Based on analysis of real ransomware negotiation chats, these are the key rules that hackers and RaaS affiliates need to follow to maximize their chances of getting victims to pay the ransom.
- Only negotiate with authorized representatives who have decision-making power
- Verify the person's authority to make financial decisions for the company
- Make it clear that unauthorized personnel can cause harm to the negotiation process
- Maintain a professional tone while applying pressure
- Provide clear instructions on how to proceed
- Be responsive to victim inquiries within reasonable timeframes
- Provide samples of stolen data early in the negotiation
- Show file trees or lists of compromised data
- Select specific files requested by the victim as proof
- Decrypt test files to show the encryption can be reversed
- Provide clear instructions for submitting test files
- Return decrypted test files quickly to build trust
- Start with a high initial demand to allow room for negotiation
- Base pricing on victim's apparent financial capacity when possible
- Justify pricing with the value of stolen data and potential exposure costs
- Show willingness to provide discounts when victims demonstrate financial hardship
- Make counteroffers that are significantly lower than the initial demand but still profitable
- Avoid rigid "take it or leave it" approaches unless confident in the victim's ability to pay
- Set clear deadlines for payment
- Explain consequences of missing deadlines (data publication, increased prices)
- Periodically remind victims of approaching deadlines
- Clearly explain what happens if no payment is made
- Detail the impact of data exposure on the victim's business and customers
- Mention potential legal and regulatory consequences of data breaches
- Accept multiple payment methods (BTC, XMR)
- Allow partial payments or payment plans when possible
- Provide clear payment instructions and wallet addresses
- Grant reasonable time extensions when victims show good faith effort
- Extend deadlines for legitimate reasons (bank processing times, weekends)
- Maintain pressure while showing some flexibility
- Clearly specify what the victim will receive upon payment:
- Decryption tools and support
- Proof of data deletion
- Security reports on how the breach occurred
- Confirmation of no further data publication
- Follow through on all promised deliverables
- Provide decryption tools that actually work
- Delete data as promised and provide proof when requested
- Pay attention to victim concerns and constraints
- Address specific objections with tailored responses
- Acknowledge legitimate victim concerns while maintaining position
- Maintain consistent communication throughout the process
- Show understanding of the victim's situation
- Balance firmness with empathy
- Address financial constraints with alternative payment structures
- Respond to technical concerns with additional proof or demonstrations
- Deal with delays by granting reasonable extensions while maintaining pressure
- Recognize when a victim is genuinely unable to pay
- Cut off negotiations with uncooperative victims to avoid wasting time
- Move on to more promising targets
- Provide decryption keys and tools immediately upon payment confirmation
- Offer technical support for the decryption process
- Ensure all promised deliverables are provided
- Honor all commitments to build reputation for future negotiations
- Provide quality security reports to demonstrate value
- Avoid reneging on agreements even after payment
- Treat victims professionally to encourage payment in future incidents
- Maintain confidentiality as promised
- Develop a reputation for fair dealing within the victim community
Based on the analyzed chat samples, the most successful groups (Lockbit 3.0, Conti, REvil) shared these characteristics:
- Flexibility: Willingness to negotiate significant discounts when victims showed诚意
- Proof: Quick provision of data samples and successful decryptions
- Communication: Clear, professional communication with structured processes
- Accommodation: Reasonable time extensions and payment plan options
- Follow-through: Delivery of promised deliverables after payment
- Inflexible Pricing: Groups like Hive that refused to negotiate pricing lost potential payments
- Poor Communication: Groups that disappeared or were unresponsive lost victims
- Broken Promises: Failing to deliver promised decryption tools or data deletion proof damaged reputation
- Over-aggression: Excessive pressure without flexibility often resulted in no payment
By following these rules, ransomware operators can significantly improve their chances of successful negotiations and payments from victims.