The scope of ransomware attacks on healthcare institutions in the United States has grown dramatically, with nearly 400 healthcare facilities affected in the past 12 months, according to Microsoft’s latest Digital Defense Report. Released on Tuesday, the report revealed that 389 healthcare institutions experienced successful ransomware attacks between July 2023 and June 2024, disrupting critical operations and putting patient care at risk.
Ransomware’s Devastating Impact on Healthcare
The consequences of these attacks have been severe. The ransomware incidents led to network shutdowns, critical medical systems being taken offline, delays in life-saving medical operations, and the rescheduling of thousands of patient appointments. The healthcare sector, already strained by ongoing challenges, has become an attractive target for cybercriminals due to the critical nature of its services and the often-sensitive data it holds. Hospitals and healthcare providers, which operate with high-stakes timelines, have been disproportionately affected, leaving patients and providers vulnerable.
Microsoft’s 114-page report analyzed a range of cyber trends based on vast intelligence data collected from its customers worldwide. The report highlighted a 2.75x increase in human-operated ransomware attacks — sophisticated attacks involving direct human intervention to compromise networks. These ransomware-linked encounters were seen across sectors, but the healthcare industry was among the most heavily impacted.
Collaboration Between Nation-States and Cybercriminals
One of the report’s more troubling findings was the increasing collaboration between nation-state actors and cybercriminal groups. The report noted that countries like Russia, North Korea, and Iran have turned to ransomware as a financial tool in their broader offensive cyber operations. Unlike earlier ransomware campaigns that were mainly destructive in nature, these newer attacks are designed to extort money while still crippling systems. This strategic shift has allowed hostile nations to profit from ransomware while causing widespread disruption to critical infrastructure.
A Mixed Picture for Ransomware Trends
Despite the increase in ransomware attacks, Microsoft’s report did provide some positive news: the percentage of attacks that reached the encryption stage — when files are locked, and a ransom is demanded — has decreased over the past two years. This suggests that more organizations are successfully identifying and stopping ransomware attempts before they can fully execute. However, for cases where encryption did occur, attackers were often able to exploit unmanaged devices within the network, either as an entry point or to remotely encrypt critical systems. This highlights the persistent risk posed by Internet of Things (IoT) devices and other non-approved technologies brought into workplaces by employees without the knowledge or approval of IT departments.
Prevalent Attack Methods: Phishing and Exploiting Vulnerabilities
Tom Burt, Microsoft’s corporate vice president of customer security and trust, emphasized that social engineering remains the most common technique used by attackers to gain initial access to healthcare and other networks. This includes phishing via email, SMS (smishing), and voice (vishing), as well as identity compromise and exploiting vulnerabilities in outdated or unpatched systems. These methods allow attackers to bypass defenses and infiltrate systems, leading to devastating consequences for organizations caught off-guard.
Case Study: The Church of Sweden and BlackCat Ransomware
Microsoft highlighted the case of the Church of Sweden, which was attacked by the now-defunct BlackCat ransomware gang in November 2023. The attack crippled the church’s ability to conduct important services, including funerals, and severely impacted its fundraising efforts during the critical Christmas season. It took the church nearly two months to recover from the incident. After refusing to pay the ransom, the church’s stolen data was sold to the LockBit ransomware group, which published the data online, further compounding the damage.
This case serves as a stark reminder of the broad-reaching consequences of ransomware attacks, not only affecting businesses and healthcare institutions but also deeply impacting non-profit and religious organizations.
Ransomware Groups: Akira, LockBit, and Others Leading the Charge
Microsoft’s analysis also provided insight into the top ransomware groups operating today. Akira was responsible for 17% of all ransomware incidents tracked by the company, while LockBit accounted for 15%. Other prominent groups include Play, BlackCat, and Basta, which together represent a significant portion of ransomware attacks globally. These groups often operate as Ransomware-as-a-Service (RaaS) operations, allowing other cybercriminals to “rent” their malware for a share of the profits, thereby increasing the scale and frequency of attacks.
Law Enforcement and Microsoft’s Efforts in Combating Ransomware
Despite the growing threat, there has been progress in disrupting the infrastructure used by ransomware groups. Microsoft reported that law enforcement agencies have successfully taken down parts of the LockBit and BlackCat operations over the past year, disrupting their ability to launch new attacks. In parallel, Microsoft continues to bolster its information-sharing efforts with global partners to combat these threats more effectively.
One of the most notable tools in this fight is Microsoft’s Crystal Ball platform. Developed in collaboration with the Israel National Cyber Directorate and the Cyber Security Council of the United Arab Emirates, this collaborative platform is part of the International Counter Ransomware Initiative (CRI). The platform provides its member countries with threat intelligence, attribution guides, deterrence strategies, and resources for greater international cooperation. Microsoft aims to onboard all CRI members by the end of the year, further strengthening global efforts to combat ransomware.

Looking Ahead: Strengthening Defenses and Preparing for the Future
The rise in ransomware attacks underscores the need for organizations to bolster their defenses and implement comprehensive cybersecurity measures. As the healthcare sector and other critical industries remain prime targets for cybercriminals, it is imperative for businesses to invest in secure infrastructure, continuous employee training on cybersecurity practices, and rapid incident response capabilities.
Microsoft’s report serves as a wake-up call that ransomware is not just a threat to data, but to lives, particularly in sectors like healthcare. With continued global coordination and advancements in security technology, there is hope that future ransomware attacks can be minimized and the damage they cause can be mitigated.

