Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Ransomware Payouts Surge to $3.6m Amid Evolving Tactics
News

Ransomware Payouts Surge to $3.6m Amid Evolving Tactics

Team-CWDBy Team-CWDOctober 21, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The average ransomware payment has increased to $3.6m this year, up from $2.5m in 2024 – a 44% surge despite a decline in the overall number of attacks.

The 2025 Global Threat Landscape Report findings from ExtraHop point to a clear evolution in cybercriminal strategy: fewer, more targeted operations that aim for higher returns and longer-lasting impact.

Fewer Attacks; Higher Stakes

The report surveyed 1800 IT and security leaders across seven countries, who reported an average of five to six ransomware incidents over the past year, down roughly 25% from 2024.

While the number of attacks dropped, the damage intensified. Seventy percent of affected organizations paid the ransom, and payouts in critical sectors were significantly higher than average. Healthcare and government agencies faced the most significant financial burdens, both with payouts of nearly $7.5m, while finance averaged $3.8m per incident.

The report attributes this escalation to increasingly disciplined adversaries. Groups such as RansomHub, LockBit and DarkSide continue to dominate, refining their methods to maximize leverage.

“The combination of sophisticated attackers and a broader attack surface is a dangerous one,” ExtraHop wrote.

“It makes attacks harder to detect and gives criminals a significant head start.”

Read more on ransomware trends and digital risk management: Retail Ransomware Attacks Jump 58% Globally in Q2 2025

Expanding Attack Surfaces and Entrenched Threats

The study identified public cloud infrastructure (53.8%), third-party integrations (43.7%) and generative AI applications (41.9%) as the top sources of cybersecurity risk. These interconnected systems are widening the attack surface and complicating defense efforts.

The 2024 Snowflake breach, which exposed the data of 165 major customers including AT&T, was a notable example of how vulnerabilities in cloud ecosystems can cascade across industries.

Phishing remains the leading method of infiltration, responsible for 33.7% of attacks, followed by software vulnerabilities (19.4%) and supply chain compromises (13.4%).

Once inside a network, threat actors typically go undetected for about two weeks – ample time to move laterally, exfiltrate data and prepare ransomware deployment.

Long Response Times Add to Losses

On average, organizations took over two weeks to contain a security alert, while each incident led to roughly 37 hours of downtime. In the transportation sector, disruptions stretched to as long as 74 hours.

Limited visibility, talent shortages and alert fatigue were cited as major barriers to faster response.

To counter these trends, ExtraHop recommends organizations:

  • Map their whole attack surface and identify weak points

  • Monitor internal network traffic for lateral movement

  • Stay proactive against new tactics, particularly those using generative AI

The report concludes that while ransomware incidents may be fewer, their growing precision, scale and financial impact underscore an increasingly dangerous digital environment.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMicrosoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
Next Article Singapore Officials Impersonated in Sophisticated Investment Scam
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.