Ransomware trends, statistics and facts heading into 2024 (original) (raw)

While ransomware is not a new cybersecurity risk, it is a threat that continues to receive attention at the highest levels of government around the world. Ransomware has affected people's ability to get healthcare, put gas in their vehicles and buy groceries.

The financial effects of ransomware have also become particularly pronounced in recent years. Attacks hit supply chains, causing more widespread damage than an attack against a single individual. There has also been an increased response from government and technology vendors to help stem the tide of ransomware attacks.

A few key ransomware trends have emerged in recent years that will likely continue into 2024 and beyond. Attackers realized that certain techniques yield better results and focused on those approaches. Here are some of the primary trends for ransomware in recent years:

Ransomware statistics

The statistics listed below provide insight into the breadth and growing scale of ransomware threats:

Ransomware statistics by industry

Ransomware can hit any individual or industry, and all verticals are at risk. That said, ransomware attacks have affected some verticals more than others and will continue to be an issue for years to come. The following are the top 13 ransomware targets by industry:

  1. Education.
  2. Construction and property.
  3. Central and federal government.
  4. Media, entertainment and leisure.
  5. Local and state government.
  6. Retail.
  7. Energy and utilities infrastructure.
  8. Distribution and transport.
  9. Financial services.
  10. Business, professional and legal services.
  11. Healthcare.
  12. Manufacturing and production.
  13. IT, technology and telecoms.

The costs attributed to ransomware incidents vary significantly, depending on the reporting source. Different points of view from both the private and public sector provide some visibility into the cost and payment trends for ransomware attacks:

Recent ransomware attacks

There have been many ransomware attacks in recent years affecting organizations and their customers. The following are some notable recent attacks:

MoveIt ransomware attacks. The most noteworthy ransomware incident in 2023 was the barrage of organizations that became victims to the MoveIt Transfer attacks from the Clop ransomware group. The flaw in the Progress Software managed file transfer product tracked as CVE-2023-3462. Though the flaw was first publicly detailed on May 31, 2023, it was the leading cause of ransomware disclosures for months afterward. Among the many victims of the MoveIt flaw were multiple U.S. government agencies, the BBC, British Airways (BA), HR software provider Zellis and the government of the Canadian province of Nova Scotia. In August 2023, some analysts had estimated that the Moveit attack was responsible for more than 600 breaches.

Royal Mail. In January 2023, the British Royal Mail service was hit by the LockBit ransomware group, making an $80 million ransom demand.

Dallas, Texas. The city of Dallas was affected by a wide-ranging ransomware attack in May 2023.

TSMC. In June 2023, Taiwan Semiconductor Manufacturing Company (TSMC) was allegedly breached by ransomware from the LockBit ransomware gang, due to a breach at its partner Kinnmax. The attacker demanded $70 million in ransom.

MGM Resorts and Caesars Entertainment. In September 2023, a pair of Las Vegas hotel and casino operators were struck by debilitating ransomware attacks that had significant effect on operations.

Boeing. In November 2023, aerospace giant Boeing confirmed it had been the victim of a cyberattack. The LockBit ransomware gang claimed credit for the incident.

TechTarget Editorial has compiled a comprehensive list of publicly disclosed U.S ransomware attacks.

Ransomware predictions

Ransomware didn't start recently, and it won't end anytime soon either. Ransomware will likely continue to evolve in a few different ways. Here are some predictions on the direction that ransomware will take in the years ahead:

How to protect against ransomware attacks

Organizations and individuals can take steps to mitigate ransomware attacks. But there is no silver bullet that will solve or defend against ransomware. What's needed is a multilayered approach to improve IT security overall. There are six key steps to safeguard assets against ransomware risks:

  1. Maintain a defense-in-depth security program. Ransomware is just one of many risks that IT users face. Having multiple layers of defense is a key best practice.
  2. Consider advanced protection technologies. The use of extended detection and response can help organizations identify potential risks that could lead to ransomware exploitation.
  3. Educate employees about the risks of social engineering. More often than not, it's users clicking on something they shouldn't that leads to infection. Education and vigilance are important.
  4. Patch regularly. Ransomware code often targets known vulnerabilities. By keeping software and firmware updated, a possible attack vector can be eliminated.
  5. Frequently back up critical data. Ransomware's target is data. By having reliable backups, the risk of losing data can be minimized.
  6. Consider tabletop exercises. Preparing for ransomware with a tabletop exercise can identify potential gaps and ensure the right process is in place to mitigate and recover from a potential attack.

Sean Michael Kerner is an IT consultant, technology enthusiast and tinkerer. He has pulled Token Ring, configured NetWare and has been known to compile his own Linux kernel. He consults with industry and media organizations on technology issues.

Next Steps

Types of ransomware and a timeline of attack examples

Top ransomware attack vectors and how to avoid them

Cybersecurity books to read

The biggest ransomware attacks in history

How to prevent ransomware

Dig Deeper on Threats and vulnerabilities