RansomwareClock.org


Reported Cost of Ransomware Attacks 2025 YTD

$

Aggregated Estimate from Public and Private Sources, Reflects Reported Attacks Only. Actual cost estimated to be significantly higher.


The forecast for cybercrime in 2024 is harsh with attacks increasing in frequency, sophistication, and severity. We must work together to protect our companies and communities from the financial, operational, and emotional trauma of cyber-attacks.

Cyber Stats


$1.85m


average cost for remediation, business downtime, lost orders, operational costs, etc. 2X vs year ago. Recovery cost is 10X the size of the ransom payment. Sophos, The State of Ransomware 2021

93%


consider an organization's trustworthiness prior to purchasing. 59% would avoid doing business with a company cyberattacked in the past 12 months. Arcserve 2020 Survey

11 seconds


a new ransomware attack hits this year. Cybersecurity Ventures. (In the time it takes you to read this cyber stat, another business has been hit with a ransomware attack.)

207 days


days is the average time to identify a breach. Meaning the bad guys are in your system for over 6-months. IBM Security Cost of a Data Breach Report 2020.

Only 21%


of security professionals think their current security controls are adequate. Forrester State of Enterprise IoT Security in North America

21 days


days is the average downtime caused by a ransomware attack. Coveware Q4, 2020

Spotlight


Read More

CISA


The Cybersecurity and Infrastructure Security Agency (CISA) was founded in 2018 and is a standalone United States federal agency, organized under the Department of Homeland Security (DHS). It exists to...

RECENT ATTACKS & NEWS


January 21, 2026

CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training

CyberNut emerged from stealth in May 2024 with $800k in pre-seed funding for its cybersecurity platform. The post CyberNut Closes...

Read More

January 21, 2026

Asymmetric Security Emerges From Stealth With $4.2 Million in Funding

The startup’s platform leverages AI to automate forensic investigations, accelerating incident response. The post Asymmetric Security Emerges From Stealth With...

Read More

January 21, 2026

aiFWall Emerges from Stealth With an AI Firewall

aiFWall is a firewall protection for AI deployments built to use AI to improve its own performance. The post aiFWall...

Read More

January 21, 2026

LastPass Users Targeted With Backup-Themed Phishing Emails

Threat actors may have wanted to take advantage of the holiday weekend in the United States to increase their chances...

Read More

January 21, 2026

North Korean Hackers Target macOS Developers via Malicious VS Code Projects

The hackers trick victims into accessing GitHub or GitLab repositories that are opened using Visual Studio Code. The post North...

Read More

January 21, 2026

Why Identity Security Must Move Beyond MFA

By integrating identity threat detection with MFA, organizations can protect sensitive data, maintain operational continuity, and reduce risk exposure. The...

Read More

January 21, 2026

MITRE Launches New Security Framework for Embedded Systems 

The Embedded Systems Threat Matrix (ESTM) aims to help organizations protect critical embedded systems.  The post MITRE Launches New Security...

Read More

January 21, 2026

Cyber Insights 2026: API Security – Harder to Secure, Impossible to Ignore

API cybersecurity will be a ping pong ball, battered between the rackets of AI-assisted attackers and AI-assisted defenders. The post...

Read More

January 21, 2026

Anthropic MCP Server Flaws Lead to Code Execution, Data Exposure

Impacting Anthropic’s official MCP server, the vulnerabilities can be exploited through prompt injections. The post Anthropic MCP Server Flaws Lead...

Read More

January 21, 2026

Oracle’s First 2026 CPU Delivers 337 New Security Patches

Oracle’s January 2026 CPU resolves roughly 230 unique vulnerabilities across more than 30 products. The post Oracle’s First 2026 CPU...

Read More

In Case of Cyber Attack Emergency



If a ransomware incident occurs at your organization, CISA, FBI, and NSA recommend the following actions:

Contact your Local FBI Office - https://www.fbi.gov/contact-us/field-offices

Report a Complaint to the FBI’s Internet Criminal Complaint Center: www.IC3.gov


Technical Expertise/Crisis Communications