December 5, 2024 By Mike Elgan 2 min read

The year 2024 saw a marked increase in the competence, aggression and unpredictability of ransomware attackers. Nearly all the key numbers are up — more ransomware gangs, bigger targets and higher payouts. Malicious ransomware groups also focus on critical infrastructure and supply chains, raising the stakes for victims and increasing the motivation to cooperate.

Here are the biggest ransomware stories of 2024.

Ransomware payments reach record high

Ransomware payments surged to record highs in 2024. In the first half of the year, victims paid a staggering $459.8 million to cyber criminals. The largest single ransom payment ever revealed was $75 million paid to the Dark Angels ransomware group by an undisclosed Fortune 50 company.

In addition, the median ransom payment skyrocketed from less than $199 thousand in early 2023 to $1.5 million in June 2024. The average ransom demand in 2024 also saw a significant increase, rising to $2.73 million, nearly $1 million more than in 2023.

Despite these record-breaking payouts, there was a 27.27% year-over-year decline in the number of ransomware payment events. That means that while fewer organizations pay ransoms, those who do pay face much higher amounts. The main reason is that ransomware gangs target larger organizations and critical infrastructure providers, focusing on high-profile attacks and yielding bigger payouts.

Ransomware attacks affect the health of healthcare

Ransomware attacks on healthcare organizations surged dramatically in 2024, with 264 attacks recorded in just the first three quarters of 2024. Some two-thirds (67%) of surveyed healthcare institutions reported being impacted by ransomware attacks, up from 60% in 2023. The average ransom demand per attack exceeded $5.2 million in the first half of 2024, with some high-profile incidents demanding up to $25 million. Recovery times have also increased, with only 22% of victims fully recovering within a week, down from 47% in 2023.

Read the Threat Intelligence Index

Starbucks hit by grande supply chain attack

Supply chain management software provider Blue Yonder was victimized by a ransomware attack on November 21, 2024. The attack disrupted customers, including coffee giant Starbucks and its 11,000 or so United States stores. Starbucks’ ability to manage employee schedules and track work hours was affected, forcing the high-tech company to use pen and paper for scheduling and affecting payroll. Blue Yonder is working with external cybersecurity firms to investigate, but as of November 25, the company still does not have a timeline for restoration.

New ransomware groups emerge despite crackdowns

This year saw a 30% year-over-year increase in the number of active ransomware groups despite law enforcement crackdowns. Secureworks’ annual State of the Threat Report reveals that 31 new groups entered the ecosystem in just 12 months. When one group, such as LockBit, is suppressed by law enforcement, another, such as RansomHub, emerges to fill the vacuum. It’s a game of Whack-a-Mole for authorities.

Ransomware attackers hit U.S. ports

Ransomware attacks on U.S. ports increased in 2024 in both frequency and sophistication. The Port of Seattle, for example, was attacked in August, causing major disruption. The U.S. government responded assertively. In February 2024, President Biden signed an executive order expanding the U.S. Coast Guard’s authority to address cybersecurity incidents in the maritime sector and mandating more robust digital defenses for port operators.

The importance of cybersecurity has never been higher. With ransomware groups’ increased sophistication and capability, defenders increasingly need AI threat detection and, indeed, AI cybersecurity solutions in general, as well as cybersecurity best practices across the organization.

More from Risk Management

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

How cyberattacks on grocery stores could threaten food security

4 min read - Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have not yet been publicly released.Because the attack affected many digital systems, some stores were not able to accept credit/debit cards, while others had to shut…

Taking the fight to the enemy: Cyber persistence strategy gains momentum

4 min read - The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enough to secure cyberspace.The momentum behind this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today