DATA PROTECTION

The State of Data Security: All the Ways Organizations Lost their Data in 2024

January 16, 2025By Robert Callaghan

Introduction

2024 was another banner year for cybercriminals. Ransomware in particular continued to wreak havoc across critical sectors and the numbers are startling. According to The State of Ransomware 2024 report from Sophos, 59% of organizations were hit by ransomware attacks in the last year. And while 98% of targets were able to recover their data, they faced serious disruptions and costs. The average initial ransom demand was $2 million. Added to that was the cost of recovery, which was $2.73 million on average.

Last year, hackers caused operational paralysis, data loss, and financial penalty to some of the world’s largest organizations and governmental bodies. What’s more, many of these incidents could have been mitigated or avoided entirely with a simple countermeasure. Let’s take a tour through some of 2024’s most destructive ransomware events.

Healthcare provider

One of the largest healthcare providers in the United States was hit with a ransomware attack in early 2024. The result was a data breach that compromised the records of 131 million patients. The leak encompassed personal health information (PHI), payment records, patients’ social security numbers, and personally identifiable information (PII). The provider then faced a slew of regulatory consequences for this breach.

The attack forced the company to shut down healthcare software applications, such as those that fulfill prescriptions. It also caused the company to switch off its payment services, dental, and medical records applications—disrupting care and potentially affecting patients’ health.

The problem

The breach was possible because the attackers were able to use stolen credentials to access the company’s networks and data assets. This mode of attack is actually quite common. According to the Sophos report, 29% of ransomware attacks are based on compromised credentials. A lack of multi-factor authentication (MFA) enabled the attackers to exploit stolen credentials to penetrate the healthcare provider’s networks. Without the ability to authenticate users and their devices, the company was vulnerable to attackers impersonating legitimate users. There was no way to prevent the intrusion.

The solution

MFA could have done a lot to stop the attack. By requiring a user to confirm receipt of a unique code, usually sent by text message or email, before permitting network access, MFA blocks the use of stolen credentials. Newer modes of MFA, such as those that use mobile apps, offer a more robust solution that avoids the risk of intercepting SMS messages through mobile device spoofing. Multi-user authentication (MUA) is potentially an even stronger authentication countermeasure. By requiring more than one user to confirm an action, such as deleting or encrypting data or modifying or deleting an account, MUA can mitigate some of the worst impacts of a ransomware attack even if your systems have been breached.

National government

A ransomware attack affected over 200 government agencies in one of the world’s most populous countries in 2024. The attack disrupted airport operations and immigration processing, among many other essential government functions. The government refused to pay the attacker’s multi-million-dollar ransom demand and has been able to decrypt its data to recover from the attack. However, the process delayed the resumption of many government services, negatively affecting governance and citizens’ lives.

The problem

What went wrong? It turns out that this country did not have a backup policy that worked across its many agencies. This may seem hard to believe, but anyone who has worked in government IT will understand that it is challenging to define, enforce, and verify a backup policy across 200 different agencies. That said, it’s essential to understand how important backups can be to recovering from ransomware attacks. Safely restoring backed up data enables an enterprise to outsmart the attacker and avoid paying the ransom.

The solution

It’s an accepted security best practice to establish a regular schedule of backups. The best results may come from using a dedicated backup provider. However, the “best” ransomware attackers also target backups. Indeed, as the Sophos reports explained, 94% of victims said attackers targeted their backups, and for good reason. By encrypting the original data set and the backed-up copy, the attacker gives the target few choices other than to pay the ransom. There is a way to mitigate this risk, however. With an immutable backup it is impossible for an attacker to encrypt or delete backed up data even if he can access it.

Major transportation hub

In the fall of 2024, a ransomware attacker targeted one the busiest and most economically significant transportation hubs in the United States. The attacker compromised several systems and encrypted their data, impairing the functioning of a major airport and marine shipping facilities. The authority that runs the port refused to pay the ransom. They were able to restore the data and systemic functionality, however the process took longer than anyone expected and resulted in inconvenience for travelers and shipping companies.

The problem

The port did have reliable backups and a viable backup strategy in place. Yet, it still experienced downtime and loss of business. The difficulty came from inefficient backup and restoration processes. It simply took a long time, and a lot of administrative processes, to recover from the effects of the attack. In addition, the port had to pay egress costs to pull their backed-up data out of cloud storage volumes.

The solution

It’s a wise practice to think through recovery time objective (RTO) windows when selecting a backup solution. A ransomware attack is already a major incident to handle. If it then takes extra hours or even days to restore data, that will compound the impact of the attack. Additionally, a backup service without egress and API fees will save on the costs of restoration.

Major cloud services provider

Hackers breached a major cloud services provider and accessed a large amount of data housed there by a data analytics software platform. The data belonged to numerous large companies, including banks and entertainment venues. The attack was not a ransomware attack, but rather a variant on the approach, wherein the hackers exfiltrated valuable data and attempted to sell it on the dark web. Banks’ customer records were offered for sale, along with credit card account information, and more.

The problem

The attack was very sophisticated, with the hackers first stealing login credentials from customers’ personal devices and then breaching the data analytics platform using those stolen credentials. They were able to exfiltrate data without anyone at the cloud provider being aware. By the time the provider became aware of the breach, the attacker had already exfiltrated reams of sensitive data. This is actually quite common and, in this case, extremely damaging.

The solution

Egress alerts notify storage admins of any data retrieval from their account. If enabled, this feature could have helped to reduce the impact of this attack. If the cloud provider had set up egress alerts, its admins would have received notifications when data was being exfiltrated from the storage environment, alerting them to the breach much sooner than they had been and potentially mitigating the data that was leaked online.

Conclusion

The four attacks discussed in this article represent some of the more serious cybersecurity incidents in a year that saw thousands of such events. Ransomware caused disruption and expense in healthcare, transportation, and government, and successfully stole data from major corporations. The probability and impact of these attacks could have been reduced through the right countermeasures. With consistent backups, meaningful RTPs, MFA, immutable backups, and egress alerts, there is less risk of suffering a ransomware attack or data breach.

solution

Backup & Recovery

Learn about Wasabi’s backup and restore solutions.

Learn more

Related article

icon of a laptop backing up data to a green cloud
DATA PROTECTION5 things customers like most about Wasabi for cloud backups

Most Recent

The future of sports media: manage costs and optimize budgets with cloud tiering

Digital content has transformed the way we consume sports media, and managing vast amounts of data is now the name of the game.

Cloud Storage Simplified: Wasabi’s Innovative Alternative in a Hyperscaler Market

Learn what makes Wasabi different from legacy hyperscaler solutions from providers like AWS, Azure, or Google.

The Trends IT Leaders Think 2025 Will Bring in Sustainability, AI, and Media

Wasabi customers share how sustainability, AI, and media are set to transform in the new year and what data demands they might require.

SUBSCRIBE

Storage Insights from the Storage Experts

Storage insights sent direct to your inbox every other week.

Subscribe