Home News Global ransomware attacks are at their peak, with the United States being the main target, as reported by Malwarebytes. From July 2022 to June 2023, there has been a significant surge in ransomware attacks worldwide. The United States has suffered the most, accounting for over 43 percent of the 1,900 reported attacks, a staggering 75 percent increase compared to the previous year.

Global ransomware attacks are at their peak, with the United States being the main target, as reported by Malwarebytes. From July 2022 to June 2023, there has been a significant surge in ransomware attacks worldwide. The United States has suffered the most, accounting for over 43 percent of the 1,900 reported attacks, a staggering 75 percent increase compared to the previous year.

by admin
Ransomware attacks

While Germany, France, and the UK also saw an increase in ransomware incidents, the rate was relatively lower than in the United States. The report identifies 48 different ransomware groups responsible for targeting American companies, government organizations, and even individual consumers during this period. Particularly concerning is the disproportionate impact on healthcare and educational institutions, with notable breaches like the one experienced by Managed Care of North America (MCNA) and the New York City Department of Education.

It’s important to note that the 1,900 reported incidents are likely just the tip of the iceberg, as many organizations may choose to quietly pay the ransom without reporting the attacks.

Ransomware attacks are a form of malware intentionally designed to lock users and organizations out of their computer files. The attackers demand a ransom, and upon payment, victims receive a decryption key to regain access to their data.

The leading global offender in ransomware attacks is a group known as Clop, suspected to have ties to Russia. They have evolved their tactics by exploiting zero-day software vulnerabilities, allowing them to carry out larger-scale attacks. In June, they targeted hundreds of companies, including the largest US pension fund, using one of these vulnerabilities in enterprise file transfer software.

This shift towards zero-day software exploits, rather than traditional phishing emails and virus downloads, might explain the increase in reported incidents, according to Malwarebytes.

Other countries also experienced alarming rises in ransomware attacks. France’s incidents doubled in the past year, primarily targeting governmental institutions. The UK faced 200 attacks from 32 different groups, a significant increase from the previous year’s monthly average of a single attack.

Please note that all product recommendations made by BuyTechBlog are impartially chosen by their editorial team, independent of their parent company. Some of their articles include affiliate links, and if you purchase something through those links, they may earn an affiliate commission. The prices mentioned in their publications are accurate at the time of publishing.

Frequently Asked Questions (FAQs) about Ransomware attacks

Q: What are the key findings of the Malwarebytes report on global ransomware attacks?

A: The Malwarebytes report reveals a significant surge in global ransomware attacks from July 2022 to June 2023, with the United States being the primary target. Of the 1,900 reported attacks, over 43 percent originated in the US, indicating a 75 percent increase compared to the previous year. Healthcare and education sectors were disproportionately impacted, and the notorious Clop gang, with suspected ties to Russia, emerged as a leading offender by exploiting zero-day software vulnerabilities.

Q: How do ransomware attacks work?

A: Ransomware attacks involve malware designed to deny users and organizations access to their computer files. The attackers lock the files and demand a ransom. Once the ransom is paid, victims receive a decryption key to regain access to their data.

Q: Why are healthcare and education sectors particularly affected by ransomware attacks?

A: The healthcare and education sectors are particularly targeted because they hold valuable and sensitive data. Ransomware attackers exploit this data’s critical nature to increase the likelihood of victims paying the ransom to regain access quickly.

Q: Who is the primary culprit behind these ransomware attacks?

A: The leading global offender in ransomware attacks is a group called Clop, which is suspected to have ties to Russia. They have evolved their tactics, using zero-day software exploits to carry out more extensive and damaging attacks.

Q: Are the reported incidents in the Malwarebytes report the complete picture?

A: The Malwarebytes report only includes reported incidents, and the actual number of ransomware attacks may be higher since some organizations may choose to pay the ransom discreetly without reporting the attacks.

Q: How can organizations protect themselves from ransomware attacks?

A: Organizations can enhance their cybersecurity measures by regularly updating software, training employees to recognize phishing attempts, maintaining data backups, and using robust security solutions to detect and prevent ransomware attacks.

More about Ransomware attacks

  • Malwarebytes Report: Link
  • Clop Ransomware Gang: Link
  • Zero-Day Exploits: Link

You may also like

Leave a Comment