RansomwareClock.org


Reported Cost of Ransomware Attacks 2025 YTD

$

Aggregated Estimate from Public and Private Sources, Reflects Reported Attacks Only. Actual cost estimated to be significantly higher.


The forecast for cybercrime in 2024 is harsh with attacks increasing in frequency, sophistication, and severity. We must work together to protect our companies and communities from the financial, operational, and emotional trauma of cyber-attacks.

Cyber Stats


$1.85m


average cost for remediation, business downtime, lost orders, operational costs, etc. 2X vs year ago. Recovery cost is 10X the size of the ransom payment. Sophos, The State of Ransomware 2021

93%


consider an organization's trustworthiness prior to purchasing. 59% would avoid doing business with a company cyberattacked in the past 12 months. Arcserve 2020 Survey

11 seconds


a new ransomware attack hits this year. Cybersecurity Ventures. (In the time it takes you to read this cyber stat, another business has been hit with a ransomware attack.)

207 days


days is the average time to identify a breach. Meaning the bad guys are in your system for over 6-months. IBM Security Cost of a Data Breach Report 2020.

Only 21%


of security professionals think their current security controls are adequate. Forrester State of Enterprise IoT Security in North America

21 days


days is the average downtime caused by a ransomware attack. Coveware Q4, 2020

Spotlight


Read More

CISA


The Cybersecurity and Infrastructure Security Agency (CISA) was founded in 2018 and is a standalone United States federal agency, organized under the Department of Homeland Security (DHS). It exists to...

RECENT ATTACKS & NEWS


January 30, 2026

In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak

Other noteworthy stories that might have slipped under the radar: Apple updates platform security guide, LastPass detects new phishing wave,...

Read More

January 30, 2026

Aisy Launches Out of Stealth to Transform Vulnerability Management

Aisy has emerged from stealth mode with $2.3 million in seed funding. The post Aisy Launches Out of Stealth to...

Read More

January 30, 2026

175,000 Exposed Ollama Hosts Could Enable LLM Abuse

Among them, 23,000 hosts were persistently responsible for the majority of activity observed over 293 days of scanning. The post...

Read More

January 30, 2026

White House Scraps ‘Burdensome’ Software Security Rules 

Two Biden-era memorandums have been revoked, but some of the resources they provide can still be used by government organizations. ...

Read More

January 30, 2026

Hugging Face Abused to Deploy Android RAT

Android users were lured to applications that served a malicious payload hosted in a Hugging Face repository. The post Hugging...

Read More

January 30, 2026

ICS Devices Bricked Following Russia-Linked Intrusion Into Polish Power Grid

Sandworm/Electrum hackers targeted communication and control systems at 30 sites. The post ICS Devices Bricked Following Russia-Linked Intrusion Into Polish...

Read More

January 30, 2026

Ivanti Patches Exploited EPMM Zero-Days

The critical-severity vulnerabilities could allow unauthenticated attackers to execute arbitrary code remotely. The post Ivanti Patches Exploited EPMM Zero-Days appeared...

Read More

January 29, 2026

LLMs Hijacked, Monetized in ‘Operation Bizarre Bazaar’

An LLMjacking operation has been targeting exposed LLMs and MCPs at scale, for commercial monetization. The post LLMs Hijacked, Monetized...

Read More

January 29, 2026

N8n Vulnerabilities Could Lead to Remote Code Execution

The two bugs impacted n8n’s sandbox mechanism and could be exploited via weaknesses in the AST sanitization logic. The post...

Read More

January 29, 2026

SolarWinds Patches Critical Web Help Desk Vulnerabilities

The four critical flaws could be exploited without authentication for remote code execution or authentication bypass. The post SolarWinds Patches...

Read More

In Case of Cyber Attack Emergency



If a ransomware incident occurs at your organization, CISA, FBI, and NSA recommend the following actions:

Contact your Local FBI Office - https://www.fbi.gov/contact-us/field-offices

Report a Complaint to the FBI’s Internet Criminal Complaint Center: www.IC3.gov


Technical Expertise/Crisis Communications