← All posts

What a ransomware incident actually costs

The real cost categories of a modern ransomware incident, why the ransom is usually the smallest line item and how mid-market CFOs should frame the exposure.

· Atticus Rowan

Ask a CFO how much a ransomware incident costs and the answer is usually anchored on the ransom. A $2 million demand, negotiate it to $800,000, pay the bitcoin, move on. That number makes the headlines. It is also typically the smallest line item on the final bill.

The real cost of a ransomware incident is a stack. Direct response expenses, operational downtime, recovery labor, regulatory and legal costs, cyber insurance retention, customer and revenue impact, and a long tail of residual costs that land in the general ledger quarters after the incident is officially closed. For mid-market firms, the total usually lands 5 to 15 times larger than the ransom number the headlines fixate on.

Here is the working cost stack we walk through with CFOs and operating partners, with representative magnitudes from publicly-cited industry data.

Category 1, direct response

The incident response labor itself.

  • Incident response firm. Forensics, containment, eviction. Typical engagement fee for a mid-market incident: $100,000 to $400,000 during the active-response window, often with retainer commitments that extend longer.
  • Legal counsel. Breach notification law compliance, regulatory interface, carrier coordination, potential litigation posture. Typical legal engagement: $75,000 to $300,000.
  • Cyber insurance broker coordination. Usually no separate fee but materially extends the broker’s scope.
  • Crisis communications. PR firm engagement if the incident becomes public. Typical range: $25,000 to $150,000.

Direct response alone usually runs $200,000 to $1 million at the mid-market level.

Category 2, operational downtime

The revenue and operating cost of the business not operating.

  • Lost revenue during the downtime window. A manufacturer producing $100,000 per shift loses $100,000 per shift of stopped production.
  • Missed customer commitments. Contractual penalties, lost future business, late-delivery costs.
  • Labor cost during downtime. Staff continue to be paid while unable to work normally, or while doing manual workarounds at reduced productivity.
  • Overtime after the downtime. Catching up on the work backlog usually requires premium labor hours.

Downtime cost scales with the firm’s operating leverage. A professional services firm with billable-hour revenue and a distributed workforce might see a lower direct-downtime cost than a manufacturer with capital-intensive operations, but the range across the mid-market typically runs $100,000 to $5 million per event.

The downtime window itself has widened over the last 5 years. A 2020-era ransomware incident was often resolved within a week. A 2026-era ransomware incident at a firm with weak backup or restoration capability can run 3 to 6 weeks before operations are fully recovered.

Category 3, the ransom itself

The ransom, if paid. Not every incident results in a ransom payment. An increasing share of firms with functional immutable backups recover without paying.

Representative ransom amounts from publicly reported mid-market incidents:

  • $200,000 to $2 million initial demand at the small and mid-market level
  • Negotiated outcomes typically 30 to 70% of the initial demand
  • Payment in cryptocurrency through a specialized ransom negotiation and payment intermediary
  • Additional costs: ransom negotiator fees, cryptocurrency transaction fees, OFAC compliance review

The ransom is increasingly the smallest category in the total stack, because firms that have functional backup do not pay and firms without functional backup lose more elsewhere.

Category 4, recovery and rebuild

The cost of returning the environment to working state.

  • Full environment rebuild cost. In the worst-case scenario (no viable backups, full encryption), the environment is rebuilt from scratch. Hardware, software, data reconstruction, vendor engagement. Typical range: $250,000 to $2 million.
  • Data loss. Data that existed only in the encrypted environment and cannot be recovered. The loss value depends on what was lost (customer records, financial history, engineering designs, intellectual property).
  • Accelerated hardware refresh. Systems that had been running on end-of-life hardware often get replaced during recovery because bringing them back to the pre-incident state is not worth the effort.
  • Software and licensing. Emergency licenses, new tooling purchased during response, cybersecurity tooling the insurance carrier requires before reinstating coverage.

Recovery cost scales inversely with pre-incident backup quality. A firm with a tested immutable backup and a documented restore runbook recovers cheaply. A firm without either recovers expensively.

Costs driven by the regulatory and legal consequences of the incident.

  • Regulatory notification costs. State attorneys-general, federal regulators depending on sector, international regulators if the data footprint extends.
  • Customer notification costs. Mailing, call centers, credit monitoring offerings. Usually $5 to $20 per affected record, scaled by incident scope.
  • Class-action litigation. Increasingly common for incidents affecting consumer records. Settlement ranges vary widely, typically $2 million to $20 million at the mid-market level for incidents that result in litigation.
  • HIPAA, GLBA, state privacy law penalties. Varies by sector and severity.

Regulatory cost is highly scope-dependent. A 10,000-record incident looks different than a 10-million-record incident, even in the same firm.

Category 6, cyber insurance retention and out-of-pocket

The cost of carrying the claim.

  • Policy retention. Typically $25,000 to $250,000 at the mid-market level, sometimes much higher for firms with loss history.
  • Coverage sublimits. Many policies sublimit specific categories (ransomware, business email compromise, social engineering). The sublimit is where the out-of-pocket exposure often lands.
  • Exclusions. Coverage gaps that surface during claim review. Often related to control requirements the firm attested to in the application.
  • Post-incident premium impact. Renewal premium after a claim is typically 50 to 200% higher than the pre-incident premium, and some carriers non-renew entirely.

A well-designed cyber insurance program with credible controls backing the application behaves very differently from a thinly-underwritten program where exclusions and sublimits surface post-incident.

Category 7, the long tail

Costs that land quarters after the incident is officially closed.

  • Customer churn. Customers who leave because of the incident, or do not renew at the scheduled time.
  • Sales cycle friction. Prospects who require additional cybersecurity evidence before buying, extending sales cycles by 60 to 180 days.
  • Executive time. Leadership hours consumed by incident response, board reporting and customer conversations that do not produce operating progress.
  • Employee turnover. Key staff leaving after a high-stress incident response window.
  • Reputation and trust rebuilding. Marketing, customer advisory board engagement, trade-press interviews. Soft costs that usually get absorbed into BAU budgets.

The long tail is hard to measure but is usually material. Conservative estimates put the long-tail cost at 10 to 30% of the hard-cost stack, over 18 to 36 months.

What this adds up to, at the mid-market

A representative 200 to 500-employee mid-market firm suffering a full ransomware incident with moderate operational impact typically sees a total stack in the $2 million to $15 million range, with the heaviest concentration in operational downtime, recovery and long-tail categories.

The publicly-cited industry figure for average total ransomware incident cost at the mid-market level, including recovery but excluding ransom, landed near $2.8 million in 2024 IBM Cost of a Data Breach reporting. The 2025 and 2026 numbers have continued trending higher.

The ransom payment itself, if paid, usually represents 5 to 25% of the total stack.

What this means for mid-market financial planning

The cost-stack framing shapes rational investment decisions.

  • Prevention controls are cheap relative to the tail. A mid-market cybersecurity program running $150,000 to $500,000 annually compares favorably against even a mid-severity incident.
  • Backup and recovery investment is leverage. The difference between a firm with immutable tested backup and one without is usually the difference between a $2 million incident and a $10 million incident.
  • Cyber insurance is the tail hedge, not the baseline. It covers what goes wrong despite the program, and it prices off the program’s quality. An insurance-only approach is expensive in both directions.

Where we fit

We work with CFOs and operating leaders at mid-market firms to scope cybersecurity investment against the actual tail risk. The practical conversations are about operational leverage, recovery time, backup integrity, insurance carrier alignment and the narrow set of controls that move the cost stack most.

If your firm has not recently priced the ransomware tail against the investment required to reduce it, or if a recent incident at a peer firm has the executive team recalibrating, schedule a discovery call. We can walk through the cost stack as it applies to your specific operating profile.