Each dot represents the location of a ransomware attack, with the color of the dot indicating the sector affected (healthcare, education, government, and business).

This map updates daily and pinpoints the locations of each ransomware attack in the world, from 2018 to the present day. Where available, it includes the ransom amount, whether or not the ransom was paid, the entity, sector, and industry that was targeted, and the strain of ransomware used. Our researchers search through country reports, industry news, and cybersecurity databases to find the latest ransomware attacks on worldwide businesses, healthcare organizations, educational institutions, and government agencies.

 

View our in-depth map of US ransomware attacks (updated daily) here.

2022 key findings

According to the publicly-reported ransomware attacks collated by Comparitech researchers, 2022 saw:

  • 769 attacks–nearly half the number recorded in 2021 (1,365)
  • An average ransom demand of $7.1 million–just over $1m less than the average demand in 2021 ($8.2 million)
  • 114,474,363 records impacted–more than double the number impacted in 2021 (49.8 million)
  • An average of 587,048 records were impacted per attack–nearly five times 2021’s average of 119,114

When broken down by industry:

Business

  • 410 attacks
  • An average ransom demand of $7.8 million
  • 103,484,706 records impacted
  • An average of 899,867 records impacted per attack

Education

  • 100 attacks
  • An average ransom demand of $1.3 million
  • 686,219 records impacted
  • An average of 45,748 records impacted per attack

Government

  • 148 attacks
  • An average ransom demand of $10.2 million
  • 472,597 records impacted
  • An average of 39,383 records impacted per attack

Healthcare

  • 111 attacks
  • An average ransom demand of $3.6 million
  • 9,830,841 records impacted
  • An average of 185,488 records impacted per attack

Methodology

Our researchers have searched through country cybersecurity reports, high-authority news articles, and extensive cybersecurity databases to collate this list of ransomware attacks. Where possible, we have only included attacks that have been confirmed by relevant authorities or companies. This is the same for ransoms that have or have not been paid. Some may assume an entity has paid a ransom after data disappears from a hacker’s website, however, we do not make this assumption.

For a full list of attacks and sources, please request access here.

Data researchers: George Moody, Rebecca Moody