{"id":89137,"date":"2024-07-31T08:00:14","date_gmt":"2024-07-31T15:00:14","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=89137"},"modified":"2024-08-02T06:20:59","modified_gmt":"2024-08-02T13:20:59","slug":"ransomware-risk-current-state","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/","title":{"rendered":"The Current State of Ransomware Risk"},"content":{"rendered":"<p>Ransomware risk is top of mind for citizens and CISOs alike. From the board room to the room known as the \u2018SOC\u2019, everyone is feeling the pain of disruption. Being locked out of a system and forced back to pen and paper is shocking to our working lives. Too often, it is delaying a much-needed surgery or forcing manual intervention where a digital avenue was easy and efficient.<\/p>\n<p>But the effects of ransomware don\u2019t appear to be going anywhere soon.<\/p>\n<p>Digital extortion-based attacks are on a steady rise and its impact is being felt across every industry, including those in <a href=\"\/glossary\/critical-infrastructure\/\">critical infrastructure<\/a>. <a href=\"\/research-labs\/\">Forescout Research \u2013 Vedere Labs<\/a> has observed <strong>2,676 attacks through June<\/strong> of this year. The data is compiled via open-source tracking of ransomware leak sites. This is <strong>an increase of 15%<\/strong> from last year and is equal to <strong>446 attacks per month<\/strong> or <strong>15 per day<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-89140\" src=\"\/wp-content\/uploads\/2024\/07\/ATTACKS-PER-MONTH.jpg\" alt=\"\" width=\"1200\" height=\"auto\" srcset=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/ATTACKS-PER-MONTH.jpg 1786w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/ATTACKS-PER-MONTH-300x183.jpg 300w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/ATTACKS-PER-MONTH-1024x625.jpg 1024w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/ATTACKS-PER-MONTH-768x469.jpg 768w, https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/ATTACKS-PER-MONTH-1536x937.jpg 1536w\" sizes=\"(max-width: 1786px) 100vw, 1786px\" \/><\/p>\n<p>Every day, it seems, there are new reports of extortionists being paid off by large enterprises or municipal government systems being shut down by attackers. Claims of the largest ransom ever paid \u2013 $75 million \u2013 have been <a href=\"https:\/\/securityboulevard.com\/2024\/07\/report-an-18-increase-in-ransomware-attacks-includes-75m-payment\/\">published<\/a> by researchers at Zscaler. This amount is nearly double the highest known payment of $40 million <a href=\"https:\/\/www.insurancejournal.com\/news\/national\/2021\/05\/21\/615373.htm\">made by US insurer CNA in 2021<\/a>.<\/p>\n<p>CDK Global, a software company that serves the automotive dealership industry, recently paid $25 million in equivalent Bitcoin after a ransomware incident in June, according to <a href=\"https:\/\/www.spiceworks.com\/it-security\/data-security\/news\/cdk-global-outage-ended-after-paying-ransom\/\">Spiceworks<\/a>. But not every organization will pay up.<\/p>\n<p>The Florida Department of Health was hit by the ransomware group <a href=\"https:\/\/www.forescout.com\/blog\/analysis-a-new-ransomware-group-emerges-from-the-change-healthcare-cyber-attack\/\">RansomHub<\/a> recently with a threat of revealing 100 gigabytes of citizen information. The state has only confirmed the state\u2019s online Vital Statistics system, used to issue birth and death certificates, was inaccessible. Though Florida has a standing policy of not paying digital extortion, data on over 10 million Floridians has been obtained by hackers in the last three years, per <a href=\"https:\/\/tampabay.com\/news\/florida-politics\/2024\/07\/03\/florida-health-ransom-cyber-attack-desantis-ransomhub\/\">The Tampa Bay Times<\/a>.<\/p>\n<p>Cities and municipalities across the US are experiencing this rash of ransomware: Columbus, Ohio. The Los Angeles County Superior Court system. And smaller towns and cities, including Forest Park, Georgia, and Newcastle, Washington have all been recently attacked, according to <a href=\"https:\/\/therecord.media\/columbus-ohio-cyber-incident-states-ransomware\">Recorded Future News<\/a>.<\/p>\n<p>We follow it closely in our research \u2013 and have been for many years. In 2022, we published proof of concept research which explored the role of <a href=\"https:\/\/www.forescout.com\/research-labs\/r4iot\/\">ransomware within IoT devices<\/a>.<\/p>\n<h2>Ransomware Risk in 2024: The Spotlight Is on Healthcare<\/h2>\n<p>Some of the largest attacks using ransomware in 2024 have been in healthcare where medical device hardware and digital systems are intertwined. Between devices and software, healthcare is highly dependent on networked systems and the Internet of Things (IoT). In 2024, many large hospitals and healthcare networks \u2013 including <a href=\"https:\/\/www.wsj.com\/articles\/hospitals-urged-to-disconnect-from-unitedhealths-hacked-pharmacy-unit-11c9691e\">Change Healthcare<\/a> in February and <a href=\"https:\/\/www.npr.org\/sections\/shots-health-news\/2024\/05\/23\/1253011397\/how-the-ascension-cyberattack-is-disrupting-care-at-hospitals\">Ascension<\/a> in May \u2013 were attacked by ransomware.<\/p>\n<p>\u201cThe tools that are available now can make amateur bad actors into pretty good, bad actors,\u201d states Lee Schwamm, chief digital health officer at\u00a0Yale New Haven Health System in an <a href=\"https:\/\/medcitynews.com\/2024\/06\/cyberattack-ransomware-healthcare\/\">interview with MedCity News<\/a>. \u201cYou can literally use LLM products and have them help you build ransomware code.\u201d<\/p>\n<p>Last year, we wrote about the topic in our blog \u201c<a href=\"\/blog\/ai-assisted-cyberattacks-are-coming-to-healthcare-devices\/\" target=\"new\" rel=\"noopener\">You\u2019re Not Hallucinating: AI-Assisted Cyberattacks Are Coming to Healthcare, Too<\/a>\u201d. Here, we showed examples with technical detail about point-of-care testing and laboratory devices \u2013 and a proprietary protocol used in medication dispensing systems.  <\/p>\n<p>The recovery from the Change Healthcare attack is now being predicted to cost in the range of $2.4 billion \u2013 which is more than $1 billion more than previously expected by United Health Care \u2013 which owns Change, according to <a href=\"https:\/\/www.hipaajournal.com\/change-healthcare-responding-to-cyberattack\/\">The HIPPA Journal<\/a>.<\/p>\n<p>What\u2019s critical to understand is the sheer number of devices and technology vendors in healthcare. The volume of third-party risk is large and being managed as a \u2018normalized\u2019 part of operations.<\/p>\n<p>\u201cWe have 4,800 different apps in our environment \u2014 with 1,700 attached to the EHR [Electronic Health Records],\u201d <a href=\"https:\/\/medcitynews.com\/2024\/06\/cyberattack-ransomware-healthcare\/\">relays<\/a> Leah Miller, chief clinical application and data officer, at CommonSpirit Health, which is a large non-profit hospital chain in the US. \u201cThat\u2019s 4,800 vendors that can fail every day, so that\u2019s why we have two or three events every week.\u201d<\/p>\n<p><strong><em>Go deeper. Learn how to <\/em><\/strong><a href=\"\/webinars\/mastering-healthcare-segmentation-a-deep-dive-with-forescout\/\"><strong><em>master healthcare segmentation<\/em><\/strong><\/a><strong><em> with the Director of Cybersecurity at ECU Health and experts from Forescout. <\/em><\/strong><\/p>\n<p>The real challenge occurs when attackers and criminals are able to find a vulnerability to gain control of data and systems. Sometimes, it is as easy as not having multifactor authentication turned on a server \u2013 which is <a href=\"https:\/\/apnews.com\/article\/change-healthcare-cyberattack-unitedhealth-senate-9e2fff70ce4f93566043210bdd347a1f\" target=\"_blank\" rel=\"noopener\">what happened to Change Healthcare<\/a>.<\/p>\n<p>In other cases, an employee is phished or attackers use vulnerabilities in unpatched software or hardware devices as entry points into a network. Once inside, attackers move laterally to avoid detection and snoop around organizational data \u2013 and then lock it up and lock you out \u2013 until the ransom is paid.<\/p>\n<p>\u201cHospitals are installing a lot of\u00a0IoT devices\u00a0\u2014 everything\u2019s hooking into the network,\u201d says Ashis Barad, chief digital and information officer, to <a href=\"https:\/\/medcitynews.com\/2024\/06\/cyberattack-ransomware-healthcare\/\" target=\"_blank\" rel=\"noopener\">MedCity News<\/a>. \u201cEvery MRI machine is now connected to a network, but it wasn\u2019t this way before.\u201d<\/p>\n<p>To better understand hardware risk, we compile an annual report dubbed \u201c<a href=\"\/research-labs\/riskiest-devices\/\">The Riskiest Devices<\/a>\u201d. This year, we discovered IoT devices had a 136% increase in vulnerabilities. For healthcare and medical fields, specifically, we detailed the five riskiest areas:<\/p>\n<ul>\n<li>Medical information systems<\/li>\n<li>Electrocardiographs<\/li>\n<li>DICOM workstations<\/li>\n<li>Picture Archiving and Communication Systems (PACS)<\/li>\n<li>Medication Dispensing Systems<\/li>\n<\/ul>\n<div style=\"display: block; margin: 10px; border-top: 1px solid #CCCCCC; border-bottom: 1px solid #CCCCCC; padding: 10px;\">\n<h4>Riskiest Connected Devices in 2024 \u2013 IT, IoT, OT, IoMT<\/h4>\n<p class=\"u-display-flex u-flex-wrap u-gap\"><a href=\"\/webinars\/2024-riskiest-devices\/\"  title=\"Register For The Webinar\" class=\"c-btn c-btn--primary has-icon icon-camera icon-position-right has-icon-animation icon-animation-pulse\"><span class=\"cta-button-text\">Register For The Webinar<\/span><\/a> <a href=\"\/resources\/2024-riskiest-connected-devices\/\"  title=\"Access The Full Report\" class=\"c-btn c-btn--primary c-btn--outline u-flex-auto u-flex-initial@sm u-justify-center u-justify-start@sm has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\" target=\"new\"><span class=\"cta-button-text\">Access The Full Report<\/span><\/a>\n<\/div>\n<h2>A Closer Look at Ransomware Risk: The Criminal Groups and OT Risk<\/h2>\n<p>Overall, the ransomware landscape has continued to fragment and expand. We documented some of this fragmentation between ransomware groups in our post about the <a href=\"\/blog\/analysis-a-new-ransomware-group-emerges-from-the-change-healthcare-cyber-attack\/\">splinter between RansomHub from ALPH<\/a>.<\/p>\n<p>Last year, the top 10 groups accounted for three-quarters of attacks, they now only represent 60%. Concurrently, the number of active groups increased from 53 to 85, marking a 60% rise.<\/p>\n<p>LockBit remains the most active group, despite a significant <a href=\"https:\/\/globalinitiative.net\/analysis\/the-lockbit-takedown-law-enforcement-trolls-ransomware-gang\/\" target=\"_blank\" rel=\"noopener\">law enforcement operation<\/a> in February this year. Other groups remaining in the top 10 are Play, BlackBasta, 8Base, Akira and BianLian. Among the new groups in the top 10, RansomHub has experienced rapid growth and was recently <a href=\"\/blog\/analysis-a-new-ransomware-group-emerges-from-the-change-healthcare-cyber-attack\/\">analyzed by our team<\/a>.<\/p>\n<p>While ransomware perpetrators are increasing and fragmenting, the list of countries where ransomware victims are located is decreasing and consolidating. Through June, the top 10 targeted countries suffered 80% of all attacks, up from 77% last year. The\u00a0US accounted for half of all attacks, an increase from 48% from 2023.<\/p>\n<p>Overall, there were ransomware victims in 100 countries, a 12% decrease from the 114 countries last year. All the countries that were in the top 10 last year remained on the list this year.<\/p>\n<p>Cyber attacks involving OT and IoT are part of an alarming trend: Ransomware gangs, often operating a ransomware-as-a-service (RaaS) model, cripple the operations of several types of organizations, often at the same time. Attacks have moved from purely encrypting data (2019) to exfiltrating data before encryption (2020) to large extortion campaigns with several phases (2021). Sophisticated ransomware families (<a href=\"\/resources\/analysis-of-an-alphv-incident\">ALPHV<\/a>,\u00a0<a href=\"\/resources\/analysis-of-conti-leaks\/\" target=\"_blank\" rel=\"noopener\">Conti<\/a>) have been active, sometimes taking a political position after the Russian invasion of Ukraine. This evolution in attacker methods means that ransomware gangs can cripple the operations of virtually any organization.<\/p>\n<p>Organizations need strong <a href=\"\/glossary\/cybersecurity-risk-management\/\">cybersecurity risk management<\/a> practices to help realize effective <a href=\"\/glossary\/cyber-resilience\/\">cyber resilience<\/a>.<\/p>\n<p><strong><em>See how healthcare company <\/em><\/strong><a href=\"\/success-stories\/#modal-customer-fdm\"><strong><em>FDM efficiently transformed its cybersecurity.<\/em><\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware risk is top of mind for citizens and CISOs alike. From the board room to the room known as the \u2018SOC\u2019, everyone is feeling the pain of disruption. Being locked out of a system and forced back to pen and paper is shocking to our working lives. Too often, it is delaying a much-needed [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":89163,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562,540],"tags":[],"coauthors":[438,818],"class_list":["post-89137","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views","category-research-and-cyber-alerts"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Current State of Ransomware Risk - Forescout<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Current State of Ransomware Risk - Forescout\" \/>\n<meta property=\"og:description\" content=\"Ransomware risk is top of mind for citizens and CISOs alike. From the board room to the room known as the \u2018SOC\u2019, everyone is feeling the pain of disruption. Being locked out of a system and forced back to pen and paper is shocking to our working lives. Too often, it is delaying a much-needed [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-31T15:00:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-02T13:20:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"419\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Daniel dos Santos, Don Sears\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/\"},\"author\":{\"name\":\"Daniel dos Santos\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/be441d6b38f45c404e136f034553a1a5\"},\"headline\":\"The Current State of Ransomware Risk\",\"datePublished\":\"2024-07-31T15:00:14+00:00\",\"dateModified\":\"2024-08-02T13:20:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/\"},\"wordCount\":1236,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg\",\"articleSection\":[\"News &amp; Views\",\"Research &amp; Cyber Alerts\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/\",\"name\":\"The Current State of Ransomware Risk - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg\",\"datePublished\":\"2024-07-31T15:00:14+00:00\",\"dateModified\":\"2024-08-02T13:20:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg\",\"width\":800,\"height\":419},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Current State of Ransomware Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/be441d6b38f45c404e136f034553a1a5\",\"name\":\"Daniel dos Santos\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/e47d8d4c2a21db15a6e2d4acf2b3d3a9\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2f2689df82c380109a7898f6204c7a1c9105ed7bc076d45a45b524443683a65?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2f2689df82c380109a7898f6204c7a1c9105ed7bc076d45a45b524443683a65?s=96&d=mm&r=g\",\"caption\":\"Daniel dos Santos\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Current State of Ransomware Risk - Forescout","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/","og_locale":"en_US","og_type":"article","og_title":"The Current State of Ransomware Risk - Forescout","og_description":"Ransomware risk is top of mind for citizens and CISOs alike. From the board room to the room known as the \u2018SOC\u2019, everyone is feeling the pain of disruption. Being locked out of a system and forced back to pen and paper is shocking to our working lives. Too often, it is delaying a much-needed [&hellip;]","og_url":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2024-07-31T15:00:14+00:00","article_modified_time":"2024-08-02T13:20:59+00:00","og_image":[{"width":800,"height":419,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg","type":"image\/jpeg"}],"author":"Daniel dos Santos, Don Sears","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/"},"author":{"name":"Daniel dos Santos","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/be441d6b38f45c404e136f034553a1a5"},"headline":"The Current State of Ransomware Risk","datePublished":"2024-07-31T15:00:14+00:00","dateModified":"2024-08-02T13:20:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/"},"wordCount":1236,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg","articleSection":["News &amp; Views","Research &amp; Cyber Alerts"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/","url":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/","name":"The Current State of Ransomware Risk - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg","datePublished":"2024-07-31T15:00:14+00:00","dateModified":"2024-08-02T13:20:59+00:00","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg","width":800,"height":419},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/ransomware-risk-current-state\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"The Current State of Ransomware Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/be441d6b38f45c404e136f034553a1a5","name":"Daniel dos Santos","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/e47d8d4c2a21db15a6e2d4acf2b3d3a9","url":"https:\/\/secure.gravatar.com\/avatar\/e2f2689df82c380109a7898f6204c7a1c9105ed7bc076d45a45b524443683a65?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2f2689df82c380109a7898f6204c7a1c9105ed7bc076d45a45b524443683a65?s=96&d=mm&r=g","caption":"Daniel dos Santos"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/07\/FS-2024-Current-State-Ransomware-Blog-Share-v1.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/89137","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=89137"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/89137\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/89163"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=89137"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=89137"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=89137"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=89137"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}