59% of organizations hit by Ransomware in 2023
- 34% for state and local government
- 55% for Telecoms and Technology
- 66% for higher ed, 63% for lower ed
- 67% for healthcare
- 68% for central/federal government
Root Causes of Ransomware Attacks
- Exploited Vulnerability = 32%
- Compromised Credentials = 29%
- Malicious email = 23%
- Phishing = 11%
- Brute force attack = 3%
- Download = 1%
- Paid the ransom and got data back; depending on size success rate was 25% (small) – 61% (large)
- 94% of organizations hit by ransomware claim that attempts were made to compromise backups (57% of the attempts were successful)
- Highest backup compromise success rate for adversaries was 79% for oil, gas, and utilities
- For organizations whose backups were compromised, the Ransom demand was 2.3M avg vs 1M median and twice as likely to pay the ransom
- For all Ransom extortion demands, 70% had data encrypted by the threat actors (of those 32% was also stolen)
- Recovery from backups: 68%
- Recovery from paying the Ransom: 56%
- Recovery from “other means”: 26% (law enforcement, decryption keys)
State of Ransomware 2024 – Download Report (PDF) (sophos.com)
Average Cost of Ransomware
SME Organizations
Image Source and to download report: NetDiligence® Cyber Claims Study 2023 Report
SCHEDULE YOUR FULL HALOCK SECURITY BRIEFING