Source |
Cyble |
Identifiant |
8651909 |
Date de publication |
2025-02-28 09:19:29 (vue: 2025-02-28 10:08:20) |
Titre |
Les attaques des ransomwares américaines ont de nouveau augmenté en février U.S. Ransomware Attacks Surged Again in February |
Texte |
Overview
U.S. ransomware incidents in February have surged well beyond January\'s totals despite the significantly shorter month. According to Cyble data, ransomware attacks started in 2025, up 150% from the year-ago period, likely driven by the perception among ransomware groups that U.S. organizations are more likely to pay ransom. Canada, too, continues to experience elevated ransomware attacks, while other global regions have remained largely stable (chart below). That trend has continued through the month of February.
According to Cyble data, the U.S. was hit by 372 ransomware attacks on February 27, well beyond the 304 attacks it saw for all of January 2025. Globally, ransomware attacks increased from 518 in January to 599 for the first 27 days of February, so the U.S. share of global ransomware attacks has also increased, from 58.7% to 62.1%.
February ransomware attacks by country (Cyble)
We\'ll look at what\'s behind the increase in ransomware attacks (hint: a big name returned in a big way), as well as other developments in the ransomware threat landscape this month.
New Ransomware Groups Emerge
Cyble documented the rise of three new ran |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
$15 1024x512 150 2024 2025 300x150 304 372 ransomware attacks 50/50 518 599 60/40 80/20 access according accounting actions active activity actor added addition additional aerospace affiliates after again ago agriculture akira all alleged allegedly allow almost alphv/blackcat also among announced another anubis appears are artificial attack attacks attacks increased attractiveness automated automotive backup backups based basis batches become becomes been behind being below best between beyond big biotechnology blogs both breached briefly brokerage but campaign can canada caption= certified chacha+ecies chain chart cl0p claimed claiming claims clearer code coerce com/wp come coming commenced communications companies company compatibility compromised conclusion construction consumer content/uploads/2025/02/cyble continued continues continuous copy country cross cryptography curve customer cyble damage data days decryption defense defenses demanded designed despite destruction detailed dethroned developments displayed disrupted dls documented domain dramatic dramatically driven during easily education either elevated elliptic elsewhere emerge encrypt encryption end energy enforcement estate esxi even experience extort extortion facing failed fallen far fear featuring february file= financial firm first fog follow forum four from further gathering generation given global globally goods government gpt group groups has have healthcare high hint: hit hospitality https://cyble identified image implementing incidents including increase increased industries information initial initiating intelligence intimidation introduced investigations involving irreversible isolation it/technology ites its itself january jpg kind knight landscape large largely lateral latest leak leaking learning least like likely limit linkc linux list listed listing lite livestock lockbit locker logical logistics logo look machine making manufacturer manufacturing media medium mft million model monitor monitoring month more most move movement multiple name named names nas nearly negotiations network never new next not observed occurred off older on cleo one onion operating operations organizations other overview partner patching pay payments perception perhaps period pharmaceuticals picture platform play point potential power pressure product professional program propagation public publicly purportedly raas ramp ramping ransom ransomhub ransomware real receive records regardless regions release released remained remains remarkable removal removed reports researchers resistant resurgence return returned reveal rich rise runsomewares sabotage samples saw second security see seems segmentation service services several shadow shaming share shorter showcasing shown shutdowns significantly site solutions source spanned specializing speed split stable started starting staying strategic such suggests supersonic supply supports surfaced surge surged target telecommunications thailand than theft these those threat three through time title= too top topped total totals transportation trend trust unclear use using utilities version victim victim: victims vulnerabilities waiting way web well what where whether which who wide wild will windows without won year yet zero from up |
Tags |
Ransomware
Vulnerability
Threat
Patching
Legislation
Prediction
Medical
|
Stories |
|
Move |
|