Power Rankings: Ransomware Malicious Quartile Q3-2024

Research
Written by
Anthony M. Freed
Published on
Oct 16, 2024

In 2023, a staggering $1 billion in ransom payments was recorded, setting a record largely due to high-profile cyberattacks. Two of the most notable incidents involved Cl0p, a notorious ransomware group that exploited vulnerabilities in a file transfer tool, and BlackCat/ALPHV, which orchestrated a significant attack on Caesars Entertainment’s hotel properties.  

This surge in ransom payments highlights the escalating scale and severity of ransomware attacks targeting organizations across various sectors. The situation has worsened significantly in 2024.  

By the midpoint of the year, ransomware payments reached a staggering $459 million, according to a report by Chainalysis. This figure represents a $10 million increase over the same period in 2023, reflecting a concerning upward trend in ransomware-related extortion.

The growing financial impact underscores the heightened capabilities of ransomware groups and the increased pressure on victims to pay.

One of the most alarming developments is the spike in ransom demands from some of the most dangerous ransomware groups. In early 2023, the median ransom payment stood at $198,939. However, by mid-2024, this figure skyrocketed to $1.5 million.  

This sharp increase suggests that ransomware operators have become more adept at infiltrating deeper into targeted networks and exfiltrating sensitive data. By leveraging this stolen information, cybercriminals exert greater pressure on organizations to comply with their demands, often threatening to release critical or damaging data if ransoms are not paid.

Blockchain analysts have also uncovered evidence of a record-breaking ransom payment, with one victim organization paying a colossal $75 million in response to a single attack. This aligns with research from other cybersecurity firms, which reported a median ransom payment of $2.2 million for 49 state and local governments in the first half of 2024.  

These figures illustrate the increasing financial stakes, especially for public sector entities that may be particularly vulnerable to cyberattacks.

In parallel with the rising costs, the frequency of ransomware attacks has increased by 10% in 2024 compared to the previous year. Despite the rising number of incidents and the growing ransom amounts, there is evidence to suggest that fewer victims are opting to pay.  

This could be due to a combination of factors, including improved recovery strategies, cybersecurity awareness, and reluctance to fund criminal enterprises. However, even with fewer payments, the overall impact remains severe.

The rise of ransomware as an industry poses an unprecedented threat. The combination of more sophisticated attackers, evolving ransomware variants, and escalating ransom payouts has created a dangerous environment for businesses and governments alike.  

The financial losses inflicted on organizations are staggering, and these costs are not isolated to the companies targeted—they will ultimately trickle down to consumers through increased costs for goods and services, as well as higher insurance premiums.

Moreover, the true financial toll of ransomware attacks may be significantly underreported. According to FBI estimates, based on intelligence gathered during their infiltration of the Hive ransomware group, only about 20% of ransomware attacks are actually reported to law enforcement.  

This suggests that the actual economic damage could be much higher—potentially closer to $5 billion when factoring in unreported incidents.

It is important to note that this $5 billion estimate only accounts for ransom payments. It does not include the additional costs of recovery, which can be immense. For instance, the Change Healthcare ransomware attack resulted in recovery costs exceeding $1 billion, underscoring the immense burden organizations face in the aftermath of such incidents.  

These costs go beyond immediate financial outlays and include longer-term consequences like brand damage, potential lawsuits, and regulatory fines—all of which can have lasting impacts on an organization’s reputation and financial stability.

Ransomware has evolved into a massive, highly organized industry, with devastating economic consequences. The financial burden affects businesses, governments, and consumers alike, creating a significant drag on the global economy.  

To curb the growth of this industry, it is essential to make ransomware operations less profitable for attackers. Unfortunately, this remains a distant goal, as cybercriminals continue to exploit weaknesses in cybersecurity defenses.

One of the key strategies employed by ransomware groups is the exploitation of unpatched vulnerabilities and misconfigurations within systems. Threat actors have become increasingly efficient in automating their attacks, allowing them to target a larger number of victims more quickly.  

The mass exploitation of vulnerabilities such as those found in MoveIT, GoAnywhere, and Citrix Bleed are stark reminders of how many of these attacks could be prevented if organizations prioritized timely patching.

To build resilience against ransomware, organizations must strategically invest in maintaining business continuity and ensuring rapid recovery from attacks. This involves not only securing networks but also developing robust contingency plans to minimize downtime and financial loss.

Without these investments, companies will continue to fuel the ever-growing ransomware economy, which thrives on the vulnerabilities of underprepared organizations. In the absence of a comprehensive approach to combating ransomware, the economic toll will continue to rise, with no signs of slowing down.

While we cannot stop ransomware attacks, we can prevent them from being successful.

This is why the Halcyon team of ransomware experts has put together this extortion group power rankings guide as a quick reference for the extortion threat landscape based on data from throughout Q3-2024, which can be reviewed along with earlier reports here: Power Rankings: Ransomware Malicious Quartile.

Q3-2024 Trends

Some interesting trends emerged in the third quarter of 2024:

Crisis Deepens

Ransom Debate Continues

  • CISA Director Says Ransom Payment Ban Unlikely: The Director of CISA said it is unlikely the U.S. government would issue a formal ban on ransom payments to ransomware operators despite the fact that such a ban would diminish the financial incentives for further attacks.

Data Exfiltration Focus

Legal and Regulatory Repercussions

Evolving TTPs

Takeaway

Ransomware attacks have become one of the most devastating threats to modern businesses, often bringing operations to a complete standstill. When critical systems and sensitive data are seized, an organization can find its daily processes crippled.

The impact goes beyond the immediate disruption; lost revenue, missed opportunities, and long-term damage to the company’s reputation are just the beginning.

For many businesses, especially smaller ones, the downtime caused by ransomware can be catastrophic, forcing temporary or even permanent closures, with lasting repercussions that may be impossible to recover from. Larger corporations may have the resources and resiliency to endure such disruption. However, for small and medium-sized enterprises (SMEs), the consequences can be existential.

Unlike bigger companies, SMEs often lack the financial reserves or technical capability to spend weeks recovering their systems. A prolonged shutdown could spell the end of operations, as they struggle to absorb the cost of getting back online and repairing the damage.  

Ransom demands vary widely, ranging from thousands to tens of millions of dollars, depending on the size and sector of the targeted company. However, the ransom is only part of the financial impact. The costs associated with incident response—hiring specialized cybersecurity teams, consulting legal experts, and dealing with potential regulatory fines—can quickly escalate.  

Moreover, these figures do not encompass the full scope of the damage. Beyond the immediate financial hit, there are tangential costs that can be even more severe. These include long-term brand damage, eroded consumer trust, and increased cyber insurance premiums. Legal fees and ongoing litigation can further stretch an organization’s resources. Revenue lost due to system downtime can sometimes exceed the direct costs of remediation. Unlike tangible losses, these are difficult to predict or budget for, leaving many companies vulnerable to financial ruin.  

Ransomware attacks also pose significant risks in terms of intellectual property (IP) and regulated data. Once attackers gain access to a company’s systems, they do not merely lock files—they often steal the data, threatening to leak it publicly unless the ransom is paid. For many organizations, particularly those dealing with sensitive customer information, this kind of exposure brings regulatory implications. Failure to adequately protect customer data can lead to lawsuits, regulatory fines, and irreparable reputational damage.  

The theft of proprietary business data—such as patents, trade secrets, or confidential transaction information—can be just as damaging. Attackers frequently sell such information on dark web forums, where the highest bidder could gain access to a company’s most valuable assets.  

Data exfiltration—removing sensitive data from a company’s systems before encrypting them—has become a common tactic in ransomware attacks. This significantly increases the pressure on the victim to pay the ransom. Even if an organization is prepared to recover from the initial attack, the fact that sensitive data has been stolen puts them at ongoing legal and financial risk.  

Regulatory obligations to report data breaches vary by jurisdiction and industry, but failure to do so in a timely manner can result in hefty fines and legal consequences. In some cases, companies may face class action lawsuits, particularly when customer data has been compromised.  

Paying the ransom is far from a guaranteed solution. Cybersecurity experts widely advise against it, as it not only funds criminal enterprises but also does not guarantee the recovery of encrypted data. The bad news is that attackers may still choose to sell or expose stolen data even after receiving payment. As a result, organizations are left facing both immediate and long-term challenges, with no assurance of a positive outcome even if they comply with the attackers’ demands.  

Ransomware operators have also evolved their tactics to maximize the financial impact. Increasingly, attackers exploit opportunities to extract multiple payments from a single attack, targeting not just the initial victim but also their partners, vendors, and customers. Exfiltrated data can be leveraged to extort these third parties, widening the attack’s financial and reputational damage.

Organizations must prioritize both prevention and resilience. This includes implementing strong encryption protocols, access controls, and continuous employee training to minimize the likelihood of an attack. Yet, prevention alone is not enough—organizations must also be prepared to respond swiftly and effectively when an attack occurs.

The Halcyon Mission: Defeat Ransomware

Halcyon is the only cybersecurity company that eliminates the business impact of ransomware. Modern enterprises rely on Halcyon to prevent ransomware attacks, eradicating cybercriminals’ ability to encrypt systems, steal data, and extort companies. Backed by an industry-leading warranty, the Halcyon Anti-Ransomware Platform drastically reduces downtime, enabling organizations to quickly and easily recover from attacks without paying ransoms or relying on backups. For more information on how Halcyon efficiently and effectively defeats ransomware attacks, contact an expert here or visit halcyon.ai to request a free consultation.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.