Security News > 2020 > June > UCSF Pays $1.14M After NetWalker Ransomware Attack

According to a BBC report, the NetWalker ransomware is behind the attack.
After detecting the attack, UCSF isolated the affected IT system in the medical school's environment so that the core UCSF network was not affected.
The act of paying the ransom after a ransomware attack has long drawn criticism by security experts, who say that the payouts fund future malicious activities by cybercriminals, and gives them more incentive to launch further attacks.
Recent research conducted by Vanson Bourne and commissioned by security firm Sophos showed that ransomware victims that refused to pay a ransom reported, on average, $730,000 in recovery costs - while organizations that did pay a ransom reported an average total cost, including the ransom, of $1.4 million.
In 2019, a Florida city, hit by a ransomware attack that crippled its computer systems for three weeks, paid the attackers the requested ransom of $600,000.
News URL
https://threatpost.com/ucsf-pays-1-14m-after-netwalker-ransomware-attack/157015/
Related news
- Enzo Biochem settles lawsuit over 2023 ransomware attack for $7.5M (source)
- Medusa ransomware group claims attack on UK's Gateshead Council (source)
- Ransomware attack forces Brit high school to shut doors (source)
- Ransomware gangs pose as IT support in Microsoft Teams phishing attacks (source)
- Security pros more confident about fending off ransomware, despite being battered by attacks (source)
- Only 13% of organizations fully recover data after a ransomware attack (source)
- Ransomware attack at New York blood services provider – donors turned away during shortage crisis (source)
- Ransomware attack disrupts New York blood donation giant (source)
- Indian tech giant Tata Technologies hit by ransomware attack (source)
- US indicts 8Base ransomware operators for Phobos encryption attacks (source)