{"id":93287,"date":"2024-10-29T12:12:26","date_gmt":"2024-10-29T04:12:26","guid":{"rendered":"https:\/\/version-2.com.sg\/?p=92733"},"modified":"2024-10-29T12:50:21","modified_gmt":"2024-10-29T04:50:21","slug":"recent-ransomware-attacks-in-2024","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/10\/recent-ransomware-attacks-in-2024\/","title":{"rendered":"Recent Ransomware Attacks in 2024"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"93287\" class=\"elementor elementor-93287\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<article class=\"is-type-body-default is-important\"><p>After several notorious ransomware gangs were knocked out by law enforcement in 2023, ransomware attacks are on the rise again and soaring to all-time highs in 2024. Many gangs quickly reorganized and reformed, with leaders launching new platforms and expanding their web of bad actors.\u00a0<\/p><p>Ransomware attacks are bigger and bolder than ever this year, but even as attackers focus on new targets, <a href=\"https:\/\/jumpcloud.com\/blog\/common-sme-cyberattacks\">small- and medium-sized enterprises (SMEs) remain under threat<\/a>. With security breaches and ransom prices surging, it\u2019s critical to stay on top of the latest attack tactics, gangs, and news. Let\u2019s see who\u2019s behind the most damaging ransomware attacks this year, and how you can protect your network, customers, and co-workers.\u00a0<\/p><h2 id=\"h-recent-ransomware-attacks-in-2024\" class=\"wp-block-heading\">Recent Ransomware Attacks In 2024<\/h2><p>This year ransomware is on pace to cause over $40 billion in losses for organizations in the U.S. Ransoms, lost productivity, and system outages all factor in the equation. And <a href=\"https:\/\/jumpcloud.com\/blog\/notes-from-our-ciso-on-the-kaseya-ransomware-attack\">large-scale breaches involving ransomware<\/a> are not a phenomenon of 2024 at all. But even worse, people\u2019s lives are increasingly put at risk by malicious attackers. These are some of the most alarming attacks of 2024.<\/p><h3 id=\"h-september-2024\" class=\"wp-block-heading\">September 2024<\/h3><p><strong>NHS London: <\/strong>Qilin ransom gang unleashed an attack that compromised the data of almost 1 million National Heathcare System patients in London hospitals. The attackers published personal information about patients with sensitive medical conditions like cancer and sexually transmitted diseases.<\/p><p><strong>Stillwater Mining Company: <\/strong>In September, Stillwater company officials discovered the personal information of over 7,000 employees had been stolen using RansomHub RaaS (Ransomware as a Service). The attack first happened over the summer, but it took Stillwater months to catch on to the breach.<\/p><p><strong>Kawasaki Motors Europe:<\/strong> RansomHub was also behind a major attack on Kawasaki\u2019s European offices. Kawasaki swiftly shut its servers down to isolate the issue and perform recovery operations. RansomHub claims to have stolen almost 500 GB of data.<\/p><h3 id=\"h-august-2024\" class=\"wp-block-heading\">August 2024<\/h3><p><strong>City of Columbus, OH:<\/strong> Rhysida ransom group stole a massive 3TB of data from the City of Columbus, including sensitive employee records and data. After the city refused to meet Rhysida\u2019s ransom price all the data was dumped onto the dark web.<\/p><p><strong>Sumter County, FL Sheriff: <\/strong>Rhysida hit another government target, breaching the Sheriff\u2019s Office systems and potentially compromising 150,000 citizens. Passports, SSNs, and other data was stolen. Rhysida demanded a payment of 7 bitcoin (worth almost half a million dollars).<\/p><p><strong>Keytronic: <\/strong>Electronics manufacturing firm Keytronics reported losing over $17 million due to a ransomware attack by Black Basta, that disrupted production and office operations at its facilities in the U.S. and Mexico.<\/p><h3 id=\"h-july-2024\" class=\"wp-block-heading\">July 2024<\/h3><p><strong>Disney: <\/strong>NullBulge Group stole 1TB of data from Disney\u2019s internal Slack platform and leaked it online. The breach included unreleased Disney projects, concepts, artwork, and code. The hackers asserted they were acting in the name of \u201cartists\u2019 rights.\u201d<\/p><p><strong>AT&amp;T: <\/strong>Hacker group ShinyHunters stole metadata from all call logs and texts made by AT&amp;T customers over a six-month period in 2022.<\/p><p><strong>Rite Aid Pharmacy:<\/strong> Over 2.2 million patients were compromised by RansomHub attackers that posed as Rite Aid employees to steal their data. RansomHub threatened to leak personal information, ID numbers, and driver\u2019s license information obtained from Rite Aid.\u00a0<\/p><h3 id=\"h-june-2024\" class=\"wp-block-heading\">June 2024<\/h3><p><strong>Panera Bread:<\/strong> An attack by an unknown group interrupted service on Panera\u2019s website, app, phone systems, and POS systems. Thousands of employee social security numbers and other personal information was also stolen in a major data breach. Internal sources indicate Panera succumbed to the attackers\u2019 demands, paying an undisclosed ransom.<\/p><p><strong>Pandabuy: <\/strong>Giant Chinese shopping platform Pandabuy paid a ransom to prevent stolen customer data from being leaked \u2014 but then the hackers immediately demanded another ransom. The ongoing conflict resulted in 3 million rows of customer data being leaked onto BreachForums.<\/p><p><strong>Cleveland, OH: <\/strong>An unknown hacking group forced Cleveland City Hall to temporarily shut down due to a ransomware attack that debilitated city computer systems.<\/p><p><strong>CDK Global:<\/strong> BlackSuit ransomware caused a major IT outage that wreaked havoc on thousands of car dealerships in North America. CDK struggled to restore services to the dealers effectively or in a timely manner, forcing them to pay the ransom so auto dealers could get back online.<\/p><h3 id=\"h-may-2024\" class=\"wp-block-heading\">May 2024<\/h3><p><strong>Wichita, KS:<\/strong> Several government services were shut down to prevent a malware attack from spreading across its entire network. LockBit was responsible for the attack that disrupted payment systems and brought flight operations to a halt at the Wichita airport.<\/p><p><strong>Ascension Health: <\/strong>An \u201chonest mistake\u201d led to a disruption of clinical operations at one of the largest Catholic health providers in the U.S. Black Basta was behind an attack that launched after an employee mistakenly downloaded a malicious file.<\/p><p><strong>Ohio Lottery:<\/strong> 500,000 people were affected by an attack on the Ohio State Lottery. Hacker group DragonForce took credit, and said they gained access to employee and player data including contact information, birthdates, winnings, and social security numbers.<\/p><p><strong>Ticketmaster:<\/strong> ShinyHunters stole credit card details, contact and personal information from over 550 million Ticketmaster\/Live Nation customers. The group put the data up for sale on the dark web, priced at half a million dollars.<\/p><h3 id=\"h-aril-2024\" class=\"wp-block-heading\">Aril 2024<\/h3><p><strong>Omni Hotels: <\/strong>Daixin ransomware launched an attack that took down Omni Hotels\u2019 network nationwide and impacted reservations, hotel room locks, and POS systems. Daixin posted screenshots of sensitive stolen data from over 3.5 million Omni guests.<\/p><p><strong>Group Health Cooperative (Wisconsin): <\/strong>A BlackSuit data breach stole personal and medical documents from more than 500,000 patients. Systems were shut down for several hours as internal IT teams worked to contain the attack.\u00a0<\/p><p><strong>United Nations Development Programme: <\/strong>UN systems were breached by 8Base, disrupting UN operations in Copenhagen. During the attack 8Base claimed to steal massive amounts of confidential information, including accounting records, contracts, invoices, and other official documents.<\/p><p><strong>UnitedHealth Group: <\/strong>BlackCat ransom group, also known as ALPHV, stole 6TB of sensitive patient data. United Health stated the breach caused more than $800 million in financial damages \u2014 in addition to meeting BlackCat\u2019s demands for a $22 million ransom.<\/p><h3 id=\"h-march-2024\" class=\"wp-block-heading\">March 2024<\/h3><p><strong>Duvel Brewery: <\/strong>Beer production was brought to a halt at one of Belgium\u2019s largest breweries after a ransomware attack by Stormous.<\/p><p><strong>Crinetics Pharmaceuticals: <\/strong>Internal IT teams uncovered suspicious activity in an employee account \u2014 but by the time they had isolated the threat, LockBit posted that they\u2019d breached Crinetics systems and stolen major amounts of data. LockBit demanded a $4 million ransom.<\/p><p><strong>MarineMax: <\/strong>Rhysida ransomware struck the world\u2019s largest luxury yacht dealer, stealing financial information and company records as well as information from a database of the world\u2019s wealthiest customers. Rhysida put the data up for sale for the price of 15 bitcoin.<\/p><h3 id=\"h-february-2024\" class=\"wp-block-heading\">February 2024<\/h3><p><strong>Lurie Children\u2019s Hospital: <\/strong>The Chicago children\u2019s hospital had to take IT systems offline and was forced to delay care for many of its patients. Rhysida set a price of $3.7 million for 600GB of data that may include as many as 200,000 patients. After Lurie refused to meet the price, the data was leaked online.<\/p><p><strong>California SEIU 1000:<\/strong> A union that represents 100,000 California workers suffered network outages after an attack by LockBit. The ransomware gang stole employee SSNs, financial documents, and salary information.<\/p><p><strong>Trans-Northern Pipelines: <\/strong>The Canadian petroleum pipeline operator was hit by a ALPHV ransomware attack. Trans-Northern said their security teams quickly isolated the incident without major issues, but ALPHV claims to have stolen almost 190GB of company data and documents.<\/p><h3 id=\"h-january-2024\" class=\"wp-block-heading\">January 2024<\/h3><p><strong>Fulton County, GA: <\/strong>A LockBit attack crippled Fulton County government systems for weeks, causing problems for utilities, court, and tax networks. Everything from marriage licenses to police operations were affected, and many offices had to resort back to using paper forms during the outage. LockBit claimed they gained access to \u201cconfidential documents\u201d and threatened to leak them.<\/p><p><strong>loanDepot:<\/strong> An unknown group disrupted payment systems that disrupted mortgage payments for millions of loanDepot customers. The hackers also stole the data of over 16 million customers, potentially including bank account information.\u00a0<\/p><p><strong>Bucks County, PA:<\/strong> Hackers knocked out 911 terminals inside fire, police, and emergency vehicles in a Pennsylvania county home to 650,000 residents. The National Guard was brought in to assist with emergencies as the county attempted to resolve the issue.<\/p><p><strong>Schneider Energy: <\/strong>Cactus ransomware stole terabytes of company data in a breach. The attack compromised over 2,000 enterprise clients including Walmart, PepsiCo, Hilton, and DuPont. It\u2019s unknown whether ransom demands were met.\u00a0<\/p><h2 id=\"h-notable-ransomware-groups\" class=\"wp-block-heading\"><strong>Notable Ransomware Groups<\/strong><\/h2><p>Even after coordinated federal and international crackdowns, ransomware gangs are as powerful as ever. Groups that were previously broken up emerged under new criminal organizations, and newer gangs rose to prominence in some of the highest-profile attacks of the year. These are a few of the most dangerous names in ransomware.\u00a0<\/p><p><strong>LockBit <\/strong>is a Russian gang with global reach that roared back with a vengeance in 2024 after suffering a defeat when law enforcement took down its platform. LockBit provides RaaS (Ransomware as a Service) and has been the most deployed ransomware since 2022. Because of LockBit\u2019s popularity, attacks can vary greatly in tactics and techniques.<\/p><p><strong>ALPHV\/BlackCat <\/strong>was formed after a gang known as BlackMatter\u2019s servers were taken down by a sting in 2021. ALPHV makes some of the most technically advanced ransomware out there, capable of evading even the top cybersecurity systems. They\u2019re thought to have the most experienced and tech savvy network of affiliates, and attack both Windows and Linux systems. ALPHV is one of the only ransom gangs to use a \u201ctriple extortion\u201d technique leveraging stolen data, encryption, and denial of service attacks.<\/p><p><strong>Rhysida <\/strong>is a fast-rising, aggressive ransomware gang responsible for some of the most damaging attacks in 2024. Rhysida\u2019s malware was initially considered to be novice, but it rapidly became more elaborate and difficult to detect. Rhysida has led the offensive against healthcare systems and government offices.<\/p><p><strong>Hunters International<\/strong>,<strong> ShinyHunters<\/strong>,<strong> 8Base<\/strong>, and <strong>BlackSuit<\/strong> are other established ransomware gangs that thrived in 2024. <strong>DragonForce<\/strong> and <strong>RansomHub<\/strong> are newer names emerging as more formidable threats this year.<\/p><h2 id=\"h-latest-ransomware-trends\" class=\"wp-block-heading\">Latest Ransomware Trends<\/h2><p>Several ransomware trends took hold this year, with attackers focusing on bigger targets and demanding bigger payouts to match. Attacks on infrastructure became more common \u2014 attackers went hard after healthcare systems, government offices, and supply chain vendors.<\/p><p>Like everyone else, hackers increasingly deployed AI to help them carry out attacks. AI allows malware to adapt in real time to evade security, or can be used to clone voices, email, or other communications to make phishing seem more legit.<\/p><p>Ransomware as a Service continued to grow in popularity, as ransomware providers made their platforms more accessible to bad actors with fewer technical skills. Ransomware also got more sophisticated across the board, taking advantage of zero-day vulnerabilities more frequently and utilizing remote access tools to improve the effectiveness of attacks.<\/p><p>As always, <a href=\"https:\/\/jumpcloud.com\/blog\/phishing-attack-statistics\">phishing attacks<\/a> on individual employees were one of the most effective ways for ransomware gangs to exploit systems. Attackers often breached security through individuals in BYOD situations or on SaaS cloud platforms with fewer safeguards.<\/p><p>With ransomware becoming more accessible and sophisticated, it\u2019s predicted that attacks will only get more frequent \u2014 and more disruptive \u2014 as we head into 2025.<\/p><h3 id=\"h-ransomware-prevention-and-protection\" class=\"wp-block-heading\">Ransomware Prevention and Protection<\/h3><p>Ransomware can be tough to defend against because it can infiltrate an entire network through just one user. The more you can do to protect your users and network, the better chance you\u2019ll have to successfully fend off bad actors.<\/p><h3 id=\"h-best-practices-for-preventing-ransomware\" class=\"wp-block-heading\">Best Practices for Preventing Ransomware<\/h3><p>These are some tried-and-true methods to help prevent a ransomware attack and keep your network running securely.<\/p><ul><li>Use <a href=\"https:\/\/jumpcloud.com\/use-cases\/zero-trust\">Zero Trust security<\/a> policies following a \u201ctrust nothing, verify everything\u201d principle.<\/li><\/ul><ul><li>Secure your network with unique passwords and <a href=\"https:\/\/jumpcloud.com\/platform\/multi-factor-authentication-mfa\">multi-factor authentication (MFA)<\/a>.<\/li><\/ul><ul><li>Keep <a href=\"https:\/\/jumpcloud.com\/platform\/patch-management\">security patches<\/a> up to date on all software and services like email, servers, and VPNs.<\/li><\/ul><ul><li>Back up data frequently, on multiple different media formats and keep one off-site copy.<\/li><\/ul><ul><li>Educate users about device safety and how to recognize the latest phishing scams.<\/li><\/ul><ul><li>Utilize AI to fight malware or other malicious threats.<\/li><\/ul><h3 id=\"h-choosing-the-right-security-solutions\" class=\"wp-block-heading\">Choosing the Right Security Solutions<\/h3><p>The most effective security solutions vary from organization to organization. By taking the time to analyze the specifics around the way your company uses technology, you\u2019ll gain the insights to develop a rock-solid defense strategy.<\/p><ul><li><a href=\"https:\/\/jumpcloud.com\/blog\/attack-surface-mapping\">Map attack surfaces<\/a> and be aware of the latest <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-an-attack-vector\">ransomware attack vectors<\/a> to identify vulnerabilities and determine best defenses.<\/li><\/ul><ul><li>Evaluate <a href=\"https:\/\/jumpcloud.com\/blog\/saas-security-risks\">security risks of SaaS or other third-party platforms<\/a> your organization is using.<\/li><\/ul><ul><li>Evaluate <a href=\"https:\/\/jumpcloud.com\/blog\/remote-work-security-risks\">vulnerabilities unique to remote work and BYOD<\/a>.<\/li><\/ul><ul><li>Consider access controls like <a href=\"https:\/\/jumpcloud.com\/platform\/single-sign-on\">single sign-on (SSO)<\/a>, <a href=\"https:\/\/jumpcloud.com\/platform\/conditional-access\">conditional access<\/a>, <a href=\"https:\/\/jumpcloud.com\/platform\/password-manager\">password management<\/a>, or <a href=\"https:\/\/jumpcloud.com\/use-cases\/passwordless-authentication\">passwordless authentication<\/a> to improve individual user security.<\/li><\/ul><ul><li><a href=\"https:\/\/jumpcloud.com\/use-cases\/it-unification\">Unify IT stacks<\/a> to reduce exploitable security gaps.<\/li><\/ul><h3 id=\"h-recovery-and-response-strategies\" class=\"wp-block-heading\">Recovery and Response Strategies<\/h3><p>No matter how good your defenses are, sometimes ransomware sneaks into your system. By having a response plan ready to go, you can mitigate attacks quickly and stave off major damage.<\/p><ul><li>Create an incident response plan with standardized protocols for identifying and managing breaches.<\/li><\/ul><ul><li>Isolate the infected system to prevent ransomware from spreading.<\/li><\/ul><ul><li>Remove ransomware with antivirus and antimalware software, then clean the infected system.<\/li><\/ul><ul><li>Restore data from a clean backup source. Refrain from using backups that were made while the system was under attack as they could contain encrypted files that could relaunch the attack.<\/li><\/ul><ul><li>Review your security response and make improvements where vulnerabilities are detected.<\/li><\/ul><ul><li>Explore <a href=\"https:\/\/jumpcloud.com\/blog\/what-is-cyber-liability-insurance\">insurance coverage<\/a> against ransomware and other cyberattacks.<\/li><\/ul><p>If considering a ransom payment, be aware that meeting attackers\u2019 demands usually encourages future attacks.<\/p><h2 id=\"h-secure-identities-devices-and-access-with-jumpcloud\" class=\"wp-block-heading\">Secure Identities, Devices, and Access with JumpCloud<\/h2><p>JumpCloud brings together a variety of services that bolster your defenses against all sorts of attacks, including ransomware attacks. Whether you leverage JumpCloud to manage your device fleet, end user identities, single sign-on access, or any combination thereof, <a href=\"https:\/\/university.jumpcloud.com\/pages\/guided-sims\">JumpCloud has the capabilities<\/a> to help you lock down and protect your organization and minimize your exposure to these types of attacks.\u00a0<\/p><p><a href=\"https:\/\/jumpcloud.com\/demo\">Learn more<\/a> about how JumpCloud reduces attack surfaces, makes <a href=\"https:\/\/jumpcloud.com\/blog\/multi-factor-authentication-statistics\">authentication more reliable<\/a> and efficient, protects against phishing attacks, and unifies platform and device management across your network.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"57539\" class=\"elementor elementor-57539\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About JumpCloud<\/strong><br \/>At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>After several notorious ransomware gangs were knocked o [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,1016,61],"tags":[1272,1017],"class_list":["post-93287","post","type-post","status-publish","format-standard","hentry","category-1273","category-jumpcloud","category-press-release","tag-1272","tag-jumpcloud"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Recent Ransomware Attacks in 2024 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Recent Ransomware Attacks in 2024 - Version 2\" \/>\n<meta property=\"og:description\" content=\"After several notorious ransomware gangs were knocked o [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-29T04:12:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-29T04:50:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"372 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/ransomware-attacks-in-2024#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/recent-ransomware-attacks-in-2024\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Recent Ransomware Attacks in 2024\",\"datePublished\":\"2024-10-29T04:12:26+00:00\",\"dateModified\":\"2024-10-29T04:50:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/recent-ransomware-attacks-in-2024\\\/\"},\"wordCount\":2304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"2024\",\"JumpCloud\"],\"articleSection\":[\"2024\",\"JumpCloud\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/ransomware-attacks-in-2024#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2024\\\/10\\\/recent-ransomware-attacks-in-2024\\\/\",\"url\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/ransomware-attacks-in-2024\",\"name\":\"Recent Ransomware Attacks in 2024 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2024-10-29T04:12:26+00:00\",\"dateModified\":\"2024-10-29T04:50:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/ransomware-attacks-in-2024#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/ransomware-attacks-in-2024\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jumpcloud.com\\\/blog\\\/ransomware-attacks-in-2024#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Recent Ransomware Attacks in 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recent Ransomware Attacks in 2024 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024","og_locale":"zh_HK","og_type":"article","og_title":"Recent Ransomware Attacks in 2024 - Version 2","og_description":"After several notorious ransomware gangs were knocked o [&hellip;]","og_url":"https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024","og_site_name":"Version 2","article_published_time":"2024-10-29T04:12:26+00:00","article_modified_time":"2024-10-29T04:50:21+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"372 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2024\/10\/recent-ransomware-attacks-in-2024\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Recent Ransomware Attacks in 2024","datePublished":"2024-10-29T04:12:26+00:00","dateModified":"2024-10-29T04:50:21+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2024\/10\/recent-ransomware-attacks-in-2024\/"},"wordCount":2304,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["2024","JumpCloud"],"articleSection":["2024","JumpCloud","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2024\/10\/recent-ransomware-attacks-in-2024\/","url":"https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024","name":"Recent Ransomware Attacks in 2024 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2024-10-29T04:12:26+00:00","dateModified":"2024-10-29T04:50:21+00:00","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/ransomware-attacks-in-2024#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Recent Ransomware Attacks in 2024"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-ogD","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=93287"}],"version-history":[{"count":3,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93287\/revisions"}],"predecessor-version":[{"id":93324,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/93287\/revisions\/93324"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=93287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=93287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=93287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}