Skip to content
Search AI Powered

Latest Stories

Median ransomware payment doubles to $26,000, Verizon says

Hackers launched more ransomware attacks on companies in the last two years than the previous 5 years combined, study finds.

verizon Screen Shot 2023-06-09 at 3.10.16 PM.png

Businesses are paying out soaring sums to retrieve their data after hackers encrypt their accounts, according to a report released this week by Verizon Business, the enterprise solutions division of the wireless data network provider.

The damage is caused by ransomware, which is malicious software (also known as malware) that encrypts an organization’s data and then extorts large sums of money to restore access, the Basking Ridge, New Jersey-based company said. That conclusion came from Verizon’s 16th annual Data Breach Investigations Report (2023 DBIR), which analyzed 16,312 security incidents and 5,199 breaches.


Ransomware remains one of the top cyberattack methods, representing almost a quarter of all breaches (24%). It has seen a dramatic rise in frequency over the past couple of years when the number of ransomware attacks was greater than the previous five years combined, Verizon said.

Part of the reason that ransomware is so popular with hackers is that it’s effective: The median cost per ransomware incident more than doubled over the past two years to $26,000.

In the overwhelming majority (74%) of incidents, hackers gain access to companies’ files through the human element, even as enterprises continue to safeguard critical infrastructure and increase training on cybersecurity protocols. One of the most common ways to exploit human nature is social engineering, which refers to manipulating an organization's sensitive information through tactics like phishing, in which a hacker convinces the user into clicking on a malicious link or attachment.

Executives are particularly vulnerable. “Senior leadership represents a growing cybersecurity threat for many organizations,” Chris Novak, managing director of Cybersecurity Consulting at Verizon Business, said in a release. “Not only do they possess an organization’s most sensitive information, they are often among the least protected, as many organizations make security protocol exceptions for them. With the growth and increasing sophistication of social engineering, organizations must enhance the protection of their senior leadership now to avoid expensive system intrusions.”

Another lucrative tactic for cybercriminals is social engineering, when attackers impersonate enterprise employees for financial gain, a method known as Business Email Compromise (BEC). The approach is especially effective when applied to businesses with distributed workforces, since they are challenged to create and strictly enforce human-centric security best practices for their remote employees. The median amount stolen in BECs has increased over the last couple of years to $50,000, based on Internet Crime Complaint Center (IC3) data.

And that trend might have contributed to a near doubling this past year of “pretexting,” an invented scenario that tricks someone into giving up information or committing an act that may result in a breach, Verizon said.

In other findings, the report found:

  • espionage garners substantial media attention, but only 3% of threat actors were motivated by espionage; the other 97% were motivated by financial gain. 
  • hackers tend to use new techniques soon after vulnerabilities are discovered. For example, 32% of yearly Log4j vulnerability scanning occurred in the first 30 days after its release, demonstrating threat actors’ velocity when escalating from a proof of concept to mass exploitation.
  • hackers use a variety of different techniques to gain entry to an organization, such as using stolen credentials (49%), phishing (12%), and exploiting vulnerabilities (5%).

 Finally, the report concluded that enterprises can help safeguard their critical infrastructure by adopting industry leading protocols and practices. For example, Verizon recently became the first nationwide telecom provider to become a participant of Mutually Agreed Norms for Routing Security (MANRS), a global initiative that provides crucial fixes to reduce the most common routing threats that can be exploited by attackers.

 

 

Recent

More Stories

team collaborating on data with laptops

Gartner: data governance strategy is key to making AI pay off

Supply chain planning (SCP) leaders working on transformation efforts are focused on two major high-impact technology trends, including composite AI and supply chain data governance, according to a study from Gartner, Inc.

"SCP leaders are in the process of developing transformation roadmaps that will prioritize delivering on advanced decision intelligence and automated decision making," Eva Dawkins, Director Analyst in Gartner’s Supply Chain practice, said in a release. "Composite AI, which is the combined application of different AI techniques to improve learning efficiency, will drive the optimization and automation of many planning activities at scale, while supply chain data governance is the foundational key for digital transformation.”

Keep ReadingShow less

Featured

manufacturing job growth in US factories

Savills “cautiously optimistic” on future of U.S. manufacturing boom

The U.S. manufacturing sector has become an engine of new job creation over the past four years, thanks to a combination of federal incentives and mega-trends like nearshoring and the clean energy boom, according to the industrial real estate firm Savills.

While those manufacturing announcements have softened slightly from their 2022 high point, they remain historically elevated. And the sector’s growth outlook remains strong, regardless of the results of the November U.S. presidential election, the company said in its September “Savills Manufacturing Report.”

Keep ReadingShow less
container ships at dock port of savannah

54 container ships now wait in waters off East and Gulf coast ports

The number of container ships waiting outside U.S. East and Gulf Coast ports has swelled from just three vessels on Sunday to 54 on Thursday as a dockworker strike has swiftly halted bustling container traffic at some of the nation’s business facilities, according to analysis by Everstream Analytics.

As of Thursday morning, the two ports with the biggest traffic jams are Savannah (15 ships) and New York (14), followed by single-digit numbers at Mobile, Charleston, Houston, Philadelphia, Norfolk, Baltimore, and Miami, Everstream said.

Keep ReadingShow less
EDGE 2024 diversity educational session

Diversifying your supply chain beyond China to minimize risk

Jason Kra kicked off his presentation at the Council of Supply Chain Management Professionals (CSCMP) EDGE Conference on Tuesday morning with a question: “How do we use data in assessing what countries we should be investing in for future supply chain decisions?” As president of Li & Fung where he oversees the supply chain solutions company’s wholesale and distribution business in the U.S., Kra understands that many companies are looking for ways to assess risk in their supply chains and diversify their operations beyond China. To properly assess risk, however, you need quality data and a decision model, he said.

In January 2024, in addition to his full-time job, Kra joined American University’s Kogod School of Business as an adjunct professor of the school’s master’s program where he decided to find some answers to his above question about data.

Keep ReadingShow less
warehouse problem medical triage strategy

Medical triage inspires warehouse process fixes

Turning around a failing warehouse operation demands a similar methodology to how emergency room doctors triage troubled patients at the hospital, a speaker said today in a session at the Council of Supply Chain Management Professionals (CSCMP)’s EDGE Conference in Nashville.

There are many reasons that a warehouse might start to miss its targets, such as a sudden volume increase or a new IT system implementation gone wrong, said Adri McCaskill, general manager for iPlan’s Warehouse Management business unit. But whatever the cause, the basic rescue strategy is the same: “Just like medicine, you do triage,” she said. “The most life-threatening problem we try to solve first. And only then, once we’ve stopped the bleeding, we can move on.”

Keep ReadingShow less