Red Sentry Spotlight: Ransomware on the Rise Last Month

Red Sentry Spotlight: Ransomware on the Rise Last Month
Nov 3, 2025
Valentina Flores
CEO
September’s cyberattacks spanned across every industry. More important than the number of breaches is the method of attack. Ransomware is becoming increasingly prevalent, and this trend shows no sign of slowing.
Here are some of the ransomware attacks in September 2021 alone:
Ransomware hits K-Electric, Pakistan’s largest private power utility
NorthShore University HealthSystem notifying patients affected by ransomware
Spain’s SegurCaixa Adeslas moves to contingency plan after ransomware attack
Enloe Medical Center alerting patients after ransomware incident
Fairfax County Public Schools in Virginia confirms cyber attack
Artech Information Systems says data breached in ransomware attack
Development Bank of Seychelles learns of ransomware incident
Netherlands-based Veiligheidsregio Noord- en Oost-Gelderland hit by ransomware
Ransomware threat actors claim theft of University Hospital New Jersey files
New Jersey School District suspends classes during ransomware attack
NJ-based Millstone Township School District hit by ransomware
Systems of GA-based Jekyll Island Authority infiltrated with ransomware
NY’s Floral Park-Bellerose School District hit with ransomware attack
The College of Nurses of Ontario investigating suspected ransomware attack
NC’s Guilford Technical Community College hit with ransomware
Non-profit Anglicare Sydney held to ransom after cyber attack
Leading U.S. laser developer IPG Photonics hit with ransomware
Tyler Technologies appears to have been hit by RansomExx ransomware
Ransomware threat actors dump data on Clark County School District employees and students
International insurance brokerage firm Arthur J. Gallagher & Co confirms ransomware attack
Hackers hit South African government fund for children and missing people
The Medisys Health Group and its affiliate Copeman Healthcare pay ransom
“What is Ransomware?”
Ransomware is malware that gains access to a victim’s information and then uses encryption to hold it for a specified amount of money. Until the ransom is met (and maybe not even then), the encryption blocks access to files, databases, applications, etc. Ransomware can spread through an entire network and quickly paralyze a company.
Believe it or not, ransomware doesn’t even require a cyber mastermind anymore. Ransomware-as-a-Service (RaaS) now exists, which allows non-technical criminals to buy the malware straight from a developer, for a percent of the cut (which can be millions).
“It won’t happen to us”
One reason some companies don’t implement proactive cybersecurity is their (incorrect) assumption that their business wouldn’t be a good target.
Myth: Malicious hackers only target high-value companies or those in the spotlight. My business wouldn’t be on their radar.
Fact: Cyber criminals choose targets for a lot of different reasons, and annual budget is only one of them.
Criminals may target a wealthy company because they assume it can pay a ransom, but they can just as easily go after a smaller company or a startup, assuming it’s an easy target because funds are not prioritized toward cybersecurity.
Enterprise, SMB, startup...healthcare, education, law firm…private, public, government…everyone (including you) can be a target.
“Should we just pay the ransom?”
At the end of the day, decision makers must do what they believe is best for their organization. However, the FBI generally advises against paying these ransoms, and I agree fully. Here are some important things to consider:
Corrupted Data (if any data)
First of all, paying a ransom doesn’t guarantee the return of your data. There is an encryption key that a malicious hacker theoretically should give a company after the ransom is paid, but there is nothing to guarantee that happens. In fact, they may even leak the data to the public after payment, just because they can.
More prevalently, even if you get the data back, some or all of it may be corrupted. Nearly half of victims who pay the ransom receive corrupted data back.
Financial Considerations
The ransom itself can cost millions of dollars. In 2020, nearly $350 million in cryptocurrency was paid by victims.
You can also incur civil penalties from the government for paying. The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) published an advisory in 2020 explaining that malicious cyber criminals, which include ransomware attackers, are a part of its cyber-related sanctions program. This gives OFAC the authority to impose penalties on U.S. persons who provide material assistance or support to these individuals (which can include a ransom).
Mixed Signals
Paying a cyber ransom may seem like the only choice sometimes, but this can signal a couple of things to criminals. First, it shows them that ransomware works, so this incentivizes more attacks. In addition, it specifically shows them that YOUR organization is a good target, because you pay. In fact, it is estimated that about 80% of companies who pay cyber ransoms become victims a second time.
Red Sentry Solution
We could talk about appropriate ransomware responses for days, but a much better solution is not letting a malicious hacker into your system in the first place.
My company, Red Sentry, provides an automated, continuous pentesting platform that helps you monitor your cyber environment 365 days a year. This is just one example of a technology that can elevate your security to the next level.
Conclusion
Ransomware is not going anywhere anytime soon, so businesses must harden the target on themselves as much as possible. Put effective tools in place, shore up your systems, and stay proactive. We can’t always beat malicious hackers at their own game, but we can keep them from entering the stadium.
Learn more about SOC2 compliance.