Anastasiya Novikava
Copywriter
Anastasiya believes cybersecurity should be easy to understand. She is particularly interested in studying nation-state cyber-attacks. Outside of work, she enjoys history, 1930s screwball comedies, and Eurodance music.
Summary: Ransomware and cyber warfare surged in 2024. Learn which industries were targeted and how to protect your business moving forward.
Each year, experts say it was the worst year for the cybersecurity industry and that it won’t get better next time. It’s true again for 2024.
One reason for this is the National Public Data breach— the second largest in history. It stole 2.9 billion records from people in the US, UK, and Canada. These records included full names, addresses, Social Security numbers, dates of birth, and phone numbers.
Another reason is the massive attack on Change Healthcare, the biggest healthcare data breach to date.
Finally, global cyber-attacks are now often called cyber warfare. Officials are even discussing whether it’s time for the US to create a Cyber Force.
Even though there were no foreign cyber influences in the US elections this year that significantly affected the results, 2024 was still a tough year. It caused major damage to key sectors. Let’s take a closer look at the details.
In this article, we’ll discuss in more detail the most targeted industries of 2024, the top cyber incidents, and key cybersecurity actions for 2025.
Some industries face more cyber-attacks because of the valuable data they hold. In 2024, healthcare and telecommunications stood out as prime targets for cyber threats.
Healthcare organizations are prime targets because of sensitive data like patient records. According to Rebecca Wright, a cybersecurity professor at Barnard College, hospitals are particularly vulnerable to ransomware because they are hard to secure and rely on a mix of systems and third-party vendors.
What’s most concerning is that attackers often don’t aim to steal data. Instead, they aim to disrupt services to force hospitals to pay ransoms.
Here’s why healthcare stood out as a target in 2024:
The telecommunications industry was a prime target in 2024. Known as Salt Typhoon, the Chinese hacking campaign targeted telecom networks for espionage.
In February 2024, CISA issued a warning. It stated that China-backed cybercriminals were setting up for potential cyber-attacks against U.S. critical infrastructure during a crisis or conflict.
Later in 2024, Chinese attackers infiltrated networks of major companies like Verizon, AT&T, and T-Mobile. These attacks targeted national security data.
In the case of T-Mobile, bad actors linked to Chinese intelligence accessed U.S. and international telecom networks. They aimed to spy on the phone communications of high-value intelligence targets'.
The attackers retrieved audio files of calls and text content from some victims. Many victims work in government or politics.
Despite months of investigation, as of December 2024, the full scale of the attack is still unknown. Authorities are unsure of how many victims were affected or if criminals still have access. In December 2024, U.S. federal authorities urged telecom companies to improve security.
We already talked about some big data breaches, but let’s list some more.
In March 2024, a ransomware attack hit Change Healthcare, a UnitedHealth Group subsidiary. Change Healthcare supports over 100 essential healthcare functions, including claims processing and prescription management.
The attack disrupted critical healthcare services nationwide, making it the most impactful cyber-attack in U.S. healthcare history.
Ascension, one of the largest U.S. health systems, operates about 140 hospitals in 19 states. In May 2024, Ascension Hospitals suffered a major cyberattack. For over two weeks, staff had to use manual methods because their computer systems were down.
This attack was similar to the one on Change Healthcare, which disrupted the nation’s largest healthcare payment system. Ascension, like Change, was hit by ransomware.
The attack seems to have been carried out by a group called Black Basta, possibly linked to Russian-speaking cybercriminals.
The data breach happened after an employee accidentally downloaded a malicious file. Ascension called it an “honest mistake” as the file seemed legitimate.
In June 2024, a ransomware cyber-attack hit Synnovis, an organization that handles blood transfusions in London. According to Ciaran Martin, a former head of British cybersecurity, a Russian cybercriminal group, Qilin, was likely behind the attack.
The attack led to the rescheduling of over 800 operations and 700 outpatient appointments, including 97 cancer treatments. Hospitals had to delay blood transfusions and reroute patients.
“It’s not surprising that it happened, it’s not surprising it was being reported as a Russian group, and it’s not surprising it’s healthcare related,” said Joe Devanny, a lecturer at King’s College London who focuses on the cybersecurity industry.
In 2024, China-linked hacking group Salt Typhoon attacked major U.S. telecom companies. The group targeted Verizon, AT&T, T-Mobile, and others. Authorities are investigating the data breaches, which may have impacted national security.
In 2024, cyber attacks targeted U.S. elections. Foreign actors, including Iran, attempted to breach campaigns. Georgia's absentee ballot website was attacked but defended successfully.
In July 2024, a flawed CrowdStrike update triggered a worldwide IT meltdown. This issue affected airports, banks, stock exchanges, and other businesses. The error stemmed from a small file in an update.
In May 2024, Ticketmaster experienced a breach, compromising the data of 560 million customers. Emails were sent to customers in North America, warning them about potential identity theft and fraud. The company has not explained the delay in notifying victims.
As we saw, in 2024, cyber threats and cyber-attacks surged. To improve data security and protect sensitive information, organizations must improve their cybersecurity posture in 2025. Here are essential actions to take:
More than 99.9% of compromised accounts don't have MFA. MFA is essential because it cuts the risk of compromise by 99.22% overall and by 98.56% with leaked credentials.
Phishing attacks remain one of the major cybersecurity risks. Employees must know how to recognize and report them.
Zero Trust limits access to sensitive data, reducing the attack surface.
Password managers store complex, unique passwords securely, simplifying management.
Remote devices are vulnerable to cybersecurity threats. Use a VPN to encrypt data and secure connections.
DLP tools protect sensitive data and prevent leaks or theft.
Encryption ensures data is unreadable to unauthorized users, protecting it from theft.
NordLayer and NordStellar work together to protect against cybersecurity threats.
Backups ensure you can recover from cyber incidents, such as ransomware attacks.
Risk assessments help identify cyber threats and improve risk management strategies.
2024 was a rough year for cybersecurity. We saw more attacks, more data breaches, and bigger losses. The trends from 2024 show that the cyber threat landscape is getting worse. As we move into 2025, these threats will only grow. Here are some of the key cybersecurity trends that will matter in the coming year.
Ransomware attacks increased sharply in 2024. Cybercriminals used more sophisticated tactics to target businesses. They are now focusing on weaker links in the supply chain, like vendors and third-party contractors. This makes it harder for companies to protect themselves. In 2025, this trend will continue, and businesses will need stronger cybersecurity, especially when it comes to third-party access.
In 2024, we saw state-sponsored cyber-attacks on a scale we’ve never seen before. Cyber-attacks from state actors have surged, with government-backed hackers targeting critical infrastructure and sensitive data.
The US and other countries are also facing rising threats from China. These attacks are not just about espionage anymore. Hackers are now using more disruptive tactics, like "living off the land" methods, where they silently infiltrate systems and wait for the right moment to strike. This will be a major issue in 2025 as nation-state actors continue to target critical sectors.
Quantum computing has been a hot topic for years, but 2024 marked a turning point. Governments and businesses are starting to realize that current encryption methods may not hold up against the power of quantum computers.
With the rise of quantum technology, it’s only a matter of time before today’s encryption methods are cracked. In 2024, companies began preparing by integrating new cryptographic algorithms designed to protect against quantum hacks. This will become crucial in 2025 as more businesses transition to quantum-resistant encryption methods.
2024 also saw cybercriminals become more creative with their attack methods. Phishing, social engineering, and malware attacks have all gotten more advanced. Attackers are using a mix of tactics, including AI, to exploit vulnerabilities. They’re targeting employees and systems that are not properly protected.
As a result, it’s harder for companies to spot these threats before they cause damage. In 2025, businesses will need to adopt smarter defenses that use machine learning and AI to detect these complex attacks before it’s too late.
NordLayer helps businesses stay protected with a comprehensive suite of security features. The Business VPN ensures secure, encrypted connections for remote teams. It supports multiple VPN protocols, including NordLynx, OpenVPN TCP, and OpenVPN UDP.
AES-256 and ChaCha20 encryption keep all traffic secure. This protects data in transit, no matter where employees are working.
Zero Trust Network Access (ZTNA) solutions ensure that only authorized users and devices can access network resources. MFA adds extra protection during login. Device Posture Security checks devices for compliance before granting network access. Cloud Firewall helps organizations implement their network segmentation strategy and control what resources users can access.
NordLayer integrates with identity providers like Okta, OneLogin, and Google for easy SSO and user provisioning. These integrations make user management simple and secure.
Pricing starts at $7 per user per month, making NordLayer affordable. It provides businesses with security, flexibility, and control over their network.
Subscribe to our blog updates for in-depth perspectives on cybersecurity.