{"id":76218,"date":"2023-02-27T02:19:52","date_gmt":"2023-02-27T07:19:52","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=76218"},"modified":"2023-03-07T16:56:59","modified_gmt":"2023-03-07T21:56:59","slug":"76218","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2023\/02\/27\/76218\/","title":{"rendered":"An Overview of the Global Impact of Ransomware Attacks"},"content":{"rendered":"<p>On December 12th, 2022, there was a&nbsp;<a href=\"https:\/\/therecord.media\/crisis-situation-declared-as-two-swedish-municipalities-hit-by-cyberattack\/\" rel=\"nofollow noopener\">cyberattack<\/a>&nbsp;in the Swedish municipalities of Borgholm and M\u00f6rbyl\u00e5nga that rendered a range of critical services from both municipalities unavailable. Although the nature of the intrusion is still undisclosed, it seems to be part of a wider trend of global <strong>ransomware<\/strong> attacks.<\/p>\n<p>On January 10th, the&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/lockbit-ransomware-gang-claims-royal-mail-cyberattack\/\">Royal Mail<\/a>&nbsp;detected a cyber incident affecting delivery and collection across the UK.<\/p>\n<p>In even more recent news, the&nbsp;<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/city-of-oakland-declares-state-of-emergency-after-ransomware-attack\/\">city of Oakland<\/a>&nbsp;has declared a local state of emergency because of a <strong>ransomware<\/strong> attack that forced the city to take all its IT systems offline on February 8th.<\/p>\n<p>But what is a <strong>ransomware<\/strong> attack, who are the targeted groups, and how can organizations protect themselves?<\/p>\n<p><strong>Ransomware<\/strong> is malicious software that encrypts a company\u2019s data, preventing access to data until the ransom payment is paid and a decryptor is released.<\/p>\n<p>In 2021 there were&nbsp;<a href=\"https:\/\/aag-it.com\/the-latest-ransomware-statistics\/#:~:text=The%20volume%20of%20ransomware%20attacks,all%20cyber%20crimes%20in%202022.\" rel=\"nofollow noopener\">623.3 million <strong>ransomware<\/strong><\/a>&nbsp;attacks worldwide, an increase of 105% over 2020 figures. &nbsp;Most of these targeted <strong>ransomware<\/strong> attacks have been on the rise since the shift to remote and hybrid work.<\/p>\n<p>However, in 2022, the volume of <strong>ransomware<\/strong> attacks&nbsp;<a href=\"https:\/\/aag-it.com\/the-latest-ransomware-statistics\/#:~:text=The%20volume%20of%20ransomware%20attacks,all%20cyber%20crimes%20in%202022.\" rel=\"nofollow noopener\">dropped 23%<\/a>. As organizations feel this indicates cybersecurity prevention is helping prevent these crimes, the crimes are evolving into new levels.<\/p>\n<p>Most <strong>ransomware<\/strong> groups are opting for the double-extortion model, threatening to expose the compromised data, for additional leverage to collect ransom payments. &nbsp;These high profile attacks bring more sophistication of modern cyber-attacks imposing new dangers to both organizations and individuals.&nbsp;&nbsp;<a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.bleepingcomputer.com\/news\/security\/an-overview-of-the-global-impact-of-ransomware-attacks\/&amp;ct=ga&amp;cd=CAEYAioUMTQ4Mzc2MzkyOTE4MDIyMDAxMjQyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AOvVaw3yFirb5vxeJb8qzfZuv1Rz\" target=\"_blank\" rel=\"noopener\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On December 12th, 2022, there was a&nbsp;cyberattack&nbsp;in the Swedish municipalities of Borgholm and M\u00f6rbyl\u00e5nga that rendered a range of critical services from both municipalities unavailable. Although the nature of the intrusion is still undisclosed, it seems to be part of <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2023\/02\/27\/76218\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":76382,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-76218","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.cyberconservices.com\/wp-content\/uploads\/2023\/03\/viking-4898879_1920-1536x1152-1-1.jpg","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/76218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=76218"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/76218\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media\/76382"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=76218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=76218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=76218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}