Type to search

Case Study Editorials

Why People Are Paying Hackers for Deleted Data

Share
Why People Are Paying Hackers for Deleted Data

Paying hackers to delete stolen or exfiltrated data sounds counterintuitive — and risky — yet it’s become a recurring reality for companies, hospitals, and even governments. These payments range from negotiated “data deletion” fees to traditional ransom payments for restoration. Understanding why victims sometimes pay, the real risks involved, and what alternatives exist is essential for security and compliance teams, execs, and anyone who cares about digital safety.

This article explains the mechanics, offers real-life examples, examines why paying is controversial and often ineffective, and gives an expert-backed checklist organizations can use instead.

Quick answer: Why do victims pay?

Organizations often pay because they face one or more of these pressures at once: imminent reputational damage, risk to customers’ safety (especially in healthcare), interrupted operations, legal obligations, and the perception that paying is the fastest way to stop a leak or recover systems. But paying is not a guaranteed fix — evidence shows it often funds criminals and sometimes fails to produce the promised deletion. krebsonsecurity.com+1

How this scam/market works — a short primer

  1. Data exfiltration: Attackers steal files (customer records, intellectual property, logs).
  2. Extortion/Leak threat: Attackers publish a sample, threaten release, or put the data up for auction.
  3. Demand & negotiation: The threat actor sets a price — often negotiable — to delete data, not publish it, or to provide decryption keys.
  4. Payment & proof: After payment, attackers may provide “proof of deletion” (screenshots, videos) but proof can be faked and deletion cannot be independently verified. krebsonsecurity.com+1

Real-life examples (what actually happened)

  • AT&T (call record theft) — AT&T reportedly paid a hacker group roughly $370,000 in bitcoin after call-record metadata was stolen; the attacker supplied a video claiming data deletion, but uncertainty remained about whether copies had spread. This case shows both why companies pay (to limit exposure) and why such payments don’t ensure safety. WIRED
  • SimonMed (medical records extortion) — In a 2025 incident, attackers demanded $1M to delete stolen medical files or billed daily fees to delay publication; later removals from leak sites raised questions about whether a payment occurred. Healthcare targets pay out of concern for patient privacy and regulatory fallout. Fox News
  • Large healthcare and insurer incidents — Allegations and forum posts have claimed multi-million dollar payments in high-profile healthcare and insurance breaches (e.g., claims about payments following compromises). Public confirmation is often limited; nonetheless, the market pressure remains. Reuters+1

These cases illustrate both the motivation to pay and the ambiguous outcomes that often follow.

Why paying is a precarious choice — expert findings

Argument for PayingWhat the evidence says
Faster mitigationMay reduce immediate publication risk but is not guaranteed; attackers can publish despite payments. krebsonsecurity.com
Operational continuityPaying can occasionally restore access (ransomware decryption), but many victims do not fully recover even after payment. Forbes
Protect customersShort-term privacy risk may drop, but copies and backups may already have circulated. krebsonsecurity.com
Legal/PR pressurePaying can reduce immediate headlines, but regulators and insurers may frown on payments and it funds criminals. Axios+1

Bottom line: payment is a gamble with moral, legal, and practical downsides. Studies and incident reports repeatedly show payments often fail to produce lasting protection and sustain the criminal business model. krebsonsecurity.com+1

Why some organizations still decide to pay

  • Perceived cost-benefit: Leaders sometimes conclude the cost of paying is lower than the expected cost of public disclosure, regulatory fines, remediation, and lost business.
  • Pressure: Boards, PR teams, or regulators may press for the fastest visible remediation.
  • Lack of preparedness: Organizations without tested incident response plans see payment as the only immediate option.
  • Negotiation success stories: Reports show some victims negotiate reduced amounts — and sometimes get what they want — which reinforces the behavior. Axios

The lie of “proof of deletion” and why trust is fragile

Threat actors often provide digital “proof” (screenshots, videos, hashes) that claim deletion. These can be fabricated, staged, or only show deletion in one place while other copies exist. Even if a specific storage account is cleared, the data may already be mirrored, sold, or archived elsewhere. Forensic confirmation is difficult and rarely absolute. krebsonsecurity.com+1

  • Funding criminal activity: Payments finance future attacks and can be illegal if they violate sanctions or anti-money-laundering laws.
  • Regulatory scrutiny: Governments are increasingly discouraging or restricting ransom payments (e.g., UK policy moves), and mandatory reporting regimes can complicate payment. The Guardian
  • Insurance implications: Insurers may impose conditions, require notification, or refuse coverage if policies are violated.
  • Civil liability: Paying without informing affected individuals or regulators could expose an organization to lawsuits. The HIPAA Journal

Alternatives and the right response: a practical incident-response checklist

  1. Activate your IR plan immediately — Playbooks and tabletop exercises save time and bad decisions.
  2. Isolate and contain — Stop ongoing exfiltration and preserve forensic evidence.
  3. Engage legal counsel and regulators — Know your reporting obligations (data-protection authorities, sector regulators).
  4. Contact law enforcement — Report the breach to national/international cybercrime units.
  5. Bring in specialized CSIRTs / DFIR teams — Use trusted forensic providers to assess scope and validate attacker claims.
  6. Communicate transparently — Prepare public and stakeholder messaging to reduce reputational damage.
  7. Consider negotiation only with oversight — If negotiating, involve counsel, threat intelligence partners, and ensure compliance with sanctions laws.
  8. Strengthen defenses post-incident — Patch, rotate credentials, enable MFA everywhere, and improve backups.
  9. Plan for long-term remediation — Notify affected parties, offer identity protection where appropriate, and document decisions for regulators.

This path emphasizes resilience and oversight over ad-hoc payments.

Table: When paying might be considered — and when it definitely shouldn’t

SituationConsider Paying?Why / Risks
Operational downtime threatens patient safety (healthcare)Possibly, but only as last resort with regulator/law-enforcement inputImmediacy vs legality; must involve authorities. Fox News
Limited exposure, data already publicNoPayment unlikely to remove all copies. krebsonsecurity.com
Large-scale data exfiltration with regulatory obligationsNo (seek counsel)Paying could worsen legal standing and attract fines. The HIPAA Journal
Encrypted systems, no exfiltration (classic ransomware)Case-by-case — better mitigations existBackups + forensics often superior to paying. Forbes

FAQs (search-optimized; answer succinctly)

Q1 — Does paying guarantee deletion?
No. Proof can be faked and copies may already exist. Payments are a high-risk gamble. krebsonsecurity.com

Q2 — Are companies legally allowed to pay hackers?
Sometimes, but not always. Governments are moving to restrict payments to deter crime and ensure compliance with sanctions. Always consult legal counsel and law enforcement before paying. The Guardian

Q3 — What should I do if my organization’s data is stolen?
Activate your incident response, engage forensic experts, notify regulators as required, and avoid unilateral decisions to pay without counsel and law enforcement input. (See checklist above.)

Q4 — Do cyber insurers cover ransom or deletion payments?
Coverage varies by policy. Many insurers require notification and may impose conditions. Review your policy and notify your insurer immediately. Axios

Q5 — Will paying stop future attacks?
No — paying funds attackers and may encourage repeat targeting. The structural solution is stronger security, backups, and deterrence through law enforcement and policy. securelist.com

key takeaways

  • Incident reports repeatedly show payments don’t guarantee safety — organizations must prepare, not improvise. krebsonsecurity.com+1
  • Forensics, legal review, and coordinated incident response materially reduce harm compared with ad hoc payments. CISA+1
  • Governments and major security vendors advise against routine ransom payments; public policy is trending toward limiting payments. The Guardian+1
  • Transparency with stakeholders and documented decisions are critical. Paying secretly can worsen trust and legal exposure. The HIPAA Journal

Conclusion

Paying hackers to “delete” stolen data is a dangerous, imperfect response to a much larger problem: weak preparedness. While payment can look like a quick fix under pressure, evidence shows it often fails to deliver and rewards criminal ecosystems. The better strategy is layered defenses, well-rehearsed incident response, legal and law-enforcement involvement, and policies that reduce the appeal of paying criminals.

If you’re responsible for security at an organization: build the IR playbook, test it, back up systems securely, and make payment a last, legally-reviewed resort — not a reflex.

Tags:
ikeh James

Ikeh Ifeanyichukwu James is a Certified Data Protection Officer (CDPO) accredited by the Institute of Information Management (IIM) in collaboration with the Nigeria Data Protection Commission (NDPC). With years of experience supporting organizations in data protection compliance, privacy risk management, and NDPA implementation, he is committed to advancing responsible data governance and building digital trust in Africa and beyond. In addition to his privacy and compliance expertise, James is a Certified IT Expert, Data Analyst, and Web Developer, with proven skills in programming, digital marketing, and cybersecurity awareness. He has a background in Statistics (Yabatech) and has earned multiple certifications in Python, PHP, SEO, Digital Marketing, and Information Security from recognized local and international institutions. James has been recognized for his contributions to technology and data protection, including the Best Employee Award at DKIPPI (2021) and the Outstanding Student Award at GIZ/LSETF Skills & Mentorship Training (2019). At Privacy Needle, he leverages his diverse expertise to break down complex data privacy and cybersecurity issues into clear, actionable insights for businesses, professionals, and individuals navigating today’s digital world.

  • 1

You Might also Like

Leave a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.