updated backup recovery plan. In extreme cases, your operations can cease and your business may be ruined.<\/span><\/p>\n<h2><b>The Ethics<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There\u2019s no sure-fire method on <\/span><b>how to get rid of ransomware without paying<\/b><span style=\"font-weight: 400;\">. Besides the risks, you need to consider several ethical issues before deciding whether to pay the ransom or not.\u00a0<\/span><\/p>\n<h3><b>When You Pay<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One ethical issue, in particular, arises when you make a <\/span><b>ransomware payment. <\/b><span style=\"font-weight: 400;\">It encourages cybercriminals. Once they know your organization is willing to pay the <\/span><b>cyber ransom<\/b><span style=\"font-weight: 400;\">, future attacks can happen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The decision to pay might be to restore operations, like in the case of Colonial Pipeline CEO Joseph Blount. He paid a $4.4 million ransom for a decryption tool to restore oil operations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">He further mentioned that paralyzing effects on the country drove his decision. While this can be true in some circumstances, a <\/span><b>ransomware payment<\/b><span style=\"font-weight: 400;\"> may also prompt the attackers to blackmail victims and demand a second payment.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/most-firms-face-second-ransomware-attack-after-paying-off-first\/\"><span style=\"font-weight: 400;\">According to ZDNet<\/span><\/a><span style=\"font-weight: 400;\">, 80% of organizations that agree to pay the ransom suffer subsequent attacks, with 46% believing it originated from the same attacker.\u00a0<\/span><\/p>\n<h3><b>When You Don\u2019t Pay<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Before you decide not to pay a ransom, consider the consequences to yourself, your organization, or in the case of Colonial Pipeline, the entire country.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having a robust backup plan is critical when dealing with ransomware. Also, you can implement a zero-trust security approach where you assume your network is already compromised and then act accordingly.\u00a0<\/span><\/p>\n<h2><b>The Legality<\/b><\/h2>\n<p><b>Is it legal to pay ransomware<\/b><span style=\"font-weight: 400;\"> attackers? <\/span><b>Ransomware payment<\/b><span style=\"font-weight: 400;\">s may violate government regulations, risk customer privacy, breach commercial agreements, or have other legal implications.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using <\/span><b>ransomware payment services<\/b><span style=\"font-weight: 400;\"> may also be illegal. Let\u2019s look at the legal implications of paying vs. not paying.<\/span><\/p>\n<h3><b>When You Pay<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The FBI frowns upon paying ransoms because it doesn\u2019t guarantee deletion or access to stolen data. Organizations should also take note of the <\/span><a href=\"https:\/\/ofac.treasury.gov\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">recent advisory<\/span><\/a><span style=\"font-weight: 400;\"> from the United States Department of Treasury\u2019s Office of Foreign Assets Control (OFAC) before engaging with any criminal.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The OFAC claims that paying a ransom means funding cyber terrorism or strengthening attackers\u2019 financial prowess to attack other organizations or countries. Also, it\u2019s important to note that you can be prosecuted even if you\u2019re ignorant of your involvement in making a <\/span><b>ransomware payment<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As OFAC explains, they might impose civil penalties for sanction violations based on strict liability. This means a person or organization under US jurisdiction might be held civilly accountable even if ignorant or having no reason to know it was engaging with a person prohibited under OFAC\u2019s sanctions laws and regulations.\u00a0<\/span><\/p>\n<h3><b>When You Don\u2019t Pay<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Refusing to pay the ransom can result in production or delivery issues. This can cause the organization to breach commercial agreements, purchase or delivery orders, or other contractual obligations. In this case, customers or partners may decide to sue the company.\u00a0\u00a0<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When a ransomware attack locks critical data, individuals and organizations are often left to decide whether to pay the ransom or not. However, the reality is that ransomware attacks are always a possibility, so preparation is crucial.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While you can put measures in place to detect, prevent, and deal with ransomware attacks, you can still face the decision of paying vs. not paying the ransom. Carefully consider the risks, ethics, and legalities of both scenarios before deciding.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Besides ransomware, there are other attacks that organizations must be aware of. You can also check out our <\/span><a href=\"https:\/\/easydmarc.com\/blog\/ransomware-vs-malware-vs-phishing\/\"><span style=\"font-weight: 400;\">Ransomware vs. Malware vs. Phishing<\/span><\/a><span style=\"font-weight: 400;\"> article to find out more.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is a dangerous cyberthreat that has made &#8230;<\/p>\n","protected":false},"author":5,"featured_media":22702,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,294],"tags":[],"class_list":["post-22701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware: To Pay or Not to Pay | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Deciding on transferring the ransomware payment? Carefully consider the risks, ethics, and legalities of both scenarios. Read to learn more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: To Pay or Not to Pay\" \/>\n<meta property=\"og:description\" content=\"Deciding on transferring the ransomware payment? Carefully consider the risks, ethics, and legalities of both scenarios. Read to learn more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-09T10:43:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T20:43:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/Ransom_-To-Pay-or-Not-To-Pay.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"Ransomware: To Pay or Not to Pay\",\"datePublished\":\"2022-03-09T10:43:37+00:00\",\"dateModified\":\"2025-06-26T20:43:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/\"},\"wordCount\":1115,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Ransom_-To-Pay-or-Not-To-Pay.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Ransomware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/\",\"name\":\"Ransomware: To Pay or Not to Pay | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Ransom_-To-Pay-or-Not-To-Pay.jpg\",\"datePublished\":\"2022-03-09T10:43:37+00:00\",\"dateModified\":\"2025-06-26T20:43:27+00:00\",\"description\":\"Deciding on transferring the ransomware payment? Carefully consider the risks, ethics, and legalities of both scenarios. Read to learn more!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Ransom_-To-Pay-or-Not-To-Pay.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Ransom_-To-Pay-or-Not-To-Pay.jpg\",\"width\":1440,\"height\":910,\"caption\":\"Ransom To Pay or Not To Pay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/ransomware-to-pay-or-not-to-pay\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Ransomware\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/ransomware\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Ransomware: To Pay or Not to Pay\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware: To Pay or Not to Pay | EasyDMARC","description":"Deciding on transferring the ransomware payment? Carefully consider the risks, ethics, and legalities of both scenarios. Read to learn more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: To Pay or Not to Pay","og_description":"Deciding on transferring the ransomware payment? Carefully consider the risks, ethics, and legalities of both scenarios. Read to learn more!","og_url":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-03-09T10:43:37+00:00","article_modified_time":"2025-06-26T20:43:27+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/Ransom_-To-Pay-or-Not-To-Pay.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"Ransomware: To Pay or Not to Pay","datePublished":"2022-03-09T10:43:37+00:00","dateModified":"2025-06-26T20:43:27+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/"},"wordCount":1115,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/Ransom_-To-Pay-or-Not-To-Pay.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/","url":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/","name":"Ransomware: To Pay or Not to Pay | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/Ransom_-To-Pay-or-Not-To-Pay.jpg","datePublished":"2022-03-09T10:43:37+00:00","dateModified":"2025-06-26T20:43:27+00:00","description":"Deciding on transferring the ransomware payment? Carefully consider the risks, ethics, and legalities of both scenarios. Read to learn more!","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/Ransom_-To-Pay-or-Not-To-Pay.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/Ransom_-To-Pay-or-Not-To-Pay.jpg","width":1440,"height":910,"caption":"Ransom To Pay or Not To Pay"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/ransomware-to-pay-or-not-to-pay\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Ransomware","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/ransomware\/"},{"@type":"ListItem","position":6,"name":"Ransomware: To Pay or Not to Pay"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/03\/Ransom_-To-Pay-or-Not-To-Pay.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/22701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=22701"}],"version-history":[{"count":4,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/22701\/revisions"}],"predecessor-version":[{"id":48939,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/22701\/revisions\/48939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/22702"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=22701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=22701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=22701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}