Ransomware Targets Backups
Tie your camel and trust in Allah — Prophet Muhammad, Sunan at-Tirmidhi (2517)
A 2024 Sophos study found 94% of ransomware victims had backups targeted, with 57% succeeding. [1] When backups are compromised, median recovery costs reach $3 million—eight times higher. [2]
The Problem
Ransomware attackers target backup infrastructure—deleting or overwriting copies to eliminate recovery. Backups in the same cloud account with shared credentials let attackers delete months of history. Even immutable backups fail with admin access. Clean backups vanish before you realize.
- Ninety-four percent of ransomware attacks target backup infrastructure
- Attackers wait weeks ensuring clean backups get overwritten
- Immutable backups fail when attackers have admin credentials
- Backup deletion eliminates recovery paths even after ransom
- Encrypted provider backups mean providers cannot help restore
Immutable Backup Protection
Rediacc stores encrypted backup copies immutable at storage level, not administratively. Even if attackers compromise infrastructure tokens or admin credentials, they can only read encrypted data—cannot modify, delete, or overwrite versions. Snapshots encrypted with your password remain worthless to attackers.
- Encrypted backups survive even complete credential compromise
- Token immutability prevents deletion with admin access
- Previous versions remain intact and encrypted indefinitely
- Recovery possible after complete infrastructure compromise
- No ransom payment needed backups remain your control