The traditional form of cyber-insurance for non-ransomware attack contracts in India does not apply to ransomware attacks. Here's a look at how the cyber-insurance products are evolving
There is a fast-growing market for cyber-insurance in India, if not the fastest-growing market within the Indian insurance industry. The amount of yearly cyber insurance coverage companies in India usually buy today (as of 2023) ranges from $1 million (small companies) to $200 million (large IT service providers), and it is growing at a CAGR of 35 percent for the past three years. To shield against the adverse impacts of client moral hazard and imperfect information on their organisational cyber-posture, the usual form of cyber-insurance contracts accompanies short policy periods, relatively low policy limits, and dynamic repricing. However, these cyber-insurance market practices are increasingly being called into question with the advent and rapid rise of cyber-extortion-based ransomware attacks on the Indian IT/OT industry (that are getting increasingly sophisticated over time).
According to annual studies by Trend Micro and Palo Alto Networks, India experienced about 11 percent of the total of around 14,983,271 global ransomware threats in 2022, making it the second most ransomware-targeted country in Asia. In this article, we identify three major but different ransomware attack types that are sourced from ransomware-as-a-service (RaaS) markets (a primary source of launching ransomware attacks) in India. For these attack types, we provide insights into how and why cyber-insurance products are evolving the way they are to manage the cyber risk arising from the former. The main takeaway is that the traditional form of cyber-insurance for non-ransomware attack contracts in India does not apply to ransomware attacks. Moreover, ransomware-targeted cyber-insurance solutions do not serve its primary vision of helping improve organisation cyber-security governance—only help in cyber-loss mitigation. This starkly contrasts traditional cyber-insurance products that act as a control solution to improve organisational cyber-security governance and mitigate cyber losses.
The first type of ransomware attack involves criminal software coders offloading (the main characteristic of the RaaS business) the "breaking and entering" part of the victim cyber-extortion process to third parties who share the eventual ransom proceeds with the coders (e.g., as was in the case of the Telangana and AP power utility, the BSNL, and SpiceJet ransomware attacks). The coders do not grasp third-party execution quality control, where the third parties might not even have the technical knowledge at times to help victims restore their systems post-ransom payment. As a result, the cost to the victim of restoring systems is often far higher than the ransom itself. The Indian cyber-insurance market response to such cyber-attacks is extreme hardening, with very few cyber-insurers willing to sell ransomware coverage products with stringent security conditionality, i.e., hardly promoting security as governance—in contrast, only promoting cyber-loss mitigation in their product advertising. Such Cyber-insurance products primarily connect victim clients to effective ransomware resolution services. As a result, victims often pay the ransom as part of the cyber-insurance contract policies as the low-cost option instead of only resorting to extremely costly ransomware resolution services without insurance. The outcome is a cyber-insurance market focused on cyber-loss mitigation rather than cyber-security governance.
The second type of ransomware attack evolved because of the weaknesses of the first type. In other words, ransomware criminals are
[This article has been published with permission from IIM Calcutta. www.iimcal.ac.in Views expressed are personal.]