Recap of the Largest Ransomware Attacks in 2024

Hackers focused their efforts on ransomware in 2024, leading to a surge in ransom demands. “With nearly 439 million dollars paid out globally just in the first half of 2024 to ransomware operators, this number is expected to double by the end of the year.”

Preventing ransomware starts with monitoring all critical enterprise hosts, applications, devices, and databases for suspicious activity. Leveraging managed detection and response (MDR) services from ForeNova empowered the enterprise with a partner who is an expert in recognizing very early signs of ransomware and leveraging automated incident response to contain the attack before lateral propagation.

Interested in learning more about ForeNova’s NovaMDR service?

Click here to schedule a demo of this incredible service.

What Were the Top Ransomware Attacks in 2024 Globally?

Global financial institutions, national healthcare providers, and local manufacturers became ransomware victims in 2024. Hackers also exploited DeFi and smart contract platform vulnerabilities using email phishing to embed ransomware within the hosts, impacting the blockchain security model.

Another significant contribution to the rise in ransomware in 2024 continued with hackers adopting more adversarial artificial intelligence (AI) and machine learning (ML). Hackers leveraged AI to create well-crafted email phishing attacks, resulting in credential theft, malware embedding on host machines, and data exfiltration.

In 2024, there continued to be many ransomware attacks globally, with the average ransom amount per incident and total payout rising significantly.

1. VOSSKO – German Food Processing

VOSSKO was targeted with ransomware that encrypted its internal systems and databases. Although some operational processes were disrupted, the impacted operational technology systems and production were restored.

Following the incident, the internal IT team and several external experts collaborated to address the situation. Shortly after, the police and State Criminal Police Office, IT specialists, and forensic scientists also participated in the attack investigation.

2. Japan Port of Nagoya

“The ransomware attack on Japan’s busiest port encrypted vital data, disrupting operations and severely impacting cargo handling and customs processes, leading to shipment delays and a ripple effect in international trade.”

This port also suffered a similar cyberattack in 2013.

3. CDK – North American Car Dealerships

CDK Global, a primary software provider for North American car dealerships, was hit by a BlackSuit ransomware attack, forcing dealerships to revert to manual processes for sales.“

This ransomware attack impacted registrations and transactions, along with disclosing customer information, including addresses, social security numbers, and financial data. The attack cost dealers across the country millions in lost car sales, along with countless lawsuits from dealerships against CDK.

Ultimately, CDK Global paid a $25 million ransom in cryptocurrency to gain access to their files.

4. Indonesia National Data Center

“The Brain Cipher ransomware group attacked Indonesia’s National Data Center, disrupting essential government services, including airport immigration processing.”

The incident encrypted sensitive data and halted operations, revealing the vulnerability of national infrastructure to advanced cyber threats. Indonesia, like other developing nations, continues to be a target of global hackers. These developing nations continue to struggle to upgrade their national and local computer systems with updated cybersecurity tools.

5. Latitude Financial Services – Australia

“Attackers stole 14 million records from Latitude Financial, including sensitive data.”

 The company refused to pay the ransom, following Australian policies, believing it wouldn’t guarantee data recovery and could lead to more attacks. They focused on system restoration, customer outreach, and improving cybersecurity. Latitude did recover their data without having to pay the ransom.

6. Global Non-Profit Organization Easter Seals Supporting Orphans

A non-profit, Easter Seals, supporting orphans, was hit by ransomware, encrypting sensitive files like children’s photos and medical records. The attackers initially demanded a crippling ransom but reduced it upon realizing the organization’s non-profit status.

7. UK Military

“Cybercriminals breached the UK Ministry of Defence’s payroll system, compromising the sensitive personal information of 270,000 current and former military personnel.” Like attacks against the United States security clearance database system, UK military personnel’s home addresses, ID numbers, and other information became disclosed in this breach.

What Countries Faced the Most Impactful Ransomware Attacks in 2024?

Ransomware is a global cybersecurity problem. Several countries continue to report increases in ransomware attacks. Here is a breakdown of what countries faced the most ransomware attacks in 2024.

In 2024, Europe experienced a 64% YoY increase in ransomware attacks, followed by Africa at 18%, while North America remains the hardest hit with 59%.”

Germany

“The BSI report highlights critical trends in Germany’s cybersecurity. Between mid-2023 and mid-2024, an average of 309,000 new malware variants were found daily, a 26% rise from the prior year.”

France

In 2024, 74% of organizations in France faced a cyberattack, down 11% from the prior year. In 2023, 97% of those affected restored their encrypted data.

Italy

According to data from Disline, based on the Clusit 2024 report, Italy experienced many ransomware attacks in 2024. There were 310 severe attacks, representing an increase of 65% compared to 2022, accounting for 11% of global attacks.

Key points about ransomware attacks in Italy in 2024:

  • The overall number of severe attacks: 310
  • Percentage of global attacks: 11%
  • The increase compared to 2022: 65%

Africa

Ransomware and digital extortion are on the rise, with over half of African member countries reporting attacks against their critical infrastructure.

“1 out of every 15 organizations in Africa experienced a ransomware attempt weekly during the first quarter of 2023. This is even higher than the global weekly average.”

African member countries have taken positive steps to enhance their resilience to ransomware attacks. However, persistent challenges remain, notably in reporting attacks and paying ransoms.

What Sectors Were Impacted the Most by Ransomware in 2024?

Ransomware impacts every industry worldwide. Here are the top five industries affected the most by ransomware.

1. Government

In 2024, government agencies were the top target for ransomware attacks, often due to threats from nation-states or the sensitive data they handle. As providers of essential services for communities and governments, disruptions in this sector can significantly impact public safety and national security.

2. Healthcare

“In 2024, healthcare organizations faced over 240 attacks and often paid 111% of the ransom demanded.”

This sector saw an increase in attacks from 60% to 67% even with the industry spending close to $125 billion from 2020 to 2025 on cybersecurity defensive tools.

3. Education

“The education sector has experienced a significant rise in ransomware attacks, with a 70% surge in 2023.” In 2024, it remains a top target, totaling 195 attacks, which includes a 105% increase against K-12 and higher education.

4. Manufacturing

Manufacturing faced over 160 attacks, with 67% able to negotiate ransom payments down. However, 74% of these attacks involved data encryption.

5. Energy

The energy sector is essential to national infrastructure, making it a high-value target that has faced 35 attacks, accounting for 67% of all ransomware incidents since 2023.

What Impact Did Ransomware-as-a-Service (RaaS) Have in 2024?

Like IT outsourcing, hackers will use Ransomware-as-a-Service (RaaS) providers to help execute their attacks. They will pay for these services using cryptocurrency. Many RaaS were behind many of the top attacks in 2024. LockBit, Darkside, REvil, Ryuk, and Hive are some of the top RaaS gangs globally. They were responsible for the U.S. Colonial Pipeline attack, JBS USA, Microsoft, and the attack on the Costa Rican Government.

The Future of Ransomware in 2025

The geopolitical landscape of 2024 continues to be shaped by the armed conflicts between Russia and Ukraine and Israel and Hamas. Cybercriminals are exploiting these situations, causing significant international repercussions. These conflicts have turned cyberspace into a battlefield, merging cyber tactics with traditional military actions, heightening tensions, and expanding the damage.

The Russia-Ukraine war has utilized hybrid techniques, with both sides employing hacktivism and cyberattacks to shape geopolitical outcomes. Pro-Russian and pro-Ukrainian groups have targeted governments, businesses, and individuals supporting their adversaries.

What is the Role of MDR in Addressing the Rise in RaaS Coming in 2025?

Global, regional, and local organizations have much in common regardless of industry. They all become ransomware victims, partially due to a lack of qualified cybersecurity engineering talent. MDR providers like ForeNova deliver several security operations (SecOps) service offerings to help these organizations with several critical functions:

  • 24×7 continuous monitoring
  • Automated incident response with 3rd party integration
  • Monitoring endpoint devices
  • Assisting with compliance reporting
  • Futureproofing with continuous investment in new tools and capabilities

Another challenge for these organizations is accessing sustainable budgets to handle cyberattack growth. MDR offerings are cost-effective and relieve numerous capital expenditures through their services model.

Why ForeNova?

Experience across industries and global threats, including ransomware, phishing, and credential theft. NovaMDR by ForeNova provides services across the European Union (EU) and other geolocations.

Interested in learning more about NovaMDR? Click here to schedule an initial consultation today!

ForeNova Achieves ISO/IEC 27001:2022 Certification 

We are proud to announce that ForeNova has achieved ISO/IEC 27001:2022 certification for our Information Security Management System (ISMS). This certification validates our dedication to continuously maintaining high standards of security as a company and in delivering value to our customers. 

What This Means for Our Customers 

This certification represents our commitment to top-level security, meeting international standards in protecting sensitive information and managing security risks. 

We believe in being open with our customers about our security practices, and this certification demonstrates our willingness to subject our processes to independent verification and validation. 

The ISO/IEC 27001:2022 framework ensures we maintain and continuously enhance our security practices to address evolving cyber threats. 

Our Commitment to Small and Medium Enterprises 

Small and medium enterprises often find themselves particularly vulnerable to cyberattacks due to the sophistication and speed of evolving cybercrime. Our ISO/IEC 27001:2022 certification reinforces our promise to provide enterprise-grade security solutions that are: 

  • Reliable and trustworthy 
  • Continuously monitored and updated 
  • Backed by internationally recognized standards 

Get in Touch 

If you’d like to learn more about our managed detection and response services, please don’t hesitate to contact our team. We’re here to help protect your business from today’s cyber threats. 

Electronic Health Record Data Protection with MDR

Enabled by the Appointment Service and Supply Act of 2019, this mandate required all German health insurance funds to migrate to an electronic health record system (EHR). EHR systems extend access to policyholders. Policyholders establish access to their records and update the information without notifying the insurance provider.

Protecting EHRs with seamless integration is a highly complex process. Compared to most other countries in the European Union (EU) and the rest of the world, the German health system’s rollout of EHRs faces many headwinds surrounding legal issues, challenges with telematics, and compliance and regulatory mandates.

Securing the data still falls upon the health insurance companies only if the record is an EHR. Most of Germany has a public health system, and less than 10% have private insurance. Connections between various digital health providers and the EHR holder continue to be a work in progress.

EHRs are still a choice. Others we choose to maintain their personal health record, or PHR.

Securing an EHR and a PHR still requires the insurance funds to enable a cross-section of cybersecurity controls to align EU and global compliance regulations, cybersecurity threats, and security gaps. Insurance firms struggling with hiring and keeping security operations talent should consider a managed detection and response (MDR) offering from security providers like ForeNova.

Overview of Electronic Health Records for Germany

Germany’s progression into the world of EHRs for the healthcare sector remains a work in progress. In 2023, there were less than 600,000 EHRs in the country. Part of the challenge with the EHR rollout had to do with patent rights on where they wanted their data stored and who had access.

The challenge continues with the ability of the EHR systems to extend granular access to the medical record based on the criteria set by the data owner. The lack of granularity created negativity towards the initiative.

Many also criticized EHR for the lack of technical standards regarding stability within critical infrastructure, interoperation with other systems, and the ability to support cross-border collaboration with other EU members.

The Office of Health Ministry discovered one challenge within the digital transformation strategy for EHR was the focus on too much technology and less on understanding the consumers of the solution. As part of the enrolling process, the patients were required to grant consent without clearly understanding the entire process. During the rollout of EHR, the health insurance providers offered no incentives for sensitive patients not trusting EHR solutions, thus resulting in a very low enrollment, especially from people who struggle to grasp the security-related questions.

Another issue that raised concerns among many in the German healthcare industry was the lack of public information provided to the patients surrounding how EHRs work and security protection.

Lack of interpretability, low patent turnout, and confusion about cross-border collaboration all resulted in the entire EHR becoming a target for hackers.

What Regulations Govern EHR In Germany?

“The German healthcare system has three levels: legal framework, self-administration, and individual players. Federal, state, and local governments manage the legal framework, with the Federal Ministry of Health overseeing health policy at the federal level.”

Multiple laws establish the digital framework for Germany’s healthcare system, specifically for EHR implementation and healthcare data usage. “The General Data Protection Regulation (GDPR) and Federal Data Protection Act (BDSG) also apply.” The E-Health Act, effective 29 December 2015, lays the foundation for digitalization in this sector.

Compliance with GDPR in EHR Management in Germany

GDPR plays a significant role regarding data ownership and protection for all citizens in Germany. People, not the Federal Ministry, own their data, and by law, they are the ones who extend permission for access.

Germany’s Federal Parliament, the Bundestag, enacted the Patient Data Protection Act (PSDG), which applies to all healthcare institutions—hospitals, doctors, insurers, and pharmacies—using the telematics infrastructure for patient data processing, regardless of organizational size.

Germany’s Federal Commissioner for Data Protection has warned health insurers that PSDG compliance doesn’t exempt them from GDPR. The Federal Health Ministry will ensure that German citizens retain their rights regarding health records under GDPR.

What is OpenEHR in Germany?

In Germany, OpenEHR is an open-standard platform for managing electronic health records (EHRs). It facilitates seamless data exchange among healthcare providers through standardized clinical models. This vendor-neutral approach enhances data interoperability and patient-centric care, which is vital to the country’s digital health infrastructure development.

  • OpenEHR’s goal is to better assist German health insurance providers in rolling out EHRs, leveraging more open-source functions to improve the interoperability between platforms and providers and help promote better cross-border collaboration.
  • OpenEHR employs a dual model approach for Hospital Information Systems, ensuring semantic interoperability and providing a holistic solution for Electronic Healthcare Record systems.
  • “OpenEHR incorporates elements of interoperable, secure EHR software, and its proponents advocate it as the optimal approach for developing hospital information systems.”

There are 50 GDPR requirements and 8 OpenEHR design principles. OpenEHR principles meet 30% (15/50) of GDPR requirements and align with GDPR standards.

Top Security Challenges Protecting EHR in Germany?

Top cybersecurity challenges protecting EHR in Germany include ransomware, phishing, insider threats, data breaches, medical device vulnerabilities, legacy systems, complex data sharing, and healthcare professional awareness. GDPR and other compliance help reduce the risk of cybersecurity attacks against EHR by requiring extensive protection layers, consent, and continuous monitoring.

Fake authorizations between the data owner and the healthcare provider in Germany continue to be a concern. Even with the enablement of a PIN code, fake authorizations continue to cause unforeseen data breaches.

Top EHR Breach in Europe in 2024?

Cybercriminals target healthcare records for the vast personal data they hold, including protected health information, full names, birth dates, and home addresses.

Hackers can easily commit identity theft by accessing healthcare providers’ information and selling it because of its high value. Many healthcare organizations need to switch to digital records more quickly. Although many have already made the switch, some still use old technology and have weak cybersecurity.

Hospital Simone Veil in Cannes, France, 2024

Simone Veil, a regional hospital, manages 150,000 outpatients and 50,000 emergencies annually. Most services continued, but communication and data handling relied on outdated methods. Initially thought to be a ransomware attack, it took weeks for confirmation. On April 30, the hospital revealed the LockBit 3.0 group was behind the extortion attempt.

Hospital Simone Veil declined to pay.

Who Manages Telematics Infrastructure in Germany?

Telematics infrastructure (TI) and healthcare systems must guard against external threats and internal negligence. They must deploy and maintain cybersecurity measures like firewalls, antivirus software, and strong passwords. This mandate also includes preventing the unnecessary local storage of sensitive data and avoiding sharing through unauthorized channels like email or file sharing.

Specifically to EHR, the Federal Ministry of Health owns 51% of TI provider Gematik, which manages the telematics infrastructure, electronic health card, specialized applications, and an interoperability directory while overseeing data security.

Gematik GmbH coordinates its TI applications with the Federal Commissioner for Data Protection and Freedom of Information (BfDI) and the BSI, following the German Social Security Code (SGB).

The Role of MDR in Protecting EHRs

Because of a cybersecurity talent gap, many organizations seek help to hire and keep skilled professionals. Because managing today’s complex cyber threats often requires expertise that is not readily available in-house, this lack of talent has led many businesses to outsource security functions.

Many MDR services tackle cybersecurity challenges. MDR provides external teams with specialized expertise, serving as an outsourced Security Operations Center (SOC). This solution enables organizations to leverage expert security operations without the costs and complexities of developing an internal team. It’s a strategic choice that meets today’s IT security needs, where agility and specialized skills are crucial against advanced threats.

TI providers, healthcare insurance funds, and medical providers in Germany continue to face resource shortages, overlapping and complex compliance mandates, and continuous alterations to the existing German regulatory mandates and new compliance frameworks coming in the current year.

MDR service engagements create opportunities to assist TTIs and health providers with various offerings that align with their business, compliance, and security operations needs.

  • 24/7 continuous monitoring
  • Automated detection and incident response
  • Firewall deployment, management, and future-proof
  • Endpoint security management
  • Compliance reporting
  • Access to Threat Intelligence

Beyond creating the various service offerings, ForeNova’s most important attribute is its people. The company takes pride in staffing experienced security operations engineers to support the complex world of the German healthcare system.

ForeNova also provides world-class cybersecurity security integration advisory services combined with technical offerings. Healthcare and tech companies that still use old technology and methods can use ForeNova’s consulting team to improve their cybersecurity. This helps them move from reacting to problems to preventing them.

Why ForeNova?

One key element that separates one MDR provided from another is experience. MDR providers that support every vertical market are more of a one-size-fits-all model. ForeNova’s unique ability to create an MDR engagement tailors it explicitly to their clients’ needs.

Want to see a demo of this incredible MDR offering? Click here to schedule a session with the ForeNova engineering team today!