
{"id":3171,"date":"2017-01-03T00:00:00","date_gmt":"2017-01-03T00:00:00","guid":{"rendered":"http:\/\/otava.test\/ransomware-facts-and-figures\/"},"modified":"2017-01-03T00:00:00","modified_gmt":"2017-01-03T00:00:00","slug":"ransomware-facts-and-figures","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/","title":{"rendered":"Ransomware and healthcare: What you need to know"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-16981\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg\" alt=\"Ransomware skull\" width=\"350\" height=\"225\" \/>Ransomware was\u00a0officially a\u00a0<a href=\"https:\/\/www.theatlantic.com\/business\/archive\/2016\/09\/ransomware-us\/498602\/\" target=\"_blank\" rel=\"noopener noreferrer\">billion dollar crime<\/a>\u00a0in 2016, with more than 4,000 attacks since <a href=\"https:\/\/www.carbonblack.com\/webinars\/decoding-ransomware-how-to-reduce-your-risk-of-attack\/?utm_campaign=Ransomware+Webcast+Follow-up+Email+9.15&amp;utm_medium=email&amp;utm_source=Eloqua&amp;elq=f331fa6ed1824d5693d2aae990a41b2e\" target=\"_blank\" rel=\"noopener noreferrer\">Jan. 1<\/a> and at least 25 variants of ransomware discovered. Researchers have predicted they would\u00a0discover more than 100 variants before year\u2019s end. And as of August, Malwarebytes research uncovered 40 percent of businesses in four countries experiencing an attack in the past year. One third of those businesses attacked lost revenue as a result.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Who_are_the_victims\"><\/span>Who are the victims?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Healthcare and financial services are the most popular enterprise targets, although no one is immune. These industries critically depend on up-to-date records to conduct business, hence, they have been more frequently targeted. <a href=\"https:\/\/www.beckershospitalreview.com\/healthcare-information-technology\/hospitals-are-hit-with-88-of-all-ransomware-attacks.html\" target=\"_blank\" rel=\"noopener noreferrer\">Hospitals<\/a>\u00a0have been hit especially hard with 88 percent of attacks, according to Solutionary&#8217;s Security Engineering Research Team Quarterly Threat Report for Q2 2016. In February, Hollywood Presbyterian Hospital paid a $17,000 ransom to get its <a href=\"https:\/\/www.latimes.com\/business\/technology\/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html\" target=\"_blank\" rel=\"noopener noreferrer\">EHR back<\/a>, and the Kansas Heart Hospital also admitted to paying a ransom in May, except it gets worse: The hackers demanded a <a href=\"https:\/\/www.healthcare-informatics.com\/news-item\/kansas-heart-hospital-hit-ransomware-hackers-do-not-unlock-files-after-receiving-ransom\" target=\"_blank\" rel=\"noopener noreferrer\">second ransom<\/a> to unlock the data. And in April, the <a href=\"https:\/\/www.wsj.com\/articles\/how-a-u-s-utility-got-hacked-1483120856\" target=\"_blank\" rel=\"noopener noreferrer\">Lansing Board of Water and Light<\/a> paid $25,000 to retrieve its data after discovering ransomware on its computers&#8211;the first U.S. utility company known to have paid a ransom.<\/p>\n<p>Banks have not been <a href=\"https:\/\/blog.varonis.com\/banks-secretly-and-silently-struggling-with-ransomware-are-not-alone\/\" target=\"_blank\" rel=\"noopener noreferrer\">immune<\/a> to attacks either, although you won\u2019t always hear about them. While it\u2019s not been a public threat, the Federal Financial Institutions Examination Council did issue a <a href=\"https:\/\/www.ffiec.gov\/press\/pr110315.htm\" target=\"_blank\" rel=\"noopener noreferrer\">warning<\/a> about the severity of ransomware last year.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Different_ransomware_families_to_watch_out_for\"><\/span>Different ransomware families to watch out for:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are more than 25 families of ransomware, and researchers say they are on pace to discover more than <a href=\"https:\/\/www.darkreading.com\/endpoint\/7-scary-ransomware-families--\/d\/d-id\/1327259\" target=\"_blank\" rel=\"noopener noreferrer\">100 variants<\/a> within the families. The top variants in the US are: CryptoWall, CTB-Locker, TeslaCrypt, Locky, Cerber and MSIL\/Samas.A.<\/p>\n<p><strong>CryptoWall<\/strong>: First appeared in early 2014, and famous for AES encryption, unique CHM (a type of file) infection mechanism, and robust command and control (C2) activity using Tor networking. It also uses various exploit kits, spam campaigns and malvertising to gain access to computers. CryptoWall uses <a href=\"https:\/\/en.wikipedia.org\/wiki\/I2P\" target=\"_blank\" rel=\"noopener noreferrer\">Invisible Internet Project<\/a> (I2P) network proxies to communicate with the live command and control servers, making it anonymous. It also uses Tor for Bitcoin payments, making this strain extremely difficult for AV software to trace the malware author. It\u2019s been very\u00a0popular in attacks against hospitals\u2014in the Solutionary Security report, of all the hospitals claimed to have been hit with ransomware, 94 percent were victims of CryptoWall.<\/p>\n<p><strong>CTB-Locker<\/strong>: <a href=\"https:\/\/thehackernews.com\/2016\/02\/ctb-locker-ransomware.html\" target=\"_blank\" rel=\"noopener noreferrer\">CTB-Locker<\/a> (Curve-Tor-Bitcoin) is a family of ransomware that has branches modified to include lockouts of websites. It&#8217;s known for its use of Curve Elliptography encryption, Tor browser service for victims to make payments, and Bitcoin for the currency of those payments. It\u2019s most commonly distributed through spam campaigns, but it has also been seen in <a href=\"https:\/\/blogs.sophos.com\/2015\/12\/31\/the-current-state-of-ransomware-ctb-locker\/\" target=\"_blank\" rel=\"noopener noreferrer\">several exploit kits<\/a>, including Rig and Nuclear. Bleeping Computer has a handy <a href=\"https:\/\/www.bleepingcomputer.com\/virus-removal\/ctb-locker-ransomware-information\" target=\"_blank\" rel=\"noopener noreferrer\">FAQ<\/a> guide to CTB-locker for more information.<\/p>\n<p><strong>TeslaCrypt<\/strong>: Once a dangerous strain, the good news is that TeslaCrypt shut down in May and is now defunct. If your files were encrypted with a .xxx, .ttt,\u00a0 or .micro extension, go to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/teslacrypt-shuts-down-and-releases-master-decryption-key\/\" target=\"_blank\" rel=\"noopener noreferrer\">this site<\/a> for the master key and step-by-step guidance to unlock your files for free. Even if your files are encrypted with other extensions, it doesn\u2019t hurt to try.<\/p>\n<p><strong>Locky<\/strong>: One of the <a href=\"https:\/\/www.idigitaltimes.com\/new-locky-ransomware-virus-spreading-alarming-rate-can-malware-be-removed-and-files-512956\" target=\"_blank\" rel=\"noopener noreferrer\">most dangerous strains<\/a>, it\u2019s been accounted for <a href=\"https:\/\/www.darkreading.com\/endpoint\/new-free-tool-stops-petya-ransomware-and-rootkits\/d\/d-id\/1327241?\" target=\"_blank\" rel=\"noopener noreferrer\">6 percent<\/a> of all attacks recognized globally during September 2016. Locky is dangerous because it uses multiple exploit kits, including Angler and Neutrino, as well as macros to encrypt files after a user opens a document. It\u2019s usually found in Office documents or embedded in JavaScript and sent as part of a phishing campaign. Once the victim has their files encrypted, the ransom note is set as wallpaper, and they are instructed to pay via a private Tor browser. Locky also removes shadow copies on Windows systems, making victims\u00a0even more likely to pony\u00a0up. The malware spreads through networks and across Windows, OSX and Linux platforms.<\/p>\n<p><strong>Cerber<\/strong>: One of the more widely used strains of ransomware this year, Cerber uses a wide variety of tactics to gain access, including DDoS attacks, Windows Scripting and attacks on cloud platforms. The ransomware attacks individual machines but has also been found to encrypt entire enterprise databases, making it especially dangerous. It encrypts many file types, including .doc, .mdb, .pdf, .txt and .backup, and adds a .cerber extension to each file. During encryption, the malware creates three different files that tell the victim his\/her files have been encrypted, including a .vbs file that plays a message through the computer speakers. While several decryption tools have been released, the ransomware has been updated and unfortunately, there are <strong>no free tools to decrypt files available at this time<\/strong>.<\/p>\n<p><strong>MSIL\/Samas.A<\/strong>: This strain of ransomware and its variants target an entire network of machines rather than individual computers. This makes it especially dangerous for enterprise operations, including healthcare and financial sectors. The FBI <a href=\"https:\/\/www.reuters.com\/article\/us-usa-cyber-ransomware-idUSKCN0WU1GB\" target=\"_blank\" rel=\"noopener noreferrer\">issued an alert<\/a> about this strain last year, adding that\u00a0like Locky, it also looks for network backups to delete and cautioning businesses to be on alert.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Lessons_learned_from_Code_Spaces\"><\/span>Lessons learned from Code Spaces<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Anyone remember Code Spaces? It was an up-and-coming SaaS provider offering developers source code management tools available through AWS. In June 2014, an <a href=\"https:\/\/www.csoonline.com\/article\/2365062\/disaster-recovery\/code-spaces-forced-to-close-its-doors-after-security-incident.html\" target=\"_blank\" rel=\"noopener noreferrer\">attacker<\/a> gained control of the company\u2019s AWS control panel and orchestrated a DDoS attack. When the company contacted the attacker, they were told to pay a ransom to stop the attack. Instead of paying the ransom, Code Spaces tried to regain control of its panel. In response, the attacker started <a href=\"https:\/\/arstechnica.com\/security\/2014\/06\/aws-console-breach-leads-to-demise-of-service-with-proven-backup-plan\/?comments=1\" target=\"_blank\" rel=\"noopener noreferrer\">deleting data<\/a> and didn\u2019t stop until they had removed all EBS snapshots, S3 buckets, all AMIs and several EBS and machine instances. The move effectively <a href=\"https:\/\/blog.trendmicro.com\/the-code-spaces-nightmare\/\" target=\"_blank\" rel=\"noopener noreferrer\">destroyed the company<\/a>.<\/p>\n<p>It sounds like the lesson here is, \u201cPay up when you\u2019re told to pay.\u201d But Code Spaces was right not to pay the ransom. There was no guarantee the attacker would have stopped the flood of traffic, nor given Code Spaces its panel back without deleting anything. Instead, the lesson that can be learned is, \u201cDon\u2019t put your production and backup eggs in one basket.\u201d Code Spaces had a backup and recovery plan and also replicated servers, but <strong>it had them hosted in the same AWS control panel as its regular machine and server instances.<\/strong> Once that panel was illegally accessed, it pretty much spelled the end of the company. The moral? When you back up your copy, follow the 3-2-1 rule: Three copies of data, on two different media, with one offsite.<\/p>\n<p>While Code Spaces isn\u2019t a literal case of ransomware, it\u2019s certainly appropriate here. The same recommendation to back up your data offsite holds true to protect oneself against ransomware as it does any other attack. Several\u00a0strains of ransomware have been known to infect backups stored on the network, rendering them useless. It\u2019s important to have a data set that\u2019s disconnected from the network to avoid infection or corruption.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"To_pay_or_not_to_pay_that_is_the_question\"><\/span>To pay or not to pay, that is the question<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Even if you\u2019ve done all you can to prevent attackers from infecting your network, cyber criminals are a pesky, determined bunch. It\u2019s best to expect them to break in at some point, as bleak as that statement is. When you find yourself facing the morning you\u2019ve been dreading\u2014waking up to a ransom screen demanding money in return for access to your data\u2014what will you do? Do you pay, or try to get your systems back?<\/p>\n<p>It\u2019s easy to advise one way or the other, but when you\u2019re in the middle of an attack, it can be a completely different scenario. The FBI and major security researchers, however, all recommend <strong>not<\/strong> paying the ransom if possible. As mentioned before, paying the ransom doesn\u2019t guarantee anything, and it also reinforces the success of the attack. Most criminals have developed a reputation termed \u201cdishonest reliability\u201d where they do indeed give you the decryption key to get your data back once you pay up. But they don\u2019t all operate that way, and it\u2019s a dangerous gamble to assume they will. The Kansas Heart Hospital case is a great example of this\u2014the hospital paid the first ransom, and the attackers demanded a second before giving up the encryption keys. In this case, the hospital chose <a href=\"https:\/\/www.healthcare-informatics.com\/news-item\/kansas-heart-hospital-hit-ransomware-hackers-do-not-unlock-files-after-receiving-ransom\" target=\"_blank\" rel=\"noopener noreferrer\">not<\/a> to pay the second ransom, citing it wasn\u2019t a \u201cwise maneuver or strategy.\u201d\u00a0Unfortunately, Kansas Heart is a clear demonstration of how paying a ransom doesn\u2019t always get you what you expect.<\/p>\n<p>If you\u2019ve been the victim of a ransomware attack, it\u2019s important to contact the FBI. Visit the FBI website to see a <a href=\"https:\/\/www.fbi.gov\/contact-us\/field-offices\" target=\"_blank\" rel=\"noopener noreferrer\">list of field offices<\/a> throughout the US.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Your_options\"><\/span>Your options<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Your best recourse is to restore from a safe backup. This is where having a strong, thorough disaster recovery and backup strategy is so important. For more information on developing that strategy and what considerations you should make, check out the following resources:<\/p>\n<ul>\n<li><a href=\"https:\/\/web.otava.com\/offsite-backup-and-recovery-buying-guide-0\" target=\"_blank\" rel=\"noopener noreferrer\">Offsite backup and recovery buying guide<\/a><\/li>\n<li><a href=\"https:\/\/www.onlinetech.com\/products\/offsite-backup-and-recovery\" target=\"_blank\" rel=\"noopener noreferrer\">Offsite backup options<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/03\/how-to-beat-ransomware-prevent-dont-react\/\" target=\"_blank\" rel=\"noopener noreferrer\">Prevent, don&#8217;t react: Beating ransomware<\/a><\/li>\n<li>Look for a <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\/\" target=\"_blank\" rel=\"noopener noreferrer\">DRaaS<\/a>\u00a0and BaaS provider who will help you transfer your data and walk through each <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/mitigating-the-management-expense-of-offsite-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\">consideration<\/a> so you save your organization a lot of stress and headaches.<\/li>\n<\/ul>\n<p>In addition, training your <u>entire<\/u> company to recognize phishing attempts and establishing a culture where it\u2019s <a href=\"https:\/\/blog.trendmicro.com\/spear-phishing-emails-avoid\/\" target=\"_blank\" rel=\"noopener noreferrer\">ok<\/a> to question to source of an email are key measures to take in defending your organization against ransomware threats.<\/p>\n<p>Ransomware is no joke. It threatens both individuals and enterprises alike. It\u2019s become such a profitable industry that an entire <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-as-a-service-ransomware-operators-find-ways-to-bring-in-business\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware-as-a-Service<\/a> branch has sprung up from it. Until we take preventative action to secure our data, these attacks will unfortunately continue to grow because they are so profitable. Creating offsite backups that are kept up regularly is one way to mitigate the threat. Training yourself and\/or your employees to recognize and avoid spam and phishing attempts as well as disable\u00a0macros can stop the malware from being loaded onto the computer in the first place. In a future post, we\u2019ll go into more detail about the anatomy of a ransomware attack and how to protect yourself.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Other_ransomware_resources\"><\/span>Other ransomware resources<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you\u2019re curious about ransomware, learn more from these blog posts:<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-ransomware-and-how-do-you-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">What is ransomware and how do you protect against it?<\/a><\/strong>\u00a0Ransomware has been rising at an \u201calarming rate,\u201d according to security researchers, with a 3,500 percent increase in criminal use of net infrastructure that helps run ransomware campaigns.\u00a0It can affect anyone with a computer or mobile device, and there are already plenty of examples\u2026 (<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-is-ransomware-and-how-do-you-protect-against-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">read more<\/a>)<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">Seven best practices for securing yourself against ransomware in 2017<\/a><\/strong>:\u00a0Ransomware may have possibly taken the crown as THE crime to beat in 2016, with record growth and profits for criminals. While payments used to start around $50, the average payout is now $679, with $209 million paid out in Q1 of 2016 alone\u2026 (<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/seven-best-practices-for-securing-yourself-against-ransomware-in-2017\/\" target=\"_blank\" rel=\"noopener noreferrer\">read more<\/a>)<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/how-does-ransomware-as-a-service-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">How does Ransomware as a Service work?<\/a><\/strong> Ransomware has made headlines time and again for its devastating effectiveness on governments and organizations, but researchers are starting to pay attention to a developing trend within ransomware: Ransomware as a Service (RaaS)\u2026 (<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/how-does-ransomware-as-a-service-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">read more<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware was\u00a0officially a\u00a0billion dollar crime\u00a0in 2016, with more than 4,000 attacks since Jan. 1 and at least 25 variants of ransomware discovered. Researchers have predicted they would\u00a0discover more than 100 variants before year\u2019s end. And as of August, Malwarebytes research uncovered 40 percent of businesses in four countries experiencing an attack in the past year. One third of those businesses attacked lost revenue as a result. Who are the victims? Healthcare and financial services are the most popular enterprise targets, although no one is immune. These industries critically depend on up-to-date records to conduct business, hence, they have been more frequently targeted. Hospitals\u00a0have been hit especially hard with 88 percent of attacks, according to Solutionary&#8217;s Security Engineering Research Team Quarterly Threat Report for Q2 2016. In February, Hollywood Presbyterian Hospital paid a $17,000 ransom to get its EHR back, and the Kansas Heart Hospital also admitted to paying a ransom in May, except it gets worse: The hackers demanded a second ransom to unlock the data. And in April, the Lansing Board of Water and Light paid $25,000 to retrieve its data after discovering ransomware on its computers&#8211;the first U.S. utility company known to have paid a ransom. Banks have&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-3171","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware and healthcare: What you need to know | OTAVA<\/title>\n<meta name=\"description\" content=\"Ransomware has devasted many industries lately but none so much as healthcare. Here&#039;s what organizations need to know in order to stay ahead.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware and healthcare: What you need to know\" \/>\n<meta property=\"og:description\" content=\"Ransomware has devasted many industries lately but none so much as healthcare. Here&#039;s what organizations need to know in order to stay ahead.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-03T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Ransomware and healthcare: What you need to know\",\"datePublished\":\"2017-01-03T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/\"},\"wordCount\":1873,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/\",\"url\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/\",\"name\":\"Ransomware and healthcare: What you need to know | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg\",\"datePublished\":\"2017-01-03T00:00:00+00:00\",\"description\":\"Ransomware has devasted many industries lately but none so much as healthcare. Here's what organizations need to know in order to stay ahead.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware and healthcare: What you need to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware and healthcare: What you need to know | OTAVA","description":"Ransomware has devasted many industries lately but none so much as healthcare. Here's what organizations need to know in order to stay ahead.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware and healthcare: What you need to know","og_description":"Ransomware has devasted many industries lately but none so much as healthcare. Here's what organizations need to know in order to stay ahead.","og_url":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/","og_site_name":"OTAVA","article_published_time":"2017-01-03T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Ransomware and healthcare: What you need to know","datePublished":"2017-01-03T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/"},"wordCount":1873,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/","url":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/","name":"Ransomware and healthcare: What you need to know | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg","datePublished":"2017-01-03T00:00:00+00:00","description":"Ransomware has devasted many industries lately but none so much as healthcare. Here's what organizations need to know in order to stay ahead.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Ransomware-skull-11.14.16.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/ransomware-facts-and-figures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware and healthcare: What you need to know"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=3171"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/3171\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=3171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=3171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=3171"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=3171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}