Ransomware Stats

CyberSense Ransomware News

TT20 ss 84x44 

Index Engines hones CyberSense for backup data protection  

   
cbuzzlogo new1

Index Engines beefs up CyberSense ransomware detection and recovery software

   
logo eweek

How to Protect Your Company from Ransomware 

 

Other Ransomware News

FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals

aggressive Russian cybercriminal gang known for deploying ransomware was preparing to disrupt information technology systems at hundreds of hospitals, clinics and medical care facilities across the United States. Today, officials from the FBI and the U.S. Department of Homeland Security hastily assembled a conference call with healthcare industry executives warning about an “imminent cybercrime threat to U.S. hospitals and healthcare providers.”

 

Defending Against the Inevitable Ransomware Attack on Backup

Ransomware attacks grew by more than 365% in 2019 alone, and a growing number of those target backups. If you are attacked, your business could be forced to decide whether to pay the ransom. Plenty of people are doing just that, and it's expensive. One recent report found that the average cost of getting back to normal, including the ransom, costs nearly $1.5 million.  There are very good reasons why hackers are attacking backups: They know that the data in those backups are the keys to the kingdom, and they are extremely profitable.

 

Average ransomware demand increases 100% from 2019 through Q1 2020

Data from 25,000 small-to-midsize organizations reveals ransomware as the top cyber insurance incident in the first half of the year, with the average ransomware demand increasing 100% from 2019 through Q1 2020

 

Survey finds that IT departments victimized by ransomware forever changed

The impacts of a ransomware attack reach much further than technological or financial consequences on the business – they also take a toll on the humans behind IT security and their abilities to address future threats.  "Experiencing a ransomware attack firsthand adds even greater strain, undermining confidence in their own abilities and preparedness.”

 

Ransomware Tops 2020 Threat Rankings

Over a third of cyber-attacks observed by Kroll in 2020 can be attributed to three main ransomware gangs.  "Ryuk and Sodinokibi, perennially the most observed form of ransomware attack in Kroll’s cases, have been joined by Maze as the top three ransomwares so far in 2020, comprising 35% of all cyber-attacks," and over two-fifths (42%) of Kroll’s cases with a known ransomware variant are connected to a ransomware group actively exfiltrating and publishing victim data,".

 

This major criminal hacking group just switched to ransomware attacks

A widespread hacking operation that has been targeting organisations around the world in a phishing and malware campaign that has been active since 2016 has now switched to ransomware attacks, reflecting how successful ransomware has become as a money-making tool for cyber criminals. Dubbed FIN11 who describe the hackers as a 'well-established financial crime group' which has conducted some of the longest running hacking campaigns.

 

Ransomware Victims That Pay Up Could Incur Steep Fines from Uncle Sam

Companies victimized by ransomware and firms that facilitate negotiations with ransomware extortionists could face steep fines from the U.S. federal government if the crooks who profit from the attack are already under economic sanctions, the Treasury Department warned today.

In its advisory (PDF), the Treasury’s Office of Foreign Assets Control (OFAC) said “companies that facilitate ransomware payments to cyber actors on behalf of victims, including financial institutions, cyber insurance firms, and companies involved in digital forensics and incident response, not only encourage future ransomware payment demands but also may risk violating OFAC regulations.”

Those that run afoul of OFAC sanctions without a special dispensation or “license” from Treasury can face several legal repercussions, including fines of up to $20 million.

 

Ransomware REvil deposits $1m in hacker fund to promote for-hire malware

The ransomware group REvil has deposited $1m worth of bitcoins into a hacker forum to initiate recruitment of affiliates. REvil seeks to hire affiliates who are skilled at penetration testing and other hacker routines, as well as people who have experience with hacking but do not have access to work.

 

Ransomware 2020: Attack Trends Affecting Organizations Worldwide

Ransomware incidents appeared to explode in June 2020. Ransom demands are increasing exponentially. In some cases, IBM Security X-Force is seeing ransom demands of more than $40 million.  Attackers are finding schools and universities to be an even more attractive target for ransomware attacks, especially as they begin classes virtually or are experimenting with hybrid environments due to COVID-19.

 

Microsoft: Ransomware attacks grow more dynamic, human-oriented

There’s plenty of evidence to indicate that cybercriminal groups consider the human foibles of their victims. According to Microsoft, ransomware actors actively switch tactics and tools depending on the specific security environment they encounter upon initial network access, or plan attacks around holidays and other times when they know the patching response will be slow.