RaaS vs SaaS

A black and white image of a skull with the words "I am a hacker" written in the background.

Ransomware is one of the biggest threats to any organization, regardless of size or industry. The downstream impacts from a large-scale ransomware event can have a massive fiscal fallout and real-world repercussions.

Traditional security solutions, while robust and effective for some threats, have clearly failed to protect organizations against ransomware attacks. There is a huge gap in protection and ransomware operators are expertly exploiting it to the tune of hundreds of millions of dollars yearly.

The average cost of remediating a ransomware attack for victim organizations exceeded $4.45 million in 2023, and this figure does not include the ransom payment, damage to brand, lost revenue from disruption to operations, increased cyber insurance premiums or other tangential cost.

The average cost of remediating a ransomware attack in 2023

That does not include additional costs like:

Ransom Payments Double Extortion

Increasing Insurance Premiums

Brand, Stock and Reputation Damage

Lost Revenue Due to Downtime

Ransomware Operators are operating akin to a SaaS Organization.

So Why is Ransomware so Successful?

The ransomware game is profitable – highly profitable. In fact, if you were to compare P&L sheets from the leading ransomware operations against leading security solution providers, you’d see ransomware gangs enjoy operating margins that would make almost any SaaS provider envious. Ransomware operators are also better viewed as mature criminal business organizations with top-down hierarchical structures and diversified revenue streams.

The Ransomware-as-a-Service (RaaS) business model also includes many aspects that mirror those of legitimate Software-as-a-Service (SaaS) models, including:

Organized like a SaaS company

The RaaS model mirrors the SaaS model in that the providers offer subscription-based services and software – in this case ransomware and the associated attack infrastructure. RaaS operators invest in R&D and talent recruiting to stay competitive, offer customer support to reduce churn, and maintain and are intent on growing their annual recurring revenue (ARR).

Efficient Marketing and Partner Programs

Like their SaaS counterparts, RaaS providers develop their brand and foster revenue growth through marketing. RaaS operators seek to offer competitive affiliate programs where they compete on the basis of platform performance and profit sharing with their affiliate partners, much like SaaS vendors.

Multiple Revenue Sharing Options

Established RaaS operators may offer several options, including one-time licensing for a flat fee, monthly subscriptions, or through profit sharing where the RaaS provider takes a cut of the affiliate’s ransom take. Terms of Service can vary between RaaS operators, so the services included are key competitive factors.

High Revenue, Low COGS

Compared to their SaaS counterparts, RaaS operators typically have extremely low cost of goods (COGS) and a high operating margin, which means that they are very profitable from the outset. In contrast, most SaaS organizations have low or negative operating margins and a high COGS and can take several years or more to become profitable.

The RaaS Ecosystem

The ransomware ecosystem has exploded in recent years with many stunning similarities to non-criminal emerging market sectors. This evolution includes the advent of specialists who focus on particular aspects of the ransomware economy who together represent the entire ransomware attack supply chain. Key players in the ransomware economy include:

A skeleton with a skull and crossbones on a blue background.

Raa$: A Buyers Market

Ransomware Attacks are up

93% (YoY)

Largest Ransomware Loss:

$100M (MGM)

Ransomware kits run less than

$50.00

Active ransomware families or variants

130+

2023 average reported ransomware payment:

$4,620,000

Additional Remediation Costs:

$1.85M

What Orgs are Most Targeted?

$100M+ Revenue

Ransomware Volume of Attacks

Top 5 Targets By Volume

Halcyon Logo Icon only

Most Disruptive Ransomware Attacks in 2023

Thousands of ransomware attacks occur every week - here are five top examples of some of the most disruptive attacks from 2023:

Target

Impact

1

MGM

SEC 8-K filing revealed the company lost $100 million in massive ALPHV attack

2

Lehigh Valley Health Network (LVHN)

ALPHV leaks stolen nude photos of cancer patients as extortion

3

U.S. Marshals Service

PII of USMS investigation subjects and employees exfiltrated 

4

City of Dallas

PII of USMS investigation subjects and employees exfiltrated 

5

Prospect Medical

Suspended services, cancelled procedures, ambulances diverted

Halcyon Logo Icon only

Top Reported Ransom Demands in 2022

Halcyon Logo Icon only

Growth in Ransomware Follows Growth in Security Markets

Halcyon Logo Icon only

Total Victims Per Group in 2023 (Top 10)

Halcyon Logo Icon only

Ransomware in the News

Royal Mail:

LockBit set a ransom demand of $80 million

Minneapolis PUblic Schools:

Children’s confidential information among the 300,000 files dumped

Lehigh valley health network:

Leaked naked images of breast cancer patients along with medical questionnaires

US Marshals Service:

Took 30 days to restore “most critical tools”

RoyalCapita: Mail:

Recovery from the incident is expected to cost up to $25 million

Halcyon Logo Icon only

Here's How It Works

CREATED for RANSOMWARE

Ransomware prevention, protection, and recovery requires multiple layers of defense. The risk of letting ransomware run rampant through your organization is too large to leave to a single security product, ML/AI model, or behavioral model.

Resilient by design

The Halcyon Platform uses several unique layers, working in conjunction, to stop the process of ransomware from completing its task, if a single layer fails Halcyon is able to respond accordingly to protect the wider fleet of endpoints.

MULTIPLE FAILSAFES

Even the best defense can be breached by persistent attackers which is why Halcyon was designed with failsafes like automatic key interception, sidekick protection and even the ability to recover encrypted files post-incident, even without the key in some cases.

THE HALCYON PLATFORM
RANSOMWARE PREVENTION
Prevention Engine
Next-Gen Behavioral Modeling
Sidekick Protection
RANSOMWARE RECOVERY
Key Material Interception
Automated Decryption
VSS Protection
RANSOMWAR DXP
Data Exfiltration Prevention
Ransomware Early Warning
HalcYon Services: Strategy + RECOVERY
PRE-RANSOMWARE
Ransomware Readiness Assessment
RaaS Incident Tabletop Exercise
POST-RANSOMWARE
Ransomware Emergency Response
Keyless Rapid Recovery Service

Windows OS Environments

Windows Server
2012 x64
2016
2019
2022
Windows Desktop
Windows 10
Windows 11

Other OS Environments

Linux
RHEL 8, 9
Debian 11, 12
Ubuntu 22.04, 24.04 LTS
AWS 2023
Oracle 8, 9
Rocky 8, 9
Alma 8, 9

See Halcyon in action

Interested in seeing us in action?
Tell us about your needs and we’ll connect you with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.