-
Do you remember WannaCry in 2017? NHS was totally fucked? As were lots of other orgs globally. Here’s a reminder if not: https://www.acronis.com/en-gb/blog/posts/nhs-cyber-attack/
Unfortunately it’s nothing new when we’re talking about high profile targets that are poorly protected/running old systems.
-
Another high profile attack: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
https://www.bbc.co.uk/programmes/m000xs0h is an interesting listen.
You will never hear about most of them as organisations will often pay and/or keep quiet in other ways.
Where I work we spend quite a lot of time trying to prevent something like that from happening but even so have a plan B for if it does.
-
Total costs for ransomware run at around half that of BEC* - but nobody admits to that if they’re not legally obliged to/it goes to court somehow/someone leaks it.
Ransomware is also a fantastic way of covering your tracks with the added bonus of maybe making some money.
//* Business Email Compromise, where the attacker poses as someone trusted by the victim/s and gets them to (typically) transfer funds to an account under the attackers control
What’s your question?