VISUALIZED: Map of Ransomware Attacks Since 2018

VISUALIZED: Map of Ransomware Attacks Since 2018


Each dot represents the location of a ransomware attack, with the size of the dot depicting the number of records impacted. 

This map updates weekly and pinpoints the locations of each ransomware attack in the US, from 2018 to present day. Where available, it includes the ransom amount, whether or not the ransom was paid, the entity and industry that was targeted, and the strain of ransomware used. Our researchers search through state reports, industry news, and cybersecurity databases to find the latest ransomware attacks on US businesses, healthcare organizations, educational institutions, and government agencies.

In our industry-specific reports, we found:

Supply Chain Vulnerability! Meatpacker JBS Hit with Ransomeware Attack

These ransomware cyber attacks against critical U.S. infra-structure (Energy and Food production/Distribution to name a couple) are going to begin being more frequent and severe in the coming months.

Prepare Accordingly.

Remember your OODA Loop: Action always beats Reaction.


Today I posted this news at ‘Frauds & Crooks’ but since I have so often written about JBS, and the other big meatpackers pushing for more refugee resettlement because they need the cheap and captive refugee laborers, the post could just as well have been posted here at RRW.

Supply Chain Vulnerability! Meatpacker JBS Hit with Ransomeware Attack — Refugee Resettlement Watch

Ransomware: Pay Us or your Data Dies


This is the new era of crime folks, Hackers (and Tech Companies) holding data hostage. Ultimately, like always, it is the average person, in this case, the sick people in these hospitals, who suffers. Crime is Crime, I don’t care how it is facilitated.

The Hollywood Presbyterian Medical Center in Los Angeles has announced that it paid hackers 40 bitcoins ($17,000 USD). The criminals had used malicious software to encrypt the hospital’s records, and held the key to decrypt the files for ransom.

The hospital was infected with the software, commonly called “ransomware,” on Feb. 5. Presumably, someone on the hospital network opened an email attachment or clicked a link they shouldn’t have. From there, a message typically appears on the infected computers, demanding payment to restore access. There’s usually a deadline.

Once infected, the hospital reportedly had to send some patients to other hospitals, and go back to paper to process visits.

A ransomware attack at this scale, which could potentially put lives at risk, has so far been uncommon. The targets have largely been individuals and small organizations, and the payments demanded are usually under $1,000. And the Federal Bureau of Investigation, at least according to one agent, often advises victims to just pay the ransom if they want their files back.

Indeed, this was the case for Hollywood Presbyterian. The hospital’s CEO said in a statement Wednesday night (Feb. 18) that paying the criminals was “the quickest and most efficient way to restore our systems and administrative functions.”

And now, everything is back to normal. “HPMC has restored its electronic medical record system (“EMR”) on Monday, February 15th,” the CEO said in the statement. “All systems currently in use were cleared of the malware and thoroughly tested.”

 Read the Original Article at QZ