Security News > 2020 > June > UCSF Pays $1.14M After NetWalker Ransomware Attack
According to a BBC report, the NetWalker ransomware is behind the attack.
After detecting the attack, UCSF isolated the affected IT system in the medical school's environment so that the core UCSF network was not affected.
The act of paying the ransom after a ransomware attack has long drawn criticism by security experts, who say that the payouts fund future malicious activities by cybercriminals, and gives them more incentive to launch further attacks.
Recent research conducted by Vanson Bourne and commissioned by security firm Sophos showed that ransomware victims that refused to pay a ransom reported, on average, $730,000 in recovery costs - while organizations that did pay a ransom reported an average total cost, including the ransom, of $1.4 million.
In 2019, a Florida city, hit by a ransomware attack that crippled its computer systems for three weeks, paid the attackers the requested ransom of $600,000.
News URL
https://threatpost.com/ucsf-pays-1-14m-after-netwalker-ransomware-attack/157015/
Related news
- Lessons from a Ransomware Attack against the British Library (source)
- Jackson County in state of emergency after ransomware attack (source)
- Panera Bread week-long IT outage caused by ransomware attack (source)
- The Week in Ransomware - April 5th 2024 - Virtual Machines under Attack (source)
- How can the energy sector bolster its resilience to ransomware attacks? (source)
- The Drop in Ransomware Attacks in 2024 and What it Means (source)
- Change Healthcare faces second ransomware dilemma weeks after ALPHV attack (source)
- Daixin ransomware gang claims attack on Omni Hotels (source)
- Change Healthcare’s ransomware attack costs edge toward $1B so far (source)
- United Nations agency investigates ransomware attack, data theft (source)