Home Security Ransomware: Claim that 22% SMBs shutting shop after attacks

Ransomware: Claim that 22% SMBs shutting shop after attacks

Ransomware: Claim that 22% SMBs shutting shop after attacks Featured

Ransomware attacks caused 22% of small and medium-sized businesses in seven countries, including Australia, to pack up for good, a report from the security firm Malwarebytes claims.

It found that about a third of the businesses surveyed had experienced a ransomware attack in the last year. Concern over ransomware varied from a low of 57.7% in Australia to a high of 78.9% in France, with the US second at 74.2%.

Ransomware attacks mainly Windows computers. Attacks have increased in frequency over the last two years, with major global attacks taking place in May and June.

Malwarebyte's "Second Annual State of Ransomware Report" covered 1054 companies with less than 1000 employees in North America, France, the UK, Germany, Australia and Singapore and was conducted by Osterman Research.

The company's chief executive Marcin Kleczynski said: “Businesses of all sizes are increasingly at risk for ransomware attacks. However, the stakes of a single attack for a small business are far different from the stakes of a single attack for a large enterprise." 

Kleczynski said the research findings indicated that SMBs were suffering to the point where they had to shut shop.

"To make matters worse, most of them lack the confidence in their ability to stop an attack, despite significant investments in defensive technologies," he said. "To be effective, the security community must thoroughly understand the battles that these companies are facing, so we can better protect them.”

Major findings:

  • Ransomware can devastate SMBs. In about one in six affected firms, a ransomware infection caused 25 or more hours of downtime, with some reporting downtime of more than 100 hours. While 22% ceased business operations immediately, another 15% lost money.
  • Even though most SMBs (75%) placed a high priority on tackling ransomware attacks, they lacked confidence that they could deal with such incidents. 
  • Many did not know where the ransomware had come from and thus infections spread swiftly. About 27% were unable to identify how endpoint(s) were infected and in a third of the cases the ransomware spread to other devices. In 2% of cases, every single device in the organisation was infected.
  • SMBs in the US were hit harder by malicious emails containing ransomware than their counterparts in Europe. Email was the most common attack vector in the US - 37% came from a malicious attachment and 27% from a malicious link in an email.
  • In Europe, 22% of infections came from malicious email attachments and a similar percentage were attacked through malicious links in emails.
  • Most SMBs did not believe in paying ransoms, with 72% saying such demands should be ignored. Of the remainder, most said the ransom said be paid only if the data that had been encrypted was irreplaceable. A third of those who did not pay up lost data as a result.
  • Concern about ransomware was highest (54%) among the financial services sector, while transportation business entities (26%) were least concerned.
  • More than a third of SMBs claimed to have been running anti-ransomware software, yet about a third still experienced attacks.

The US specific part of the survey can be downloaded here.


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips



Ransomware attacks on businesses and institutions are now the most common type of malware breach, accounting for 39% of all IT security incidents, and they are still growing.

Criminal ransomware revenues are projected to reach $11.5B by 2019.

With a few simple policies and procedures, plus some cutting-edge endpoint countermeasures, you can effectively protect your business from the ransomware menace.


Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.


Popular News