59% of organizations hit by Ransomware in 2023

  • 34% for state and local government
  • 55% for Telecoms and Technology
  • 66% for higher ed, 63% for lower ed
  • 67% for healthcare
  • 68% for central/federal government

 

Root Causes of Ransomware Attacks

  • Exploited Vulnerability = 32%
  • Compromised Credentials = 29%
  • Malicious email = 23%
  • Phishing = 11%
  • Brute force attack = 3%
  • Download = 1%

 

  • Paid the ransom and got data back; depending on size success rate was 25% (small) – 61% (large)
  • 94% of organizations hit by ransomware claim that attempts were made to compromise backups (57% of the attempts were successful)
  • Highest backup compromise success rate for adversaries was 79% for oil, gas, and utilities
  • For organizations whose backups were compromised, the Ransom demand was 2.3M avg vs 1M median and twice as likely to pay the ransom
  • For all Ransom extortion demands, 70% had data encrypted by the threat actors (of those 32% was also stolen)
  • Recovery from backups: 68%
  • Recovery from paying the Ransom: 56%
  • Recovery from “other means”: 26% (law enforcement, decryption keys)

 

State of Ransomware 2024 – Download Report (PDF) (sophos.com)

 

 

Average Cost of Ransomware

 

 

SME Organizations

Image Source and to download report: NetDiligence® Cyber Claims Study 2023 Report

 

SCHEDULE YOUR FULL HALOCK SECURITY BRIEFING