Cyber Security News

Ransomware Payments Hitting Record High, Exceed $1 Billion

Chainalysis, a leading blockchain analysis firm, has recently released a report on ransomware payments revealing that they have skyrocketed to a whopping $1 billion in 2023.

This alarming trend sheds light on the increasing menace of cybercrime and highlights the urgent need for enhanced security measures to curb such malicious activities.

In 2023, there was a significant increase in ransomware attacks targeting various industries, including hospitals, schools, and high-profile organizations like British Airways.

These attacks were executed using advanced techniques and tactics, causing severe damage to the affected systems, resulting in data loss, system downtime, and financial losses.

The attackers leveraged sophisticated encryption algorithms, making it difficult for the organizations to recover their data without paying the ransom.

These cybercriminals extorted a staggering $1 billion from their victims, highlighting the growing threat they pose.

Ransomware payments surpassed $1 billion, the highest ever recorded.
Protect Your Network From Data Breach

Perimeter’s 81 Malware Protection for Network Based Threats

Prevent malware from infecting your network at the delivery stage by intercepting malicious files in transit from their source to the target device’s web browser. .

The Big Game Hunters:

Now, ransomware gangs like Cl0p target fewer victims but demand millions in ransom, often using stolen data as leverage. 

This “big game hunting” strategy is fueled by RaaS models, where anyone can launch attacks.

The ALPHV-BlackCat and Scattered Spider attacks have demonstrated the bold targeting of MGM resorts. However, MGM did not pay the ransom, the business incurred damages that cost over $100 million.

Ransomware payments

Ransomware-as-a-Service (RaaS): Initial Access Brokers (IABs):

IABs break into networks and then sell access to the highest bidder – often ransomware gangs.

These combined forces are lowering the barrier to entry for cybercrime, making it easier for anyone with a few bucks to become a digital bandit.

Raas Operators

Andrew Davis, General Counsel at Kivu Consulting, added. 

“The increase in attack volume can be attributed to the affiliate model’s ease of access and the adoption of ransomware-as-a-service, a disturbingly effective business model for cybercriminals,”

Zero-Day Attack:

Cyber attackers are well-known for exploiting system vulnerabilities that are yet to be addressed by vendors. One such instance was the exploitation of the MOVEit vulnerability, which led to the exposure of millions of sensitive data records.

The security flaw in MOVEit, a file transfer software widely used by IT and cloud applications, resulted in a massive data breach that impacted hundreds of organizations and millions of individuals. This vulnerability allowed unauthorized access to sensitive data exposed to threats and attacks.

Ransom payment

Ransomware Rollercoaster 2023

Security professionals face new challenges due to changes in ransomware attacks.

The continuous efforts to combat ransomware have been yielding positive results despite the complexity of the task. There has been noticeable progress in the implementation of effective strategies to tackle this menace.

International law enforcement, security firms, and even blockchain experts are joining forces to track criminals, disrupt their networks, and help victims.

The successful collaboration in taking down The Hive serves as a significant illustration of the effectiveness of joint efforts between various technical teams.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


Sujatha is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under her belt in Cyber Security, she is covering Cyber Security News, technology and other news.

Recent Posts

Volkswagen Hacked – Hackers Stolen 19,000 Documents From VW Server

Volkswagen, one of the world's leading automotive manufacturers, has fallen victim to a sophisticated hacking…

3 hours ago

Beware Of Fake MetaMask Android Apps That Steal Login Details

Threat actors exploit fake Android apps primarily for illicit reasons, such as stealing sensitive and…

5 hours ago

CrushFTP Zero-Day Could Allow Attackers To Gain Complete Server Access

CrushFTP disclosed a zero-day vulnerability (CVE-2024-4040) affecting versions below 10.7.1 and 11.1.0. The vulnerability allows…

5 hours ago

IBM QRadar XSS Flaw Let Attackers Arbitrary JavaScript Code

A significant vulnerability was detected in IBM QRadar Suite Software and Cloud Pak for Security,…

5 hours ago

Seedworm Hackers Exploit RMM Tools to Deliver Malware

The notorious hacking group Seedworm, also known as MuddyWater, has been found exploiting legitimate remote…

5 hours ago

WordPress Plugin Flaw Exposes 10k+ Websites to Cyber Attacks

A critical vulnerability in the WP Datepicker WordPress plugin was identified, affecting over 10,000 active…

6 hours ago