October 18, 2024 By Jonathan Reed 4 min read

In a world where cyber threats feel omnipresent, a recent report has revealed some unexpected good news: ransomware attacks on state and local governments have dropped by 51% in 2024. Still, this decline does not signal the end of the ransomware threat, nor should it lead to complacency. As the nature of ransomware evolves, so do its consequences, costs and implications for enterprises and critical infrastructure.

What’s behind the drop in ransomware attacks? And what does it mean for the future of cybersecurity? Let’s take a look.

The numbers behind the drop

The reported 51% drop in ransomware attacks on state and local governments has been attributed to several factors. Some experts say the decrease is due to fewer governments paying ransoms, making them less attractive targets to cyber criminals.

Previously, local governments were frequent targets, often willing to pay the ransom to restore vital services. However, the tide has shifted. Now, only about 20% of state and local governments surveyed paid the ransom demands, a significant decrease from previous years. This reluctance to pay has impacted ransomware operators’ profitability and made other sectors, potentially less resistant to ransom payments, more attractive targets.

The role of law enforcement and threat group infighting

Law enforcement has played a significant role in disrupting major ransomware operators, further contributing to the decline. In late 2023 and early 2024, global law enforcement agencies, including the FBI, launched coordinated operations against the BlackCat/ALPHV and LockBit ransomware groups. These operations did not eliminate the groups entirely but dealt severe blows to their operations by disrupting their infrastructure and identifying key members.

As the pressure mounted, internal disputes within ransomware groups became public. The LockBit group, for instance, saw a highly publicized dispute between an operator and an affiliate overpayment, further destabilizing the trust within the group. BlackCat, on the other hand, disappeared in a likely exit scam, leaving its affiliates without support. These disruptions, both external from law enforcement and internal from infighting, have led to an exodus of ransomware affiliates away from these major brands.

Why fewer governments are paying ransom

The decline in ransomware attacks is largely tied to a fundamental change in how governments are responding to these attacks. In past years, many municipalities were quick to pay ransoms to regain access to their systems. This practice kept ransomware groups financially motivated. Now, a growing awareness about the risks of paying ransoms, coupled with increased support from the Cybersecurity and Infrastructure Security Agency (CISA), has led to a more cautious approach.

CISA’s involvement has been critical in helping governments recover from ransomware attacks without paying ransoms, making it clear that agencies have other options besides succumbing to extortion. This shift has significantly reduced the financial incentive for ransomware operators to target local governments.

Homeland Security, FBI and Secret Service help state, local and other governments prevent or respond to ransomware attacks. Most government entities say they’re satisfied with the agencies’ prevention and response efforts. However, many cited inconsistent communication during attacks as a problem.

Read the Threat Intelligence Index

Ransomware costs are rising

While the number of ransomware attacks has decreased, the cost of recovering from these attacks has skyrocketed. The 2024 IBM Cost of a Data Breach report found that the average ransomware attack cost reached $4.91 million across all sectors. As per Sophos, the average recovery cost for state and local governments in 2024 reached $2.83 million, more than double the $1.21 million reported in 2023. This increase can be attributed to the growing sophistication of ransomware attacks, particularly in how they target system backups.

In the past, many organizations could recover from ransomware attacks by restoring data from backups. However, ransomware groups have become more adept at compromising these backups as well, with 99% of state and local government organizations hit by ransomware reporting attempts to compromise their backups. Just over half of these attempts were successful, leading to significantly higher recovery costs as organizations were forced to rebuild their systems from scratch.

The shift towards unaffiliated actors

One of the more interesting trends in 2024 has been the rise of unaffiliated ransomware actors. Coveware reported a significant increase in attacks by unaffiliated actors, often referred to as “lone wolves.” These attackers operate independently of established ransomware brands like LockBit or BlackCat, making it more challenging to attribute attacks to a specific group.

This shift towards unaffiliated actors can be traced back to the collapse of major ransomware groups. As law enforcement crackdowns and infighting destabilized these groups, many ransomware affiliates chose to operate independently or under different ransomware brands. Data suggests that affiliates are moving fluidly between different ransomware groups or, in some cases, going unaffiliated altogether to avoid drawing attention to any single group.

The rise of unaffiliated attackers presents a new challenge for cybersecurity professionals. Without a clear brand attribution, it becomes more difficult to anticipate and defend against attacks. Enterprises and government agencies must focus on defending against the tactics, techniques and procedures (TTPs) of ransomware attacks, rather than simply tracking the movements of known groups.

One example of a solution is an Endpoint Detection and Response (EDR) system. EDR tools continuously monitor endpoints (computers, servers, mobile devices) for suspicious behavior, enabling rapid detection and response to ransomware or other types of malware. These tools can identify anomalies in user behavior, lateral movement across the network or unusual file access patterns, which are often signs of ransomware activity.

What this means for enterprises and critical infrastructure

While the decline in ransomware attacks on state and local governments is promising, enterprises and critical infrastructure organizations cannot afford to let their guard down. The tactics used by ransomware groups are evolving, and while some affiliates may be leaving the cyber extortion ecosystem, others are branching out and developing their own infrastructure.

For enterprises, the focus should shift from solely protecting against known ransomware groups to defending against the broader spectrum of TTPs used in ransomware attacks. This includes strengthening defenses around backup systems as ransomware groups continue to target backups to increase the cost and complexity of recovery.

Additionally, organizations should remain vigilant about the possibility of unaffiliated actors targeting their systems. The fluid nature of the ransomware landscape means that new threats can emerge quickly, and without the brand recognition that typically accompanies high-profile attacks, it may be more difficult to detect these threats early.

Stay vigilant

The increased involvement of law enforcement and the reluctance of governments to pay ransoms are positive developments, but they do not signal the end of the ransomware threat. With threat actors facing headwinds, now is the time for organizations to ramp up their cybersecurity efforts. The cost of complacency is simply too high.

More from Data Protection

Third-party access: The overlooked risk to your data protection plan

3 min read - A recent IBM Cost of a Data Breach report reveals a startling statistic: Only 42% of companies discover breaches through their own security teams. This highlights a significant blind spot, especially when it comes to external partners and vendors. The financial stakes are steep. On average, a data breach affecting multiple environments costs a whopping $4.88 million. A major breach at a telecommunications provider in January 2023 served as a stark reminder of the risks associated with third-party relationships. In…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today