Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Ransomware Response Improves Even as Preparation Lags

    Ransomware Response Improves Even as Preparation Lags

    June 27, 2025

    Root causes of ransomware attacks

    One bright spot in Sophos’ annual State of Ransomware report released this week is that organizations have gotten better at stopping ransomware attacks before attackers are able to encrypt data.

    But otherwise the report shows that defensive and preventive preparation continues to lag, if not backslide in some cases.

    Ransomware Response Improves as Backup Lags

    The report, based on a survey of 3,400 IT and cybersecurity leaders in 17 countries whose organizations were hit by ransomware attacks in the last year, found that 44% of organizations were able to stop the attack before data was encrypted. That’s the highest rate in the survey’s six-year-history (image below).

    Ransomware encryption rates decline
    Ransomware encryption rates decline (Sophos)

    Data was encrypted in half the cases, the lowest rate in the survey’s history, while in 6% of cases organizations faced extortion demands even when data wasn’t encrypted.

    The report also noted that:

    • 28% of organizations that had data encrypted also experienced data exfiltration.
    • 97% that had data encrypted were able to recover it.
    • The use of backups to restore encrypted data is at the lowest rate in six years, used in just 54% of incidents.
    • 49% of victims paid the ransom to get their data back, the second highest ransom payment rate in six years.

    Looking at recovery from backups vs. the percentage of ransom payments, the trend begins to appear worrisome, as successful backup recovery has declined significantly, from 73% in 2022 to 54% this year, while the percentage of ransom payments has generally been trending higher throughout the report’s history (chart below).

    Recovery from backups is declining as ransom payment frequency is increasing
    Recovery from backups is declining as ransom payment frequency is increasing (Sophos)

    The average ransom payment fell from $2 million in 2024 to $1 million in 2025, largely because of a sizeable drop in ransom payments of $5 million or more. On average, ransom payments were 85% of the amount demanded; 29% said their payment matched the demand, 53% paid less and 18% paid more.

    Excluding ransoms, the average cost to recover from a ransomware attack dropped from $2.73 million in 2024 to $1.53 million. More than half of organizations – 53% – fully recovered in a week, up from 35% in 2024.

    Also read: SafePay, DevMan Emerge as Major Ransomware Threats

    The Root Causes of Ransomware Attacks

    For the third straight year, ransomware victims said vulnerabilities were the most common technical root cause of an attack, exploited by attackers in 32% of incidents.

    Compromised credentials were the second most common attack vector even as those attacks fell from 29% in 2024 to 23% in 2025. 19% of victims reporting malicious email as the root cause and 18% citing phishing.

    A lack of expertise was a factor in 40.2% of attacks, followed by unknown security gaps at 40.1%. Lack of people and capacity was cited in 39.4% of attacks.

    Overall, the report suggests that organizations still have much progress to make on essential ransomware protections such as vulnerability management, segmentation and zero trust, ransomware-resistant backups, and infrastructure and endpoint hardening and monitoring.

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHow Japanese Programmers Are Leveraging MT5 for Advanced Algorithmic Trading
    Next Article PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-46533 – WordPress wpdrift.no Stored Cross-site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)

    URI Path Components Using Laravel’s pathSegments() Method

    Development

    Filament v4 Beta Released: 4 New Features You Need to Know

    Development

    Can you build a billion-dollar business with only AI agents (yet)? This author thinks so

    News & Updates

    Highlights

    A New Citibank Report/Guide Shares How Agentic AI Will Reshape Finance with Autonomous Analysis and Intelligent Automation

    April 24, 2025

    In its latest ‘Agentic AI Finance & the ‘Do It For Me’ Economy’ report, Citibank…

    The AI productivity paradox in software engineering: Balancing efficiency and human skill retention

    July 2, 2025

    Microsoft AI Introduces Code Researcher: A Deep Research Agent for Large Systems Code and Commit History

    June 15, 2025

    Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

    July 18, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.