Timeline of the worst ransomeware attacks, 2024

11 January 2025

 
Ransomware reached new heights in 2024, continuing its reign as a major cybersecurity threat. TechCrunch.com shared a great synopsis and overview of global ransomware attacks that affected both public and private entities, who claimed responsibility (where known), and shared approximately how many were impacted. 

As a learning tool for our industry, taking heed of how overseas and local attacks happened, why they happened and what the outcomes were is all part of practical learning and awareness as case study examples. We are grateful to TechCrunch.com for preparing this information, and have taken care to re-produce it without duplication, though have taken all information as facts from their original article. 

Ransomware Revisited 2024

Beyond the widespread disruptions caused by file-locking malware, such as service outages, ransomware attacks also led to massive data thefts, compromising the personal information of millions—sometimes with lifelong consequences.

While there have been some significant successes in the fight against ransomware, such as disrupting the notorious LockBit group and dismantling Radar, these types of attacks show no signs of slowing down. In fact, they are becoming more frequent and increasingly sophisticated.

Let's revisit some of the most significant ransomware incidents of 2024.

January

 

Loan Depot

At the beginning of the year, mortgage and loan giant LoanDepot revealed that it had fallen victim to a cyberattack involving the “encryption of data,” commonly known as ransomware. The breach left customers unable to access their account details or make payments, prompting the Florida-based company to shut down certain systems. In the weeks that followed, Loan Depot disclosed that the personal information of over 16 million individuals had been compromised.

 

Fulton County, Georgia

Also in January, the infamous LockBit ransomware group took responsibility for a cyberattack on Fulton County, Georgia, home to over a million residents and the state’s largest county. The attack caused widespread disruptions, including outages that affected phone services, court operations, and the tax system. The group released large volumes of data from the county, including "confidential documents," but later removed these files from its dark web site, suggesting that a ransom payment may have been made. While LockBit claimed that Fulton County had paid the ransom, security experts believe the hackers lost most of the stolen data when U.S. and U.K. authorities seized their servers the following month.

 

Southern Water

At the start of the year, U.K. utility provider Southern Water reported that it was looking into a potential data theft incident. Several weeks later, the company confirmed that ransomware attackers had compromised the personal information of over 470,000 customers. The Black Basta ransomware group, a gang with ties to Russia, claimed responsibility for the attack. This group had previously taken credit for a 2023 hack on U.K. outsourcing giant Capita. Southern Water provides essential water and wastewater services to millions across the southeast of England.

 

February

Change Healthcare

In February, one of the year's most significant data breaches occurred, marking the largest-ever breach of U.S. health and medical data. Change Healthcare, a health tech company owned by UnitedHealth, fell victim to the ALPHV ransomware group, which claimed to have stolen "millions" of Americans' sensitive health and patient data. Reports indicate that Change Healthcare paid $22 million to ALPHV before the gang disappeared in March. However, the ALPHV contractor responsible for the attack later demanded a second ransom payment from the company.

UnitedHealth conceded in April that the hack led to a data breach affecting a “substantial proportion of people in America.” It wasn’t until October that UnitedHealth confirmed that at least 100 million people were affected by the data breach, which included sensitive data including medical records and health information, though the precise number of affected individuals is expected to be far higher.

 

March

Omni Hotels

In late March, Omni Hotels & Resorts took its systems offline after discovering hackers on its network, resulting in significant disruptions across its properties, including issues with phones and Wi-Fi. By April, the hotel chain confirmed that cybercriminals had stolen personal data from its customers during the March ransomware attack, which was attributed to the notorious Daixin gang. Reports indicated that the group claimed to have stolen 3.5 million customer records from Omni.

 

June

Evolve Bank

In June, Evolve Bank, a prominent U.S.-based banking-as-a-service provider, fell victim to a ransomware attack that caused significant disruptions for its banking clients and fintech partners, such as Wise and Mercury. The LockBit group took responsibility for the breach, releasing data they claimed to have stolen from Evolve on their dark web leak site. By July, Evolve confirmed that the hackers had accessed the personal information of at least 7.6 million individuals, including Social Security numbers, bank account details, and contact information.

Synnovis

Also in June, the NHS declared a critical incident following a ransomware attack on Synnovis, a key pathology services provider. The attack caused widespread disruptions, including canceled surgeries, the rerouting of emergency patients, and delays in blood matching, leading the NHS to issue a national appeal for "O" blood-type donors. The Qilin ransomware group took credit for the breach and later released 400 gigabytes of sensitive data, reportedly comprising around 300 million patient interactions spanning several years. This made the attack one of the largest ransomware incidents of the year.

 

July

Columbus, Ohio

A ransomware attack targeted the City of Columbus, Ohio, compromising the personal information of approximately 500,000 residents. The stolen data included names, dates of birth, addresses, government IDs, Social Security numbers, and bank account details. The cybercrime group Rhysida, known for its previous attack on the British Library, claimed responsibility for the Columbus breach in August, asserting that it had exfiltrated 6.5 terabytes of data from the city.

 

September

Transport for London

In September, Transport for London, the organization responsible for the city's public transit system, faced several weeks of digital disruptions following a cyberattack on its corporate network. The Clop ransomware group, which has known links to Russia, later took responsibility for the breach. Although the transit network itself remained operational, the attack led to the theft of banking data from around 5,000 customers. Additionally, the incident prompted the transit authority to manually reset the login passwords for all 30,000 of its employees in person.

 

October

Casio

In October, Japanese electronics giant Casio confirmed to TechCrunch that it had fallen victim to a ransomware attack. The incident, attributed to the Underground ransomware group, disrupted several of Casio’s systems, rendering them "unusable" and causing delays in product shipments for weeks. The attack also led to the theft of personal information from employees, contractors, and business partners, as well as sensitive company data, including invoices and human resources files. Casio reported that the hackers had accessed "information about some customers," though the company did not specify how many were impacted.

 

November

Blue Yonder

In November, a ransomware attack on Blue Yonder, one of the largest global providers of supply chain software, caused significant disruptions for several major retailers in the U.S. and U.K. Two of the U.K.'s largest supermarket chains, Morrisons and Sainsbury's, confirmed to TechCrunch that they were affected by the attack, while U.S. coffee chain Starbucks also experienced issues, including the need for store managers to manually process payroll. While Blue Yonder has provided limited details about the breach, including whether any data was stolen, both the Clop ransomware group and the newer Termite crew have claimed responsibility, alleging they took 680 gigabytes of data, including documents, reports, insurance files, and email lists.

 

December

NHS

In December, multiple NHS facilities were targeted by ransomware once again, with the Russia-linked Inc Ransom gang claiming responsibility for compromising Alder Hey Children’s Hospital Trust, one of the largest children's hospitals in Europe. This gang, which had previously breached an NHS trust in Scotland earlier in the year, asserted that it had accessed Alder Hey’s patient records and donor reports, along with data from other nearby hospitals. Additionally, the Wirral University Teaching Hospital, located close to Alder Hey, declared a critical incident after falling victim to a separate ransomware attack.

Artivion

December saw another healthcare-focused attack, this time targeting Artivion, a medical device company that produces implantable tissues for cardiac transplants. The company confirmed a "cybersecurity incident," which involved the "acquisition and encryption" of data, suggesting it was a ransomware attack. In response, Artivion took several systems offline to mitigate the impact of the breach.

Back to Articles