Who is behind the latest wave of UK ransomware attacks?

Ransomware attacks in the UK hit record levels last year, according to data by the Information Commissioner’s Office. These attacks potentially exposed the private information of over 5.3 million individuals across more than 700 organisations. Unfortunately, this concerning trend has continued into this year, with prominent companies and public bodies falling victim to ransomware attacks […]
Paying a ransom ‘doubles stolen data recovery costs’

76% of ransomware attacks against organisations resulted in adversaries succeeding in encrypting data – and when a ransom is paid to get data decrypted, victims end up doubling their recovery costs ($750,000 in recovery costs versus $375,000 for organisations that used backups to get data back). That’s according to the latest annual State of Ransomware […]
Financial, retail, healthcare and manufacturing suffer revenue losses following ransomware attacks

More than half of organisations have been the victim of a ransomware attack – In the UK specifically, 305 companies were contacted and 84% of businesses that chose to pay a ransom demand suffered a second ransomware attack, often at the hands of the same threat actor group (53%). The research, conducted by Cybereason, also […]
Biggest ransomware attack in history cripples NHS

The Government and NHS bosses have been called upon to answer questions as to how hospitals were allowed to become victims of a global cyber attack that took down services and caused chaos during the weekend. Hackers demanding a ransom managed to infiltrate the NHS’ computer systems, forcing operations and appointments to be cancelled, as […]
Ransomware risk to businesses ‘significant and growing’, says the NCA

A joint report by the National Crime Agency (NCA) and National Cyber Security Centre (NSCC) has declared that the risk to businesses from ransomware is “significant and growing” as criminals find new ways to target companies and individuals for money. Ransomware is a computer malware that installs covertly on a victim’s device that either holds […]