Submitted:
21 April 2025
Posted:
27 April 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Methods
3. Impact of Cyber Attacks on Digital Society and Economy
| Area / Region | Regional GDP (in trill. $) |
Costs of cyberattacks (in bill. $) |
Losses caused by cyber attacks (in % of GDP) |
|---|---|---|---|
| North America | 20.2 | 140-175 | 0.69-0.87 |
| Europe & Central Asia | 20.3 | 160-180 | 0.79-0.89 |
| East Asia and the Pacific | 22.5 | 120-200 | 0.53-0.89 |
| South Asia | 2.9 | 7-15 | 0.24-0.52 |
| Latin America and the Caribbean | 5.3 | 15-30 | 0.28-0.57 |
| Sub-Saharan Africa | 1.5 | 1-3 | 0.07-0.20 |
| Middle East and North Africa | 3.1 | 2-5 | 0.06-0.16 |
| Global | 75.8 | 445-608 | 0.59-0.80 |
4. Vector Modalities and Attack Classification
5. Classification of Ransomware Costs and Expenses
| Direct losses | Indirect losses |
|---|---|
| Payment of the ransom | Recovery process which includes investigation costs, verification costs for checking the system (diagnostics and remediation) and restoration costs to restory the system to the network (testing) |
| Data breach | Loss of data as an operating loss caused by business interruption |
| Other claims for liability for losses suffered by third parties | Loss of customers and business clients |
| The market value or replacement value of the property or servicies destroyed | Loss of reputation |
6. Analysis and Financial Assessment of the Consequences
7. Discussion
8. Conclusions
Funding
Acknowledgements
Conflicts of Interest
References
- Aleksandrina, M. , Budiarti, D., Yu, Z., Pasha, F., & Shaw, R. Governmental Incentivization for SMEs’ Engagement in Disaster Resilience in Southeast Asia. International Journal of Disaster Risk Management 2019, 1, 32–50. [Google Scholar]
- Al-ramlawi, A. , El-Mougher, M., & Al-Agha, M. The Role of Al-Shifa Medical Complex Administration in Evacuation & Sheltering Planning. International Journal of Disaster Risk Management 2020, 2. [Google Scholar]
- Andersen, E. S. (2025). How to mitigate ransomware risk through data and risk quantification. Cyber Security: A Peer-Reviewed Journal. [CrossRef]
- August, T. , Dao, D., & Niculescu, M. F. (2019). Economics of ransomware attacks. Unpublished manuscript.
- August, T. , Dao, D. , & Niculescu, M. F. Economics of ransomware: Risk interdependence and large-scale attacks. Management Science 2022, 68, 8979–9002. [Google Scholar] [CrossRef]
- Axon, L. , Erola, A., Agrafiotis, I., Uuganbayar, G., Goldsmith, M., & Creese, S. Ransomware as a Predator: Modelling the Systemic Risk to Prey. Digital Threats: Research and Practice 2023, 4, 1–38. [Google Scholar] [CrossRef]
- Benmalek, M. (2024). Ransomware on cyber-physical systems: Taxonomies, case studies, security gaps, and open challenges. Internet of Things and Cyber-Physical Systems. [CrossRef]
- Carla S, R. G. School-community collaboration: disaster preparedness towards building resilient communities. International Journal of Disaster Risk Management 2019, 1, 45–59. [Google Scholar]
- Cashell, B. , Jackson, W. D., Jickling, M., & Webel, B. (2004). The economic impact of cyber-attacks (CRS RL32331). Congressional Research Service.
- Chen, S., Hao, M., Ding, F., Jiang, D., Dong, J., Zhang, S., Guo, Q., & Gao, C. Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications 2023, 10, 71. [CrossRef]
- Chin, K.; (2024). The impact of cybercrime on the economy. Available online: https://www.upguard.com/blog/the-impact-of-cybercrime-on-the-economy.
- Cobos, E. V. (2024). Cybersecurity economics for emerging markets. Washington, DC: World Bank. [CrossRef]
- Cobos, V.; Belen, E.,; Selcen, C. (2024). A review of the economic costs of cyber incidents. Washington, DC: World Bank Group. Available online: http://documents.worldbank.org.
- Connolly, L. , & Wall, D. The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. Comput. Secur. [CrossRef]
- Connolly, L. , Wall, D., Lang, M., & Oddson, B. An empirical study of ransomware attacks on organizations: an assessment of severity and salient factors affecting vulnerability. J. Cybersecur. [CrossRef]
- Cook, S. , Giommoni, L , Trajtenberg Pareja, N., Levi, M., & Williams, M. L. Fear of economic cybercrime across Europe: A multilevel application of routine activity theory. The British Journal of Criminology 2023, 63, 384–406. [Google Scholar] [CrossRef]
- Couce-Vieira, A. , Insua, D R., & Kosgodagan, A. Assessing and forecasting cybersecurity impacts. Decision Analysis 2020, 17, 356–374. [Google Scholar] [CrossRef]
- Cremer, F. , Sheehan, B, Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. Cyber risk and cybersecurity: A systematic review of data availability. The Geneva Papers on Risk and Insurance - Issues and Practice 2022, 47, 698–722. [Google Scholar] [CrossRef]
- Cvetković, S. M. (2013). Vulnerability of critical infrastructure by natural disasters. Paper presented at the National critical infrastructure protection, regional perspective., Belgrade.
- Cvetković, V. Risk Perception of Building Fires in Belgrade. International Journal of Disaster Risk Management 2019, 1, 81–91. [Google Scholar] [CrossRef]
- Cvetković, V. A Predictive Model of Community Disaster Resilience based on Social Identity Influences (MODERSI). International Journal of Disaster Risk Management 2023, 5, 57–80. [Google Scholar] [CrossRef]
- Cvetković, V. (2024a). Disaster Risk Management. In: Scientific-Professional Society for Disaster Risk Management, Belgrade.
- Cvetković, V. (2024b). Essential Tactics for Disaster Protection and Rescue. Scientific-Professional Society for Disaster Risk Management, Belgrade.
- Cvetković, V. M. (2024a). Disaster Resilience: Guide for Prevention, Response and Recovery. In: Belgrade: Scientific-Professional Society for Disaster Risk Management.
- Cvetković, V. M. (2024b). In-Depth Analysis of Disaster (Risk) Management System in Serbia: A Critical Examination of Systemic Strengths and Weaknesses.
- Cvetković, V. M. , & Šišović, V. (2024). Capacity building in Serbia for disaster and climate risk education. In Disaster and Climate Risk Education: Insights from Knowledge to Action (pp. 299–323): Springer Nature Singapore Singapore.
- Cvetković, V. M. , Dragašević, A., Protić, D., Janković, B., Nikolić, N., & Milošević, P. Fire safety behavior model for residential buildings: Implications for disaster risk reduction. International Journal of Disaster Risk Reduction 2022, 76, 102981. [Google Scholar] [CrossRef]
- Cvetković, V. M. , Renner, R., & Jakovljević, V. Industrial Disasters and Hazards: From Causes to Conse-quences—A Holistic Approach to Resilience. International Journal of Disaster Risk Management 2024, 6, 149–168. [Google Scholar]
- Cvetković, V. M. , Tanasić, J., Ocal, A., Kešetović, Ž., Nikolić, N., & Dragašević, A. Capacity Development of Local Self-Governments for Disaster Risk Management. International Journal of Environmental Research and Public Health 2021, 18, 10406. [Google Scholar]
- Cvetković, V. , & Grbić, L. (2021). Public perception of climate change and its impact on natural disasters. Journal of the Geographical Institute Jovan Cvijic.
- Cvetković, V. , & Janković, B. Private security preparedness for disasters caused by natural and anthropogenic hazards. International Journal of Disaster Risk Management 2020, 2, 23–33. [Google Scholar]
- Cvetković, V. , & Kezunović, A. Security Aspects of Critical Infrastructure Protection in Anthropogenic Disasters: A Case Study of Belgrade. Research Squares – Preprint. [CrossRef]
- Cvetković, V. , & Martinović, J. Inovative solutions for flood risk management. International Journal of Disaster Risk Management 2020, 2, 71–100. [Google Scholar]
- Cvetković, V. , & Renner, R. (2024). Comprehensive Databases on Natural and Man-Made (Technological) Hazards and Disasters: Mapping Risks and Challenges. In: Belgrade: Scientific-Professional Society for Disaster Risk Management.
- Cvetković, V. , & Šišović, V. Understanding the Sustainable Development of Community (Social) Disaster Resilience in Serbia: Demographic and Socio-Economic Impacts. Sustainability 2024, 16, 2620. [Google Scholar]
- Cvetković, V. , Nikolić, A., & Ivanov, A. The Role of Social Media in the Process of Informing the Public About Disaster Risks. Journal of Liberty and International Affairs 2023, 9, 104–119. [Google Scholar]
- Cvetković, V., Tanasić, J., Renner, R., Rokvić, V., & Beriša, H. (2024). Comprehensive Risk Analysis of Emergency Medical Response Systems in Serbian Healthcare: Assessing Systemic Vulnerabilities in Disaster Preparedness and Response. Paper presented at the Healthcare.
- Farahbod, K. , Shayo, C. , & Varzandeh, J. Cybersecurity indices and cybercrime annual loss and economic impacts. Journal of Business and Behavioral Sciences 2020, 32, 63–71. [Google Scholar]
- George, A. S. , Baskar, T. , & Srikaanth, P. B. Cyber threats to critical infrastructure: Assessing vulnerabilities across key sectors. Partners Universal International Innovation Journal 2024, 2, 51–75. [Google Scholar] [CrossRef]
- Goodell, J. , & Corbet, S. (2022). Commodity market exposure to energy-firm distress: Evidence from the Colonial Pipeline ransomware attack. Finance Research Letters. [CrossRef]
- Grace, J.; Impact of cybersecurity measures on financial data breaches. International Journal of Modern Risk Management 2023, 1. Available online: https://www.iprjb.org/journals/index.php/IJMRM/article/view/2097.
- Gulyas, O. , & Kiss, G. Impact of cyber-attacks on the financial institutions. Procedia Computer Science 2023, 219, 84–90. [Google Scholar]
- HISCOX Group. (2024). Cyber readiness report 2024: Protecting reputation through cyber resilience. Available online: https://www.hiscoxgroup.com/sites/group/files/documents/2024-10/HSX245–2024-CRR.pdf.
- Hromada, M. , & Lukas, L. Critical Infrastructure Protection and the Evaluation Process. Critical Infrastructure Protection and the Evaluation Process. International Journal of Disaster Recovery and Business Continuity 2012, 3. [Google Scholar]
- International Chamber of Commerce. (2024). Protecting the cybersecurity of critical infrastructure and their supply chains.
- International Monetary Fund. (2024). Global financial stability report: The last mile – Financial vulnerabilities and risks.
- Jimmy, F. Assessing the effects of cyber attacks on financial markets. Journal of Artificial Intelligence General Science 2024, 6, 288–305. [Google Scholar] [CrossRef]
- Jurišić, D. , & Marceta, Z. Collaborative Gaps: Investigating the Role of Civilian-Religious Authority Disconnection in Psychosocial Support Provision during the 2014 Floods. International Journal of Disaster Risk Management 2024, 6, 1–18. [Google Scholar]
- Kala, E. S. M. Critical role of cyber security in global economy. Open Journal of Safety Science and Technology 2023, 13, 231–248. [Google Scholar] [CrossRef]
- Koliou, M. , van de Lindt, J. W., Ellingwood, B., Dillard, M., Cutler, H., & McAllister, T. P. (2018). A critical appraisal of community resilience studies: Progress and challenges.
- Krivokapić, Đ. , Nikolić, A , Stefanović, A., & Milosavljević, M. Financial, accounting and tax implications of ransomware attack. Studia Iuridica Lublinensia 2023, 32, 191–211. Available online: https://ssrn.com/abstract=4562912.
- Kumiko, F. , & Shaw, R. Preparing International Joint Project: Use of Japanese Flood Hazard Map in Bangladesh. International Journal of Disaster Risk Management 2019, 1, 62–80. [Google Scholar]
- Künzler, F. (2023). Real cyber value at risk: An approach to estimate economic impacts of cyberattacks on businesses (Master’s thesis). University of Zurich.
- Kuzior, A. , Brożek, P , Kuzmenko, O., Yarovenko, H., & Vasilyeva, T. Countering cybercrime risks in financial institutions: Forecasting information trends. Journal of Risk and Financial Management 2022, 15, 613. [Google Scholar]
- Kuzior, A. , Tiutiunyk, I , Zielińska, A., & Kelemen, R. Cybersecurity and cybercrime: Current trends and threats. Journal of International Studies 2024, 17, 220–239. [Google Scholar] [CrossRef]
- Lee, I. Cybersecurity: Risk management framework and investment cost analysis. Business Horizons 2021, 64, 659–671. [Google Scholar] [CrossRef]
- Lis, P. , & Mendel, J Cyberattacks on critical infrastructure: An economic perspective. Economics and Business Review 2019, 19, 24–47. [Google Scholar] [CrossRef]
- Mijalković, S., & Cvetković, V. (2013). Vulnerability of critical infrastructure by natural disasters. Paper presented at the National critical infrastructure protection, regional perspective.
- Mokhele, M. O. Centres or Units: Making Sense of Decentralisation of Disaster Management in South African Municipalities. International Journal of Disaster Risk Management 2024, 6, 19–38. [Google Scholar] [CrossRef]
- Molina, R. M. A. , Torabi, S., Sarieddine, K., Bou-Harb, E., Bouguila, N., & Assi, C. On Ransomware Family Attribution Using Pre-Attack Paranoia Activities. IEEE Transactions on Network and Service Management 2022, 19, 19–36. [Google Scholar] [CrossRef]
- Molnár, A. A Systematic Collaboration of Volunteer and Professional Fire Units in Hungary. International Journal of Disaster Risk Management 2024, 6, 1–13. [Google Scholar] [CrossRef]
- Mott, G. , Turner, S., Nurse, J., Pattnaik, N., MacColl, J., Huesch, P., & Sullivan, J. ’There was a bit of PTSD every time I walked through the office door’: Ransomware harms and the factors that influence the victim organization’s experience. J. Cybersecur. 2024, 10. [Google Scholar] [CrossRef]
- Moussaileb, R. , Cuppens-Boulahia, N., Lanet, J.-L., & Bouder, H. L. A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms. ACM Computing Surveys (CSUR) 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Muniandy, M. , Ismail, N., Al-Nahari, A., & Yao, D. N. Evolution and impact of ransomware: Patterns, prevention, and recommendations for organizational resilience. International Journal of Academic Research in Business and Social Sciences 2024, 14. [CrossRef]
- Nagar, G. (2024). The Evolution of Ransomware: Tactics, Techniques, and Mitigation Strategies. International Journal of Scientific Research and Management (IJSRM). [CrossRef]
- Pattnaik, N. , Nurse, J., Turner, S., Mott, G., MacColl, J., Huesch, P., & Sullivan, J. It’s more than just money: The real-world harms from ransomware attacks. ArXiv, abs/2307.02855. [CrossRef]
- Perić, J. , & Vladimir, C. M. Demographic, socio-economic and phycological perspective of risk perception from disasters caused by floods: case study Belgrade. International Journal of Disaster Risk Management 2019, 1, 31–43. [Google Scholar]
- Putnik, N. (2022). Sajber rat i sajber mir. Beograd: Akademska misao.
- Putnik, N. , Milošević, M , & Cvetković, V. Rensomver kao pretnja bezbednosti – društveni i krivičnopravni aspekti. Sociološki pregled 2022, 56, 328–353. [Google Scholar]
- Rahman, A. M. , & Islam, S Financial and social costs perspective impacts of cybercrime in the UAE: Policy-guidance addressing the problem in piecemeal approach. International Journal of Economics, Business and Management Studies 2022, 9, 89–103. [Google Scholar] [CrossRef]
- Rebouh, N. , Tout, F., Dinar, H., Benzid, Y., & Zouak, Z. Integrating Multi-Source Geospatial Data and AHP for Flood Susceptibility Mapping in Ain Smara, Constantine, Algeria. International Journal of Disaster Risk Management 2024, 6, 245–264. [Google Scholar]
- Reshmi, T. Information security breaches due to ransomware attacks - a systematic literature review. Int. J. Inf. Manag. Data Insights 2021, 1, 100013. [Google Scholar] [CrossRef]
- Robles-Carrillo, M. , & García-Teodoro, P. (2022). Ransomware: An Interdisciplinary Technical and Legal Approach. Security and Communication Networks. [CrossRef]
- Schwarz, M. , Marx, M., & Federrath, H. (2021). A structured analysis of information security incidents in the maritime sector. arXiv:2112.06545.
- Seng, Y. J. , Cen, T. Y., bin Mohd Raslan, M. A. H., Subramaniam, M. R., Xin, L. Y., Kin, S. J., Long, M. S., & Sindiramutty, S. R. (2024). In-depth analysis and countermeasures for ransomware attacks: Case studies and recommendations. Preprints. [CrossRef]
- Singh, H. , & Sittig, D. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks. Applied Clinical Informatics 2016, 7, 624–632. [Google Scholar] [CrossRef]
- Sudheer, S. (2024). Ransomware Attacks and Their Evolving Strategies: A Systematic Review of Recent Incidents. Journal of Technology and Systems. [CrossRef]
- Sviatun, O. V., Goncharuk, O. V., Roman, C., Kuzmenko, O., & Kozych, I. V. Combating cybercrime: Economic and legal aspects. WSEAS Transactions on Business and Economics 2021, 18, 751–762.
- Tariq, N. Impact of cyberattacks on financial institutions. Journal of Internet Banking and Commerce 2018, 23, 1–11. [Google Scholar]
- Tarter, A. (2017). Importance of cyber security. In Community policing – A European perspective: Strategies, best practices and guidelines (pp. 213–230).
- Thakur, M. Cyber security threats and countermeasures in digital age. Journal of Applied Science and Education 2024, 4, 1–20. [Google Scholar]
- ThankGod, J. (2024). Cyber heists and trade turmoil: Uncovering the economic impact of cybersecurity breaches on global commerce. [CrossRef]
- The Financial Action Task Force. (2023). Countering ransomware financing. FATF. Available online: http://www.fatf-gafi.org.
- Umer, S. S. Analysing in Post COVID-19 era: The Effect of Occupational Stress and Work-Life Balance on Employees Performance. International Journal of Disaster Risk Management 2024, 6, 75–90. [Google Scholar]
- Valackienė, A. , & Odejayi, R O. The impact of cyber security management on the digital economy: Multiple case study analysis. I. ntellectual Economics 2024, 18, 261–283. [Google Scholar] [CrossRef]
- Vibhas, S. , Bismark, A. G., Ruiyi, Z., Anwaar, M. A., & Rajib, S. Understanding the barriers restraining effective operation of flood early warning systems. 1, 2019. [Google Scholar]
- Vidović, N. , Cvetković, V. M., & Beriša, H. Optimising Disaster Resilience Through Advanced Risk Management and Financial Analysis of Critical Infra-structure in the Serbian Defence Industry. International Journal of Disaster Risk Management 2024, 6, 183–200. [Google Scholar]
- Wang, P. , & Johnson, C Cybersecurity incident handling: A case study of the Equifax data breach. Issues in Information Systems 2018, 19, 66–72. [Google Scholar]
- Wang, P. , D’Cruze, H. , & Wood, D. Economic costs and impacts of business data breaches. Issues in Information Systems 2019, 20, 94–100. [Google Scholar]
- Wedawatta, G. Resilience and adaptation of small and medium-sized enterprises to flood risk. Disaster Prevention and Management: An International Journal 2012, 21, 474–488. [Google Scholar] [CrossRef]
- Wilner, A. , Jeffery, A., Lalor, J., Matthews, K., Robinson, K., Rosolska, A., & Yorgoro, C. On the social science of ransomware: Technology, security, and society. Comparative Strategy 2019, 38, 347–370. [Google Scholar] [CrossRef]
- Wollerton, M. (2023). Ransomware Attacks. [CrossRef]
- World Economic Forum. (2024). Global cybersecurity outlook 2024: Insight report. Available online: https://www3.weforum.org.
- World Economic Forum. (2025). Global cybersecurity outlook 2025: Insight report. Available online: https://reports.weforum.org.
- Yuste, J. , & Pastrana, S. (2021). Avaddon ransomware: an in-depth analysis and decryption of infected systems. ArXiv, abs/2102.04796. [CrossRef]
- Zimba, A. , & Chishimba, M. On the Economic Impact of Crypto-ransomware Attacks: The State of the Art on Enterprise Systems. European Journal for Security Research 2019, 4, 3–31. [Google Scholar] [CrossRef]
| No. | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | |
|---|---|---|---|---|---|---|---|---|---|
| Case study | Cryptolocker (2015) | SamSam Ransomware (2016-2018) |
Locky Ransomware (2016-2018) |
Malicious program code "NotPetya" (2017) |
Ransomware attack „WannaCry“ (2017) | Ryuk Ransomware (2018–present) | DoppelPaymer Ransomware (2019-present) | Company "Enel Group" (2020) |
|
| Financial damage, expences and costs | Direct | $18 million | $6 million | $1 billion | $10 billion | $4 billion | $150 million | $43,27 million | $14 million |
| Indirect | Costs for remediation of damage to computer systems and restoration of operational processes, loss of production, loss of reputation | $30 million | Costs caused by the loss of important data, significant disruptions in the functioning of organisations. Loss of productivity where business entities were forced to invest large amounts in the recovery of the system, which led to exponential growth in operating expenses | Losses due to production disruptions, delivery delays, and additional costs for recovery and investments in cybersecurity | Millions of dollars in losses due to impact on key services and organisations | Loss of data, downtime, loss of reputation | Loss of data, reputational damage, disrupted operation of organisations | $84.02 million (data recovery expenses, legal fees, and disclosure fees - company GDPR compliance penalties) | |
| No. | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | |
| Case study | Company "Garmin" (2020) | Company „Kaseya Inc.“ (2021) | Company „Colonial Pipeline“ (2021) | Republic of Costa Rica (2022) | Data Transfer Software "MOVEit" (2023) | University and Research Institute "Technion" (2023) |
Company „Change Healthcare Inc.“ (2024) |
Company "Southern Water" (2025) |
|
| Financial damage, expences and costs | Direct | $10 million | $70 million | $4,4 million | $1.66 billion (2.4% of the country’s GDP) | $10 billion | $1.87 million (80 bitcoin - BTC) | $22 million | $5,7 million |
| Indirect | $15.2 million in damages and further costs of service interruptions, loss of revenue from disabled apps and services, legal costs, class action lawsuit | Loss of revenue due to service interruptions, legal costs and capital expenditures for system restoration | Estimated losses of over $420 million per day.Costs due to downtime in operations: loss of revenue, breach of contractual obligations, increased operating costs due to system restoration and crisis management. | Increased costs for repairs and restoration of the system. Negative impact on import/export logistics. | Multiplier factor of ongoing costs (operating costs due to business downtime, legal costs and damages to affected users) | Postponement of exams, blocking networks, temporary loss of access to data, blocking of the website. Loss of reputation and trust in academic institutions. | $8.87 billion ($2.87 billion - response costs and $6 billion - assistance to health care providers, as well as litigation costs) | Costs for system recovery, loss of confidence in security, increased costs on technological improvements | |
| No. | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | |
|---|---|---|---|---|---|---|---|---|---|
| Case study | Cryptolocker (2015) | SamSam Ransomware (2016-2018) |
Locky Ransomware (2016-2018) |
Malicious program code "NotPetya" (2017) |
Ransomware attack „WannaCry“ (2017) | Ryuk Ransomware (2018–present) | DoppelPaymer Ransomware (2019-present) | Company "Enel Group" (2020) |
|
| Consequences | Economic | Huge drop in production, interruption in operations, long-term consequences on business productivity | Significant disruptions in work processes, increased recovery costs, loss of efficiency | Increased recovery costs, loss of trust in IT security, large technological investments for recovery | Big losses in global companies such as Maersk, FedEx, Merck and others. Disruption in the transport and logistics sector. Increase in the price of goods that did not arrive on time. | The enormous damage to large corporations, especially in industries such as healthcare and logistics, has an economic impact on a global scale. | Major business interruptions, disruption of public services (especially in health care and municipalities) | Significant recovery costs, loss of trust in IT security, high costs of legal and security services | Huge financial costs on restoring the system and recovering from attacks |
| Social | Loss of personal data, stress for individuals, erosion of trust in data security | Deterioration of public confidence in the safety of infrastructure, stress for citizens | Erosion of user and patient trust, stress for employees, data privacy risks | Increased distrust in public and private financial institutions, a decrease in spending, and an impact on confidence in the health sector as vaccine production was interrupted. | Disruptions to public services, especially in health care facilities, cancellations of 19,000 medical appointments, loss of life in some cases, negative impact on the business of NHS, FedEx, Telefónica, and others | Deterioration of public trust in data and infrastructure security, stress for workers and citizens | Potential loss of life (in the case of the Düsseldorf hospital), violation of public trust, stress for employees | Potential loss of customer trust, impact on reputation and data security | |
| No. | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | |
| Case study | Company "Garmin" (2020) | Company „Kaseya Inc.“ (2021) | Company „Colonial Pipeline“ (2021) | Republic of Costa Rica (2022) | Data Transfer Software "MOVEit" (2023) | University and Research Institute "Technion" (2023) |
Company „Change Healthcare Inc.“ (2024) |
Company "Southern Water" (2025) |
|
| Consequences | Economic | Increased risk of future attacks, reputational damage, system restoration costs, and legal costs | Disruption of many companies, increased renewal costs, legal processes, decline in trust in the IT sector | Fuel outages were reported across the U.S. Southeast, especially in states such as Georgia, North Carolina, and Virginia. People panicked and bought fuel, which led to shortages at supply stations. | Disruptions in fiscal and tax systems, non-payment of salaries to employees, paralysis of public services. | Global revenue losses for affected firms and organisations, loss of competition in specific sectors | Disruptions to the work of the university, postponement of important academic activities, such as exams, affecting students and the academic calendar. Potential risk to research and sensitive data in the field of cybersecurity. | Severe disruptions in the processing of medical claims and payments, significant disruptions in the healthcare industry | Loss of data, interruption in water supply, damage to reputation |
| Social | Loss of customer trust, possible negative impact on corporate reputation and future sales | Difficulties for small and large companies, reducing trust in the security of digital platforms | Gas stations have been closed, fuel prices have risen, and transportation has been disrupted, including air travel. Citizens and public services have felt the effects of fuel shortages. Social tensions due to shortages. | There is a growing concern among citizens about disrupted government services and an increased fear of compromised sensitive data. The impact on the public sector and the living standards of citizens who depend on state services, as well as the increased burden on public services. | 65 million users harmed, privacy violations, personal and corporate data compromised | Loss of confidence in the security of academic institutions, disruptions in student activities. Public pressure on the university and the government to respond to the attacks. | Data exposure of 190 million people, massive legal proceedings, patient trust significantly damaged | Potential disruption of services for citizens, increased stress for employees | |
| No. | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
|---|---|---|---|---|---|---|---|---|
| Case study | Cryptolocker (2015) | SamSam Ransomware (2016-2018) |
Locky Ransomware (2016-2018) |
Malicious program code "NotPetya" (2017) |
Ransomware attack „WannaCry“ (2017) | Ryuk Ransomware (2018–present) | DoppelPaymer Ransomware (2019-present) | Company "Enel Group" (2020) |
| Vector methodology of cyber attack and incident | Phishing emails, malicious attachments, data encryption, and ransom demand | Manual delivery, attacks on JBoss servers, abuse of RDP and VPN vulnerabilities, privilege escalation, subsequent data encryption | Phishing attacks use malicious Word documents to trigger macros, leading to ransomware downloads. Once activated, Locky encrypts a large number of different types of data, including data on network parts. It used a combination of RSA and AES encryption, which made the data inaccessible without a decryption key that could only be obtained after paying the ransom. | An attack through compromised Legitimate Software Updates (M.E.Doc). The malware spread like a worm, disguised as ransomware, but the goal was to cause destruction, not extort money. | The attack exploited a security vulnerability in Microsoft Windows operating systems (EternalBlue exploit) | An attack that begins with a compromise of a network (usually a TrickBot), delivered manually, with network mapping and data exfiltration before launching an attack. | Sfir -phishing attacks, exploitation of out-of-date vulnerabilities, network mapping, privilege escalation, fast encryption of offline data | Attack via Netwalker and Snake ransomware, encrypting data within the company |
| No. | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| Case study | Company "Garmin" (2020) | Company „Kaseya Inc.“ (2021) | Company „Colonial Pipeline“ (2021) | Republic of Costa Rica (2022) | Data Transfer Software "MOVEit" (2023) | University and Research Institute "Technion" (2023) |
Company „Change Healthcare Inc.“ (2024) |
Company "Southern Water" (2025) |
| Vector methodology of cyber attack and incident | The attack used WastedLocker, which was developed by the notorious group Evil Corp. Systems were encrypted, and services such as Garmin Connect, flyGarmin, Strava, and inReach were disabled. The attackers demanded $10 million to decrypt the data. | The attack was carried out through Kaseya V.S.A. software, which allowed malware to be inserted, encrypting data on more than 1,000 systems. The attackers demanded a ransom of $70 million in Bitcoin. | The attackers, who were members of the hacker group Darkside, gained access through an employee’s VPN account and applied data encryption software. | The attackers used ransomware to coordinate attacks on multiple government agencies (Ministry of Finance, Ministry of Education, Social Security Fund). | Ransomware group "Clop" exploited a zero vulnerability in "MOVEit" software | The attackers used the software DarkBit, which targets Windows operating systems. They added the "Darkbit" to the "AES-256" encryption to encrypt data. | Citrix portal without multi-factor authentication, data exfiltration, file encryption | Attack through Black Basta ransomware, use of phishing attacks or vulnerabilities in the network |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).