701 W. National Rd. Englewood, OH. 45322

Real-life Security Threats

Real-life Security Threats

Real-life security threats

If you don’t think real-life security threats are an issue to your business, think again.

Take a look at some actual stats from 2019.

  • Cyber attacks marred the start of the 2019-2020 academic school year for two American colleges. Regis University in Denver, Colorado, had its entire phone and internet services shut down after a late August cyber attack. Meanwhile, Monroe College in New York City had files locked down due to ransomware. The school did not reveal whether or not it paid the ransom. (Source: Inside Higher Ed)
  • A ransomware attack against the New Orleans city government in early 2020 cost over 7 million dollars. Thankfully, the city carried cybersecurity insurance and received $3 million back—which may indicate the city was still underinsured. (Source: SC Magazine)
  • The Baltimore City government was hit with a massive ransomware attack in 2019 that left it crippled for over a month, with a loss value of over $18 million. (Source: Baltimore Sun)
  • New York City’s capital was hit with a ransomware attack in 2019 that took several essential services offline. (Source: CNET)
  • Ryuk ransomware is responsible for the significant rise in ransomware payment costs. Ryuk demands, on average, $288,000 per incident, compared to around $10,000 required by other ransomware. (Source: Coveware)
  • The Ryuk ransomware is also primarily used to target large companies and organizations with an average of 254 employees. (Source: Coveware)
  • In Florida, the city of Riviera Beach paid a $600,000 ransom in June 2019 to recover files following a ransomware attack. (Source: CBS News)
  • Multiple healthcare providers were hit with ransomware in early 2019 and paid the ransom to retrieve data. One paid $75,000 to recover its encrypted files. (Source: Health IT Security)
  • Ransomware downtime costs organizations more than $64,000 on average. (Source: Coveware)
  • Ransomware is costing businesses more than $75 billion per year. (Source: Datto)
  • The FBI suggests ransom payments are totaling around $1 billion. (Source: Datto)
  • Businesses lost roughly $8,500 per hour due to ransomware-induced downtime. (Source: Govtech)
  • Enterprise ransomware infections were up 12 percent in 2018. (Source: Symantec)
  • Symantec also found enterprises accounted for 81 percent of all ransomware attacks in 2018. (Source: Symantec)
  • A tenth of all businesses reporting stated their ransom demand was $5,000 or more. (Source: Datto)
  • Nearly 40 percent of victims paid the ransom. (Source: Malwarebytes)
  • Over half of all survey respondents (55 percent) said they’d be willing to pay the payment to regain digital family photos. Thirty-nine percent of respondents without children said the same. (Source: IBM)
  • An IBM study noted that a quarter of business executives would be willing to pay between $20,000 and $50,000 to regain access to encrypted data. (Source: IBM)
  • In New York, Albany County was hit by three cyberattacks in three weeks in late 2019, including a Christmas day attack on the Albany County Airport Authority (ACAA) that resulted in an undisclosed ransomware payment by the ACAA. (Source: Times Union)
  • In what may be the most significant attack against a commercial business in history, Danish company Demant was forced to pay around $85 million following a ransomware attack. The company lost access to 22,000 computers in 40 countries, reducing its workforce to using pen and paper until the ransomware infection was resolved. (Source: BBC)
  • After getting hit by the SamSam ransomware in March 2018, Atlanta, Georgia, has spent more than $5 million rebuilding its computer network, including spending nearly $3 million hiring emergency consultants and crisis managers. (Source: Statescoop)
  • A Massachusetts school district paid $10,000 in Bitcoin after a ransomware attack in April 2018. (Source: Cyberscoop)
  • 96 percent of organizations that paid the ransom received a decryption tool from the hackers. (Source: Coveware)
  • Decryption success depends on the type of virus. Dharma variants were often unreliable after paying the ransom, compared to GrandGrab TOR, which almost always delivered a successful decryption tool after a ransom was paid. (Source: Coveware)
  • Bitcoin was the primary method of payment for ransomware. Around 98 percent of payments were made in Bitcoin. (Source: Coveware)

D9 Technologies has published a few case studies explaining different situations we have assisted in. Check out these actual scenarios where local manufacturers had a ransomware situation and a network security issue that we were able to step in and help.