{"id":28511,"date":"2025-01-31T23:16:29","date_gmt":"2025-01-31T17:46:29","guid":{"rendered":"https:\/\/www.kaspersky.co.in\/blog\/ransowmare-attacks-in-2024\/28511\/"},"modified":"2025-01-31T23:16:58","modified_gmt":"2025-01-31T17:46:58","slug":"ransowmare-attacks-in-2024","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/ransowmare-attacks-in-2024\/28511\/","title":{"rendered":"Ransomware: the most notable attacks of 2024"},"content":{"rendered":"<p>You may have noticed a slight drop in the amount of coverage of ransomware on our Kaspersky Daily blog in recent years. Sadly, it\u2019s not that ransomware attacks have stopped. Far from it \u2014 such incidents are now so commonplace that they\u2019ve become part of the cyber-furniture. Nevertheless, some ransomware attacks still have the power to shock. In this post, we take you through the ransomware incidents of 2024 that made a lasting impression in terms of scale, impact, or mode of attack\u2026<\/p>\n<h2>January 2024: ransomware attack on Toronto Zoo<\/h2>\n<p>\nOne of the first major ransomware incidents of 2024 was the January <a href=\"https:\/\/www.cbc.ca\/news\/canada\/toronto\/toronto-zoo-cybersecurity-attack-1.7077721\" target=\"_blank\" rel=\"nofollow noopener\">attack on Canada\u2019s biggest zoo<\/a>, located in Toronto. The zoo\u2019s management <a href=\"https:\/\/www.torontozoo.com\/mediaroom\/press2024\/20240108\" target=\"_blank\" rel=\"nofollow noopener\">was quick<\/a> to reassure the public that no systems related to animal care were impacted. Indeed, its website and ticketing service were also unaffected, so the zoo continued to welcome visitors as usual.<\/p>\n<div id=\"attachment_52951\" style=\"width: 1408px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231517\/ransowmare-attacks-in-2024-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52951\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231517\/ransowmare-attacks-in-2024-1.png\" alt=\"Toronto Zoo reports a cyberattack\" width=\"1398\" height=\"1508\" class=\"size-full wp-image-52951\"><\/a><p id=\"caption-attachment-52951\" class=\"wp-caption-text\">The official Toronto Zoo website reports a cyberattack and assures that all animals are fine. <a href=\"https:\/\/www.torontozoo.com\/mediaroom\/press2024\/20240108\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a><\/p><\/div>\n<p>It soon <a href=\"https:\/\/globalnews.ca\/news\/10232883\/toronto-zoo-cyber-attack-employee-data-stolen\/\" target=\"_blank\" rel=\"nofollow noopener\">transpired<\/a> that the attackers had stolen a significant amount of zoo employees\u2019 personal information \u2014 dating back to 1989. This incident served as yet another reminder that even organizations far removed from critical sectors can become targets of ransomware attacks.<\/p>\n<h2>February 2024: $3.09 billion attack on UnitedHealth<\/h2>\n<p>\nFebruary\u2019s attack on the U.S. healthcare insurance giant UnitedHealth would easily claim the \u201cransomware incident of the year\u201d award if such existed. The attack was in fact carried out on Optum Insight, a UnitedHealth subsidiary that provides technology-enabled services.<\/p>\n<p>Getting granular here, the <a href=\"https:\/\/techcrunch.com\/2024\/02\/21\/change-healthcare-cyberattack\/\" target=\"_blank\" rel=\"nofollow noopener\">direct target<\/a> was Change Healthcare, which has been part of Optum since 2022. This company\u2019s platform serves as a financial intermediary between payers, patients, and healthcare providers. The attack took down over a hundred different Optum digital services. As a result, UnitedHealth was able to process neither electronic payments nor medical applications. Essentially, the company couldn\u2019t perform its core function \u2014 causing chaos across the U.S. healthcare system.<\/p>\n<p>The attack\u2019s repercussions were so extensive that UnitedHealth even set up a <a href=\"https:\/\/www.unitedhealthgroup.com\/changehealthcarecyberresponse\" target=\"_blank\" rel=\"nofollow noopener\">dedicated website<\/a> to provide updates about the process of restoring the company\u2019s affected IT systems. The bulk of the restoration work was carried out in the first months after the attack. However, almost a year on, the site continues to post regular updates, and some systems still have the \u201cservice partially available\u201d status.<\/p>\n<p>A few days after the attack, the ransomware gang BlackCat\/ALPHV <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gang-claims-they-stole-6tb-of-change-healthcare-data\/\" target=\"_blank\" rel=\"nofollow noopener\">claimed responsibility<\/a>. In addition, they reported stealing 6TB of confidential data \u2014 including medical records, financial documents, personal data of U.S. civilians and military personnel, and a wealth of other sensitive information.<\/p>\n<p>UnitedHealth ended up <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/blackcat-ransomware-turns-off-servers-amid-claim-they-stole-22-million-ransom\/\" target=\"_blank\" rel=\"nofollow noopener\">paying<\/a> the gang a $22\u00a0million ransom. And it\u2019s rumored that the company had to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/unitedhealth-confirms-it-paid-ransomware-gang-to-stop-data-leak\/\" target=\"_blank\" rel=\"nofollow noopener\">pay up again<\/a> when BlackCat\u2019s accomplices from the RansomHub group claimed they hadn\u2019t received their share and began leaking the stolen data into the public domain.<\/p>\n<p>However, compared to the total financial losses caused by the incident, the ransom was a mere drop in the ocean. UnitedHealth\u2019s own financial reports estimate the damage in Q1 alone at $872 million. As for the total damage for the year 2024, it <a href=\"https:\/\/www.unitedhealthgroup.com\/content\/dam\/UHG\/PDF\/investors\/2024\/2025-16-01-uhg-reports-fourth-quarter-results.pdf\" target=\"_blank\" rel=\"nofollow noopener\">reached<\/a> an eye-watering $3.09 billion.<\/p>\n<p>According to the latest reports, the attackers stole medical data of <a href=\"https:\/\/techcrunch.com\/2024\/10\/24\/unitedhealth-change-healthcare-hacked-millions-health-records-ransomware\/\" target=\"_blank\" rel=\"nofollow noopener\">more than 100 million patients<\/a>, which is approximately one in three U.S. residents!<\/p>\n<h2>March 2024: Panera Bread\u2019s week-long outage<\/h2>\n<p>\nIn March, ransomware attackers <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/panera-bread-experiencing-nationwide-it-outage-since-saturday\/\" target=\"_blank\" rel=\"nofollow noopener\">targeted<\/a> U.S. food-chain giant Panera Bread. The incident knocked out many of its IT systems, including the online ordering service, offline payment system, telephony, website and mobile apps, loyalty program, various internal systems for employees, and other services.<\/p>\n<div id=\"attachment_52952\" style=\"width: 1610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231532\/ransowmare-attacks-in-2024-3.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52952\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231532\/ransowmare-attacks-in-2024-3.jpg\" alt=\"Panera Bread website unavailable\" width=\"1600\" height=\"649\" class=\"size-full wp-image-52952\"><\/a><p id=\"caption-attachment-52952\" class=\"wp-caption-text\">Stub message on the Panera Bread website. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/panera-bread-week-long-it-outage-caused-by-ransomware-attack\/\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a><\/p><\/div>\n<p>Over 2000 restaurants in the Panera Bread chain continued to operate after the attack \u2014 but in stone-age conditions: payment was by cash only; subscription offers (such as unlimited drinks for $14.99 per month) were temporarily unavailable; loyalty program points weren\u2019t awarded; and restaurant staff had to manually coordinate their work schedules with managers. The outage lasted <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/panera-bread-experiencing-nationwide-it-outage-since-saturday\/\" target=\"_blank\" rel=\"nofollow noopener\">about a week<\/a>.<\/p>\n<p>During the attack, as we <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/panera-warns-of-employee-data-breach-after-march-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">learned<\/a> three months later, the personal data of Panera Bread employees was stolen. By the looks of it, the company ended up <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/panera-bread-likely-paid-a-ransom-in-march-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">paying<\/a> a ransom to keep that data from being published.<\/p>\n<h2>April 2024: Hunters International attack on Hoya Corporation<\/h2>\n<p>\nEarly April saw an <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hoyas-optics-production-and-orders-disrupted-by-cyberattack\/\" target=\"_blank\" rel=\"nofollow noopener\">attack<\/a> on Hoya Corporation, the major Japanese optics manufacturer. In an official statement, the company said that the systems of some manufacturing plants, plus the ordering system for several products had been affected.<\/p>\n<div id=\"attachment_52953\" style=\"width: 2799px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231605\/ransowmare-attacks-in-2024-4.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52953\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231605\/ransowmare-attacks-in-2024-4.png\" alt=\"Ransom demand on the Hunters International website\" width=\"2789\" height=\"1793\" class=\"size-full wp-image-52953\"><\/a><p id=\"caption-attachment-52953\" class=\"wp-caption-text\">Hunters International demanded a ransom of $10 million (151.56 BTC at the then exchange rate) from Hoya Corporation. <a href=\"https:\/\/www.lemagit.fr\/actualites\/366580339\/Ransomware-Hunters-International-demande-10-millions-de-dollars-a-Hoya\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a><\/p><\/div>\n<p>A week after the incident, it was <a href=\"https:\/\/www.lemagit.fr\/actualites\/366580339\/Ransomware-Hunters-International-demande-10-millions-de-dollars-a-Hoya\" target=\"_blank\" rel=\"nofollow noopener\">confirmed<\/a> as a ransomware attack. The Hunters International ransomware-as-a-service group\u2019s website reported that the attackers had stolen 1.7 million files from Hoya (around 2TB), and demanded a ransom of $10 million.<\/p>\n<h2>May 2024: Major disruptions at U.S. healthcare network Ascension<\/h2>\n<p>\nIn early May, Ascension, one of the largest healthcare networks in the United States, had some of its systems <a href=\"https:\/\/edition.cnn.com\/2024\/05\/08\/tech\/cyberattack-disrupts-healthcare-network\/index.html\" target=\"_blank\" rel=\"nofollow noopener\">taken offline<\/a> due to a \u201ccybersecurity event\u201d. The \u201cevent\u201d in question was soon revealed to be a ransomware attack on the organization\u2019s IT infrastructure. The disruption affected electronic medical records, telephony, and systems for ordering tests, procedures, and medications.<\/p>\n<p>As a result, some hospitals run by Ascension couldn\u2019t admit emergency patients, and had to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/healthcare-giant-ascension-redirects-ambulances-after-suspected-Black-Basta-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">divert ambulances<\/a> to other facilities. Healthcare workers also reported having to switch to pen and paper and writing out medical referrals from memory.<\/p>\n<p>Restoring the affected electronic systems took over a month. The Black Basta ransomware group claimed responsibility for the attack. The investigation revealed that the root cause of the attack was an employee who <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ascension-hacked-after-employee-downloaded-malicious-file\/\" target=\"_blank\" rel=\"nofollow noopener\">downloaded a malicious file<\/a> onto a company device.<\/p>\n<p>It was revealed in late 2024 that the cybercriminals had stolen the personal data of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ascension-health-data-of-56-million-stolen-in-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">5.6 million patients and hospital staff<\/a>. This data included medical records, payment details, insurance information, social security and ID numbers, addresses, dates of birth, and more. As compensation, Ascension offered all those affected a free two-year subscription to its identity-theft protection service.<\/p>\n<h2>June 2024: Ransomware attack on healthcare provider hits London hospitals<\/h2>\n<p>\nIn early June, <a href=\"https:\/\/www.bbc.com\/news\/articles\/c288n8rkpvno\" target=\"_blank\" rel=\"nofollow noopener\">news broke<\/a> of a ransomware attack on Synnovis, a UK company providing pathology and diagnostic services to several major London hospitals. As a result, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/london-hospitals-cancel-over-800-operations-after-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">over 800 surgeries were canceled<\/a> and some patients diverted to other facilities.<\/p>\n<div id=\"attachment_52954\" style=\"width: 1496px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231622\/ransowmare-attacks-in-2024-6.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52954\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231622\/ransowmare-attacks-in-2024-6.jpg\" alt=\"Major outage reported on the Synnovis website\" width=\"1486\" height=\"406\" class=\"size-full wp-image-52954\"><\/a><p id=\"caption-attachment-52954\" class=\"wp-caption-text\">Major outage reported on the website of Synnovis, a healthcare provider for several major London hospitals. <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/major-london-hospitals-disrupted-by-synnovis-ransomware-attack\/\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a><\/p><\/div>\n<p>One of the worst consequences of the attack was that doctors were unable to match donor and patient blood types, forcing them to use the universal blood type O. This quickly led to a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/london-hospitals-face-blood-shortage-after-synnovis-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">shortage<\/a>.<\/p>\n<h2>July 2024: Los Angeles County Superior Court shut down by ransomware<\/h2>\n<p>\nThe Los Angeles County Superior Court, the largest single unified trial court in the United States, <a href=\"https:\/\/www.reuters.com\/legal\/government\/los-angeles-court-closed-after-ransomware-attack-2024-07-22\/\" target=\"_blank\" rel=\"nofollow noopener\">suspended<\/a> all 36 courthouses in the county due to a ransomware attack. Both external services (such as the court\u2019s website and the jury duty portal) and internal resources (including the case management system) were impacted.<\/p>\n<p>The Los Angeles courts reopened two days later, but restoring publicly-accessible electronic services took <a href=\"https:\/\/www.lacourt.org\/newsmedia\/uploads\/142024729163959NR07-29-2024-COURTSYSTEMSRETURNTOFULLFUNCTIONALITY(1).pdf\" target=\"_blank\" rel=\"nofollow noopener\">about a week<\/a> longer. After that, however, the Superior Court stopped updating the public about the incident, so it\u2019s unknown how long it took to restore the courts\u2019 internal systems. It also remains a mystery whether the court paid a ransom or what data the attackers may have gotten away with.<\/p>\n<h2>August 2024: Ransomware attack on vodka maker Stoli<\/h2>\n<p>\nIn August, a ransomware attack targeted Stoli Group, the producer of Stolichnaya vodka and multiple other beverages. The incident had a serious impact on the company\u2019s IT infrastructure and operations: an ERP system failure meant that all internal processes, including accounting, had to be transferred to manual mode.<\/p>\n<p>In particular, the incident meant that Stoli Group companies couldn\u2019t submit financial statements to creditors \u2014 which alleged that the Stoli companies failed to repay a debt of $78 million. Stoli Group had to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/vodka-maker-stoli-files-for-bankruptcy-in-us-after-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">file for bankruptcy<\/a> in December.<\/p>\n<h2>September 2024: Highline Public Schools closure due to ransomware<\/h2>\n<p>\nIn early October, Highline Public Schools, a public school district in the U.S. state of Washington, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/highline-public-schools-closes-schools-following-cyberattack\/\" target=\"_blank\" rel=\"nofollow noopener\">temporarily closed<\/a> all 34 of its member schools, which serve more than 17,000 students and employ around 2000 staff. The cyberattack halted all educational activities, including sports events and meetings, for four school days.<\/p>\n<p>About a month after the incident, Highline\u2019s management confirmed that the attack was ransomware-related. Unfortunately, Highline Public Schools officials never disclosed whether any personal information of staff or students had been compromised. As a precaution, however, the district offered all Highline employees one year of free credit and identity monitoring services.<\/p>\n<p>Although the schools were quite quick to reopen, it took a long time to restore the IT infrastructure back to normal operation. Regretfully, more than a month passed before employees and students were finally urged to change their passwords and reinstall the operating system on all school-supplied devices.<\/p>\n<h2>October 2024: Ransomware attack on Casio<\/h2>\n<p>\nIn early October, Japan\u2019s Casio, the renowned electronics manufacturer, <a href=\"https:\/\/www.casio.co.jp\/release\/2024\/1008-incident\/\" target=\"_blank\" rel=\"nofollow noopener\">reported<\/a> unauthorized access to its network. According to its statement, the incident resulted in failure of IT systems and unavailability of certain unspecified services.<\/p>\n<p>Five days later, the ransomware group Underground claimed responsibility for the attack. The group also stole data during the hack, which it <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/underground-ransomware-claims-attack-on-casio-leaks-stolen-data\/\" target=\"_blank\" rel=\"nofollow noopener\">posted<\/a> on its website \u2014 including confidential documents, patent information, employees\u2019 personal data, legal and financial documents, project information, and so on. The very next day, Casio <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/casio-confirms-customer-data-stolen-in-a-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">confirmed<\/a> the data theft.<\/p>\n<p>In early 2025, Casio <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/casio-says-data-of-8-500-people-exposed-in-october-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">released<\/a> more details about the number of people whose data had been stolen. According to the company, a total of 8500 people were affected, of which around 6500 were employees, and 2000 were business partners. At the same time, Casio reported not paying a ransom to the attackers and announced that most (but not all) services were already back up and running.<\/p>\n<p>Interestingly, in that same October 2024, Casio was the victim of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/casio-discloses-data-breach-impacting-customers-in-149-countries\/\" target=\"_blank\" rel=\"nofollow noopener\">another successful attack<\/a>, unrelated to the above ransomware incident.<\/p>\n<h2>November 2024: Ransomware attack on Bologna FC<\/h2>\n<p>\nIn November, ransomware claimed a rather atypical victim \u2014 the Italian soccer club Bologna FC. The club <a href=\"https:\/\/www.bolognafc.it\/en\/official-statement-from-the-club-3\/\" target=\"_blank\" rel=\"nofollow noopener\">posted<\/a> on its website an official statement about a ransomware attack, warning that \u201cit is a serious criminal offence\u201d to store or distribute stolen data.<\/p>\n<div id=\"attachment_52955\" style=\"width: 2254px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231655\/ransowmare-attacks-in-2024-11.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-52955\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2025\/01\/31231655\/ransowmare-attacks-in-2024-11.png\" alt=\"Official statement on the Bologna FC website\" width=\"2244\" height=\"1124\" class=\"size-full wp-image-52955\"><\/a><p id=\"caption-attachment-52955\" class=\"wp-caption-text\">The Italian soccer club Bologna FC website reports a ransomware attack. <a href=\"https:\/\/www.bolognafc.it\/en\/official-statement-from-the-club-3\/\" rel=\"nofollow noopener\" target=\"_blank\">Source<\/a><\/p><\/div>\n<p>The RansomHub group claimed responsibility for the hack. Later, it published the stolen data after the club refused to pay the ransom. According to the attackers, the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bologna-fc-confirms-data-breach-after-ransomhub-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">leaked information included<\/a> sponsorship contracts, the club\u2019s complete financial history, personal and confidential player data, medical records, transfer strategies, confidential data of fans and club employees, and much more.<\/p>\n<h2>December 2024: Ransomware attacks medical tissue and equipment supplier Artivion<\/h2>\n<p>\nIn December, Artivion, a global supplier of tissues and equipment for cardiac surgery, <a href=\"https:\/\/techcrunch.com\/2024\/12\/09\/us-medical-device-giant-artivion-says-hackers-stole-files-during-cybersecurity-incident\/\" target=\"_blank\" rel=\"nofollow noopener\">announced<\/a> that its IT infrastructure had been compromised by a cyberattack. The attackers encrypted some of the company\u2019s systems and stole data from affected computers.<\/p>\n<p>According to Artivion, the incident caused \u201cdisruptions to some order and shipping processes\u201d, as well as corporate operations. The company also reported being insured against such incidents, but the policy may not fully cover the damage caused by the attack.<\/p>\n<h2>How to defend against ransomware attacks<\/h2>\n<p>\nRansomware continues to evolve, and every year the attacks take on new, complex forms. Therefore, in today\u2019s world, effective protection against ransomware requires a comprehensive approach. We recommend the following security measures:<\/p>\n<ul>\n<li>Provide <a href=\"https:\/\/k-asap.com\/en\/?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">training courses<\/a> for employees so they can learn about the basics of cybersecurity.<\/li>\n<li>Implement proper data storage and <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-the-principle-of-least-privilege\/50232\/\" target=\"_blank\" rel=\"noopener nofollow\">employee access<\/a>\n<\/li>\n<li>Back up data regularly, and keep the backups in network-isolated storage.<\/li>\n<li>Install <a href=\"https:\/\/www.kaspersky.co.in\/next?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____ece28c88d9230f31\" target=\"_blank\" rel=\"noopener\">reliable protection<\/a> on all corporate devices.<\/li>\n<li>Use an <a href=\"https:\/\/www.kaspersky.co.in\/next?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kdaily_wpplaceholder_sm-team___knext____ece28c88d9230f31\" target=\"_blank\" rel=\"noopener\">XDR solution<\/a> to monitor suspicious network activity.<\/li>\n<li>Outsource <a href=\"https:\/\/www.kaspersky.co.in\/enterprise-security\/managed-detection-and-response?icid=in_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">threat detection and response to a specialist company<\/a> if your in-house information-security service lacks the resources for it.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-ransomware\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"kesb-ransomware\" value=\"27967\">\n","protected":false},"excerpt":{"rendered":"<p>$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players\u2019 data leaked, and other ransomware incidents in 2024.<\/p>\n","protected":false},"author":2726,"featured_media":28514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2036,2609,2610],"tags":[2879,2052,2047,525,1173,443,1103,97,527,268],"class_list":{"0":"post-28511","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-anti-ransomware","11":"tag-business","12":"tag-cryptomalware","13":"tag-hacks","14":"tag-leaks","15":"tag-ransomware","16":"tag-risks","17":"tag-security-2","18":"tag-threats","19":"tag-vulnerabilities"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ransowmare-attacks-in-2024\/28511\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransowmare-attacks-in-2024\/23765\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransowmare-attacks-in-2024\/28640\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransowmare-attacks-in-2024\/38984\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransowmare-attacks-in-2024\/52949\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransowmare-attacks-in-2024\/28762\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransowmare-attacks-in-2024\/34603\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransowmare-attacks-in-2024\/34231\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/anti-ransomware\/","name":"anti-ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=28511"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28511\/revisions"}],"predecessor-version":[{"id":28513,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/28511\/revisions\/28513"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/28514"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=28511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=28511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=28511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}