faceless hooded hacker showing silence gesture. Hacker attack. Dangerous Hooded Hacker Breaks into Government Data Servers. Cybersecurity, computer hacker with hoodie. Hacking and malware concept.
Share and Follow
While cyber attacks on huge telcos, airlines and superannuation funds grab the headlines, small and medium-sized business owners are increasingly being seen as easy targets.
In an alarming new study of the Australians whose devices have been slowed or seized by hackers, experts warned paying up to protect business reputations could be throwing away money for nothing and even earning a place on “sucker lists” for repeated targeting.

A recent analysis from the 2023 Australian Cybercrime Survey reveals a troubling rise in ransomware attacks. Nearly 5% of respondents reported receiving a ransom demand on their devices over the past year, a significant increase from 2.1% just two years ago.

faceless hooded hacker showing silence gesture. Hacker attack. Dangerous Hooded Hacker Breaks into Government Data Servers. Cybersecurity, computer hacker with hoodie. Hacking and malware concept.
While cyber attacks on huge telcos, airlines and superannuation funds grab the headlines, small and medium-sized business owners are increasingly being seen as easy targets. (Getty Images/iStockphoto)

The survey also highlights that individuals who have been targeted once are often targeted again, especially if they comply with the extortionists’ demands. This pattern is particularly evident among small to medium enterprise (SME) owners.

SME owners appear more susceptible to repeated attacks, with many having previously paid ransoms. Experts emphasize the importance of strong communication to discourage these payments, which can lead to further victimization.

While some cybercriminals use ransomware to target large corporations in what’s known as “big game hunting,” the survey authors point out that most attacks are directed at SMEs, underscoring their vulnerability in the digital landscape.

While some scammers use ransomware – malicious software that encrypts or blocks access to files until a user has paid a ransom – to go “big game hunting” for large companies, the authors noted the majority went after SMEs.

Those in the multibillion-dollar global industry considered them “lucrative targets” due to generally having less sophisticated cybersecurity but enough revenue, data and access to other potential victims to be worthwhile.

Voce and Morgan found that among the 331 victims studied, the amount of money demanded was often relatively small, a mean of about $12,000 for business owners and $7000 for others. The median figure was much lower, less than $500 for almost 60 per cent of victims.

Cameron alleges a hacker was dispersing money out of his account in real time.
The researchers stressed how important it was to push out stronger messaging of the government’s advice to never pay a ransom (A Current Affair)

But the researchers stressed how important it was to push out stronger messaging of the government’s advice to never pay a ransom, particularly in light of the “sucker lists” cybercriminals reportedly share among themselves featuring individuals and organisations who have made previous payments.

“Importantly, over 40 per cent of SME owners had paid in response to one of these previous ransom messages, a significantly higher proportion than among other victims,” the report found.

“SME owners were also more likely to have paid following the most recent ransomware incident. 

“This fuels the ransomware business model and can make SME owners appear to be easy to scare and manipulate, increasing their chances of repeat victimisation.”

Business owners (22.6 per cent) were much more likely to have paid the ransom than non-owners (7.6 per cent) but the researchers warned payment was no “guarantee that files and systems will be restored and data will not be sold or shared”.

Scarily, a quarter of ransomware reports to the Australian Cyber Security Centre involved “double extortion”, where victims were also pushed for money to stop their information leaking. 

The report called for better education about how to spot and avoid suspicious links, respond to third-party data breaches and manage personal devices or working from home, as well as help to help victims remove the malware.

But they warned that was not enough, saying “there must also be technological solutions that can help protect business owners”.

Share and Follow
You May Also Like

NT Appeals Fatal Hit-and-Run Sentence Citing ‘Repugnant’ Text Messages as Key Evidence

The Northern Territory Court of Criminal Appeal has reserved its decision on…
Wright, pictured at an earlier court date, is set to be sentenced in the Supreme Court in Darwin

Reality TV Scandal: Star Faces Jail Time for Obstructing Crash Investigation

Reality TV personality Matt Wright has been sentenced to 10 months in…

Eurovision Sensation Nemo Returns Trophy in Protest Against Israel’s 2026 Participation

Swiss singer Nemo, who won the Eurovision Song Contest 2024 in Malmö,…
Someone clutching a handful of $50 and $100 notes.

Unexpected Factors Driving Australians to Financial Ruin: A Closer Look at the Bankruptcy Surge

Strata bodies are forcing Australians into bankruptcy almost as much as the…

Thai Prime Minister Plans Parliament Dissolution Amid Ongoing Cambodia Border Tensions

Key Points Thai Prime Minister Anutin Charnvirakul has requested to dissolve parliament…
British backpacker jailed for e-scooter crash that killed Perth dad

British Backpacker Sentenced for E-Scooter Incident Leading to Tragic Death of Perth Father

An English backpacker has been sentenced to four years in prison after…

South Australia Allocates $674 Million to Address Domestic Violence Following Investigation

The South Australian government has accepted 129 of 136 recommendations “in full,…
Molly Ticehurst and Daniel Billings.

Fate Awaits: Man Pleads Guilty in Molly Ticehurst Case

The family of Molly Ticehurst will finally have the opportunity to confront…