


Within four days, the company had begun to restore its services and used a decryption key to lift the restrictions, which led BleepingComputer to conclude that Garmin paid the ransom due to the lack of known weaknesses used in the code. Once hackers encrypted the files, they demanded a ransom payment of $10 million to restore access to the data. The company first detected the attack when employees began to share photos of encrypted workstations. On July 23rd, cyber criminals targeted Garmin with a ransomware attack that encrypted the company’s internal systems and shut down critical services like Garmin Connect, flyGarmin, Strava, and inReach. The Garmin Security Breach: Here’s What Happened This article will examine what happened during the Garmin Security Breach and how cyber security leaders can defend against ransomware attacks. With attackers developing more sophisticated ransomware strains, enterprises need to know how to confront the next generation of cyber threats. Safety Detectives estimates that the average digital payoff per ransomware incident will reach $8,100 during 2020. Since the 2017 WannaCry ransomware outbreak, ransomware has remained a persistent threat to enterprises. The Garmin Security Breach is now one of many high-profile ransomware attacks targeting large organizations. Earlier this year, the GPS and fitness wearables giant Garmin fell victim to a ransomware attack that encrypted internal systems and prevented customers from accessing online services.
