Cybersecurity firm Kaspersky has released its annual report on ransowmare attacks worldwide in 2019. According to the report, based on publicly available statistics, public organizations in at least 174 different cities around the world were victims of ransomware attacks.
This represents an increase of around 60% in
the number of affected cities recorded in 2018. The report also mentions that
the ransoms demanded by threat actors can range from $5k USD to $5 million USD.
It should be mentioned that the bigger the ransom demanded, the more
complications ransomware victims faced, especially when they are small
One of the aspects discussed in this work is
the role that cybersecurity teams of affected organizations play during the
incident response, which in conjunction with the not-so-recent policies against
cybersecurity incidents have changed in some measure the approach taken by
companies in combating ransomware, as well as the costs of recovering an attack
have been modified.
However, the most decisive factor for the costs
of a ransomware infection is the decision whether or not to pay the ransom. A
clear example is the city of Baltimore,
in the US. A few months ago the city suffered an encryption malware infection
and, after refusing to pay a ransom of a few hundred thousand dollars, the city
government began its recovery process, which was implemented with multiple
failures, which elevated the recovery costs to $18 million.
Attack scenarios also vary depending on the
affected city. One of the main scenarios relates to the use of remote access to
a system without proper protections, although the most important figures still
belong to two factors: social engineering campaigns and unauthorized access to
software without update, cybersecurity experts say.
In addition to local governments, one of the
new favorite targets of threat actors is hospitals and other medical services
organizations. According to the International Institute of Cyber Security
(IICS), more than 7% of ransomware attacks recorded globally in 2019 occurred
in public and private health care organizations.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.