RansomwareClock.org


Reported Cost of Ransomware Attacks 2025 YTD

$

Aggregated Estimate from Public and Private Sources, Reflects Reported Attacks Only. Actual cost estimated to be significantly higher.


The forecast for cybercrime in 2024 is harsh with attacks increasing in frequency, sophistication, and severity. We must work together to protect our companies and communities from the financial, operational, and emotional trauma of cyber-attacks.

Cyber Stats


$1.85m


average cost for remediation, business downtime, lost orders, operational costs, etc. 2X vs year ago. Recovery cost is 10X the size of the ransom payment. Sophos, The State of Ransomware 2021

93%


consider an organization's trustworthiness prior to purchasing. 59% would avoid doing business with a company cyberattacked in the past 12 months. Arcserve 2020 Survey

11 seconds


a new ransomware attack hits this year. Cybersecurity Ventures. (In the time it takes you to read this cyber stat, another business has been hit with a ransomware attack.)

207 days


days is the average time to identify a breach. Meaning the bad guys are in your system for over 6-months. IBM Security Cost of a Data Breach Report 2020.

Only 21%


of security professionals think their current security controls are adequate. Forrester State of Enterprise IoT Security in North America

21 days


days is the average downtime caused by a ransomware attack. Coveware Q4, 2020

Spotlight


Read More

CISA


The Cybersecurity and Infrastructure Security Agency (CISA) was founded in 2018 and is a standalone United States federal agency, organized under the Department of Homeland Security (DHS). It exists to...

RECENT ATTACKS & NEWS


January 7, 2026

The Loudest Voices in Security Often Have the Least to Lose

Security advice fails when it comes from those who don’t bear the consequences and won’t be responsible for making it...

Read More

January 7, 2026

Chrome Extensions With 900,000 Downloads Caught Stealing AI Chats

Impersonating a legitimate extension from AITOPIA, the two malicious extensions were also exfiltrating users’ browser activity. The post Chrome Extensions...

Read More

January 7, 2026

Vulnerability in Totolink Range Extender Allows Device Takeover

An error in the firmware-upload handler leads to devices starting an unauthenticated root-level Telnet service. The post Vulnerability in Totolink...

Read More

January 7, 2026

Several Code Execution Flaws Patched in Veeam Backup & Replication

Four vulnerabilities have been fixed in the latest release of Veeam Backup & Replication. The post Several Code Execution Flaws...

Read More

January 7, 2026

Cybersecurity Firms Secured $14 Billion in Funding in 2025

2025 was the strongest year for cybersecurity funding since the 2021 peak, according to Pinpoint Search Group. The post Cybersecurity...

Read More

January 7, 2026

Hackers Exploit Zero-Day in Discontinued D-Link Devices

The critical-severity vulnerability allows unauthenticated, remote attackers to execute arbitrary shell commands. The post Hackers Exploit Zero-Day in Discontinued D-Link...

Read More

January 7, 2026

Complex Routing, Misconfigurations Exploited for Domain Spoofing in Phishing Attacks

Threat actors spoof legitimate domains to make their phishing emails appear to have been sent internally. The post Complex Routing,...

Read More

January 6, 2026

Hacker Conversations: Katie Paxton-Fear Talks Autism, Morality and Hacking

From dismantling online games as a child to uncovering real-world vulnerabilities, Katie Paxton-Fear explains how autism, curiosity, and a rejection...

Read More

January 6, 2026

Cyber Risk Trends for 2026: Building Resilience, Not Just Defenses

We can’t outpace the adversary by trying to stop every attack, but we can outlast them by engineering systems and...

Read More

January 6, 2026

Researchers Trap Scattered Lapsus$ Hunters in Honeypot

Using fake accounts and synthetic data to lure the hackers, the researchers gathered information on their servers. The post Researchers...

Read More

In Case of Cyber Attack Emergency



If a ransomware incident occurs at your organization, CISA, FBI, and NSA recommend the following actions:

Contact your Local FBI Office - https://www.fbi.gov/contact-us/field-offices

Report a Complaint to the FBI’s Internet Criminal Complaint Center: www.IC3.gov


Technical Expertise/Crisis Communications