

{"id":1407,"date":"2020-07-17T16:54:32","date_gmt":"2020-07-17T20:54:32","guid":{"rendered":"https:\/\/sites.temple.edu\/care\/?page_id=1407"},"modified":"2026-01-26T09:40:00","modified_gmt":"2026-01-26T14:40:00","slug":"cira","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/care\/cira\/","title":{"rendered":"Critical Infrastructure Ransomware Attacks (CIRA)"},"content":{"rendered":"<p>In September 2019, we started a dataset of Critical Infrastructures Ransomware Attacks (CIRAs). These are based on publicly disclosed incidents in the media or security reports. This dataset <strong>(version 12.16)<\/strong> now has <strong>2,291 <\/strong>records assembled from publicly disclosed incidents between <strong>November 2013 <\/strong>and <strong>December 31, 2025, <\/strong>and has been mapped to the <a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">MITRE ATT&amp;CK Framework<\/a>. To date, <span style=\"text-decoration: underline\"><em>we have fulfilled 1,806 requests<\/em><\/span>. Some publicly known uses of the dataset can be found in <a href=\"https:\/\/sites.temple.edu\/care\/cira\/projects-using-cira\/\" target=\"_blank\" rel=\"noopener\">research papers and reports<\/a>.<\/p>\n<p>If you use the dataset, in whole or in part, for any analysis, publication, presentation, or any other dissemination (including social media), you agree to cite this dataset in your reference list as:<br \/>\n<em>Rege, A. (2026). &#8220;Critical Infrastructure Ransomware Attacks (CIRA) Dataset&#8221;. Version 12.16. Temple University. Online at https:\/\/sites.temple.edu\/care\/cira\/. ORCID: 0000-0002-6396-1066.<\/em><\/p>\n<p><strong><span style=\"color: #ff0000\">PLEASE NOTE THE FOLLOWING:<\/span><\/strong><\/p>\n<ol>\n<li><span style=\"color: #ff0000\">We do NOT send the dataset to a personal email (gmail, protonmail, hotmail, etc.). We will not respond to requests coming from these email addresses.<\/span><\/li>\n<li><span style=\"color: #ff0000\">Allow 2-4 weeks for us to respond to your request.<\/span><\/li>\n<li>This dataset is free and accessible to the community. It can be used for educational\/training purposes, conducting your own analysis\/threat intel, sharing with stakeholders, etc. This limited license for the use of the dataset does not include commercial or for-profit purposes. <strong><span style=\"color: #ff0000\">Please do NOT use\/share this dataset to develop commercial products\/services\/software that others have to pay for!<\/span><\/strong><\/li>\n<li><span style=\"color: #ff0000\">By using this dataset <strong>you agree that all copyright and\/or other proprietary notices on these materials must be kept intact and may not be removed<\/strong>.<\/span><\/li>\n<\/ol>\n<p><a href=\"https:\/\/sites.temple.edu\/care\/data-request-form\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #008000\"><b><u>Download the dataset here<\/u><\/b><\/span><\/a><\/p>\n<p>Want to <a href=\"https:\/\/sites.temple.edu\/care\/cira\/submit-cira\/\" target=\"_blank\" rel=\"noopener\">submit a CIRA<\/a>? We may have missed a CIRA incident and your contribution, if relevant, will be added to this dataset!<\/p>\n<p>Our dataset has been featured in <a href=\"https:\/\/www.securityweek.com\/universitys-critical-infrastructure-ransomware-attack-tracker-reaches-2000-incidents\/\" target=\"_blank\" rel=\"noopener\">Security Week (2025)<\/a>, <a href=\"https:\/\/www.securityweek.com\/university-project-cataloged-1100-ransomware-attacks-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener\">Security Week (2022)<\/a>, <a href=\"https:\/\/www.securityweek.com\/university-project-tracks-ransomware-attacks-critical-infrastructure\" target=\"_blank\" rel=\"noopener noreferrer\">Security Week (2020)<\/a>,\u00a0<a href=\"https:\/\/www.gartner.com\/en\/documents\/4008351\/predicts-2022-cyber-physical-systems-security-critical-infrastructure-in-focus\" target=\"_blank\" rel=\"noopener\">Gartner<\/a>, <a href=\"https:\/\/www.brinknews.com\/quick-take\/ransomware-attacks-on-critical-infrastructure-are-surging\/\" target=\"_blank\" rel=\"noopener\">BRINK<\/a>, <a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/95739--day-plan-what-european-nations-can-do-to-protect-utilities\" target=\"_blank\" rel=\"noopener\">Security Magazine<\/a>, <a href=\"https:\/\/www.sentinelone.com\/blog\/how-ransomware-attacks-are-threatening-our-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener\">SentinelOne<\/a>, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-week-in-ransomware-september-18th-2020-schools-under-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bleeping Computer<\/a>, <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/academia-adopts-mitre-attandck-framework\/d\/d-id\/1339197?\" target=\"_blank\" rel=\"noopener noreferrer\">Dark Reading<\/a>, <a href=\"https:\/\/cit.cyberpeaceinstitute.org\/methodology\" target=\"_blank\" rel=\"noopener\">Cyber Peace Institute<\/a>, <a href=\"https:\/\/www.washingtonpost.com\/business\/2021\/05\/12\/ransomware-attack\/\" target=\"_blank\" rel=\"noopener\">the Washington Post<\/a>, <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-05-10\/how-a-key-u-s-pipeline-got-knocked-out-by-hackers-quicktake\" target=\"_blank\" rel=\"noopener\">Bloomberg<\/a>, <a href=\"https:\/\/www.usatoday.com\/story\/news\/2021\/05\/13\/colonial-pipeline-hack-latest-rising-threat-ransomware-attacks\/5071254001\/\" target=\"_blank\" rel=\"noopener\">USA Today<\/a>, <a href=\"https:\/\/www.ineteconomics.org\/perspectives\/blog\/hijacked-and-paying-the-price-why-ransomware-gangs-should-be-designated-as-terrorists\" target=\"_blank\" rel=\"noopener\">Institute for New Economic Thinking<\/a>, <a href=\"https:\/\/www.dallasnews.com\/opinion\/commentary\/2021\/05\/19\/the-us-must-regulate-cybersecurity-for-critical-infrastructure-like-pipelines\/\" target=\"_blank\" rel=\"noopener\">The Dallas Morning News<\/a>, <a href=\"https:\/\/www.businessinsider.com\/colonial-pipeline-hack-ransom-cryptocurrency-darkside-2021-5\" target=\"_blank\" rel=\"noopener\">Business Insider<\/a>, <a href=\"https:\/\/californianewstimes.com\/pipeline-ransom-attack-exposes-risk-of-digitising-us-infrastructure\/350819\/\" target=\"_blank\" rel=\"noopener\">California News Times<\/a>, <a href=\"https:\/\/www.ft.com\/content\/3a6941ce-8b0f-40b1-84d6-6418d8a84c94\" target=\"_blank\" rel=\"noopener\">Financial Times<\/a>, <a href=\"https:\/\/www.ciodive.com\/news\/critical-infrastructure-attack-ransomware\/599977\/\" target=\"_blank\" rel=\"noopener\">CIO Dive<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\" target=\"_blank\" rel=\"noopener\">eSecurity Planet<\/a>!<\/p>\n<p>To learn how we developed the CIRA dataset in greater detail, you can read our paper: <em>Rege, A. &amp; Bleiman, R.(2022) . \u201cA Free and Community-driven Critical Infrastructure Ransomware Dataset\u201d. Proceedings from the IEEE Cyber Science Conference.<\/em><\/p>\n<p><strong>Other ransomware datasets<\/strong><\/p>\n<p><a href=\"https:\/\/www.ransomware.live\/\" target=\"_blank\" rel=\"noopener\">Ransomware.live<\/a><br \/>\n<a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/global-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener\">Comparitech&#8217;s Map of worldwide ransomware attacks (updated daily)<\/a><\/p>\n<p>Check out these fantastic <a href=\"https:\/\/github.com\/ITI\/ICS-Security-Tools\/tree\/master\/feeds\" target=\"_blank\" rel=\"noopener\">resources for ICS security<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><!-- Default Statcounter code for CIRW https:\/\/sites.temple.edu\/care\/ci-rw-attacks\/ --><\/p>\n<p><span style=\"color: #ffffff\">var sc_project=12360776;<br \/>\nvar sc_invisible=1;<br \/>\nvar sc_security=&#8221;ddf74f40&#8243;; <\/span><\/p>\n<div class=\"statcounter\"><a title=\"Web Analytics\" href=\"https:\/\/statcounter.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"statcounter\" src=\"https:\/\/c.statcounter.com\/12360776\/0\/ddf74f40\/1\/\" alt=\"Web Analytics\" \/><\/a><\/div>\n<p><!-- End of Statcounter Code --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In September 2019, we started a dataset of Critical Infrastructures Ransomware Attacks (CIRAs). These are based on publicly disclosed incidents in the media or security&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/care\/cira\/\">Continue reading<span class=\"screen-reader-text\">Critical Infrastructure Ransomware Attacks (CIRA)<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1407","page","type-page","status-publish","hentry","entry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/comments?post=1407"}],"version-history":[{"count":81,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1407\/revisions"}],"predecessor-version":[{"id":4123,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1407\/revisions\/4123"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/media?parent=1407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}