(By Chris Konkel, Product Director) The data is in: ransomware attacks are more pervasive than ever. It’s unlikely that these disruptions will ever decrease. Even more troubling is the continual evolution of ransomware threats.

Bleeping Computer recently reported that ALPHV, a ransomware gang also known as BlackCat, brought extortion to the next level by creating a dedicated website that ostensibly allows customers and employees to safely check if their data was captured in a recent attack. Through this site, ALPHV claims to have stolen 112GB of personal data from 1,500 employees at a hotel and spa in Oregon. This site is hosted on the public internet, so it’s indexable by search engines, potentially making the situation worse for victims.

Ransomware Statistics

Cybercriminals are creative and motivated to wreak havoc on individuals and business operations. Below is a roundup of the latest statistics:

According to Cybersecurity Ventures, it’s anticipated that ransomware attacks will affect a business, consumer or device every two seconds by 2031, up from every 11 seconds in 2021.

Veeam polled over 1,000 IT leaders from organizations of all sizes who had suffered a ransomware attack in 2021. Findings include:

  • 94% of ransomware attacks attempted to infect backup repositories
  • 47% of data was encrypted in a ransomware attack
  • 32% of organizations who paid the ransom still could not recover their data

According to Microsoft, 96.88% of all ransomware infections take under four hours to successfully infiltrate their target.

Some market sectors are more vulnerable. TechTarget made a list of the top 10 verticals affected by ransomware:

  • Education
  • Retail
  • Professional and legal services
  • Central government
  • IT
  • Manufacturing
  • Energy and utilities infrastructure
  • Healthcare
  • Local government
  • Financial services

2022 Cyber Activities

As illustrated, tactics are becoming more innovative with the goal of creating maximum damage. Expect to see more of the following in the next year:

Supply chain attacks (instead of attacking a single victim)

Double extorsion (in addition to demanding a ransom in exchange for a decryption key, attackers copy the data to a separate location and threaten to publicly release the information)

Ransomware as a Service | RaaS (pay-for-use malware where affiliates pay to launch ransomware attacks developed by operators)

What Can You Do?

It’s not a matter of if, but when will you be attacked. Training your workforce to be vigilant is a start since clicking on a dangerous link is one of the top ways that malware penetrates a company’s IT system.

Remember that recovery is an important part of an organization’s overall ransomware strategy. Recovery Point can help you create a solid DR plan that includes air-gapping and/or immutable storage in addition to a strong clean room environment. In the event of a potential breach, you’ll have a clean backup to facilitate recovery.

Don’t delay – failing to plan is planning to fail – call 877-445-4333 to speak with a Recovery Point expert and learn more.

Download Veeam’s ransomware trends report here: https://go.veeam.com/wp-ransomware-trends-report-2022?ad=hp-news-bar

You Might Also Like

Leave a Comment