Skip to content
Search AI Powered

Latest Stories

Median ransomware payment doubles to $26,000, Verizon says

Hackers launched more ransomware attacks on companies in the last two years than the previous 5 years combined, study finds.

verizon Screen Shot 2023-06-09 at 3.10.16 PM.png

Businesses are paying out soaring sums to retrieve their data after hackers encrypt their accounts, according to a report released this week by Verizon Business, the enterprise solutions division of the wireless data network provider.

The damage is caused by ransomware, which is malicious software (also known as malware) that encrypts an organization’s data and then extorts large sums of money to restore access, the Basking Ridge, New Jersey-based company said. That conclusion came from Verizon’s 16th annual Data Breach Investigations Report (2023 DBIR), which analyzed 16,312 security incidents and 5,199 breaches.


Ransomware remains one of the top cyberattack methods, representing almost a quarter of all breaches (24%). It has seen a dramatic rise in frequency over the past couple of years when the number of ransomware attacks was greater than the previous five years combined, Verizon said.

Part of the reason that ransomware is so popular with hackers is that it’s effective: The median cost per ransomware incident more than doubled over the past two years to $26,000.

In the overwhelming majority (74%) of incidents, hackers gain access to companies’ files through the human element, even as enterprises continue to safeguard critical infrastructure and increase training on cybersecurity protocols. One of the most common ways to exploit human nature is social engineering, which refers to manipulating an organization's sensitive information through tactics like phishing, in which a hacker convinces the user into clicking on a malicious link or attachment.

Executives are particularly vulnerable. “Senior leadership represents a growing cybersecurity threat for many organizations,” Chris Novak, managing director of Cybersecurity Consulting at Verizon Business, said in a release. “Not only do they possess an organization’s most sensitive information, they are often among the least protected, as many organizations make security protocol exceptions for them. With the growth and increasing sophistication of social engineering, organizations must enhance the protection of their senior leadership now to avoid expensive system intrusions.”

Another lucrative tactic for cybercriminals is social engineering, when attackers impersonate enterprise employees for financial gain, a method known as Business Email Compromise (BEC). The approach is especially effective when applied to businesses with distributed workforces, since they are challenged to create and strictly enforce human-centric security best practices for their remote employees. The median amount stolen in BECs has increased over the last couple of years to $50,000, based on Internet Crime Complaint Center (IC3) data.

And that trend might have contributed to a near doubling this past year of “pretexting,” an invented scenario that tricks someone into giving up information or committing an act that may result in a breach, Verizon said.

In other findings, the report found:

  • espionage garners substantial media attention, but only 3% of threat actors were motivated by espionage; the other 97% were motivated by financial gain. 
  • hackers tend to use new techniques soon after vulnerabilities are discovered. For example, 32% of yearly Log4j vulnerability scanning occurred in the first 30 days after its release, demonstrating threat actors’ velocity when escalating from a proof of concept to mass exploitation.
  • hackers use a variety of different techniques to gain entry to an organization, such as using stolen credentials (49%), phishing (12%), and exploiting vulnerabilities (5%).

 Finally, the report concluded that enterprises can help safeguard their critical infrastructure by adopting industry leading protocols and practices. For example, Verizon recently became the first nationwide telecom provider to become a participant of Mutually Agreed Norms for Routing Security (MANRS), a global initiative that provides crucial fixes to reduce the most common routing threats that can be exploited by attackers.

 

 

Recent

More Stories

screen shot of returns apps on different devices

Optoro: 69% of shoppers admit to “wardrobing” fraud

With returns now a routine part of the shopping journey, technology provider Optoro says a recent survey has identified four trends influencing shopper preferences and retailer priorities.

First, 54% of retailers are looking for ways to increase their financial recovery from returns. That’s because the cost to return a purchase averages 27% of the purchase price, which erases as much as 50% of the sales margin. But consumers have their own interests in mind: 76% of shoppers admit they’ve embellished or exaggerated the return reason to avoid a fee, a 39% increase from 2023 to 204.

Keep ReadingShow less

Featured

robots carry goods through a warehouse

Fortna: rethink your distribution strategy for 2025

Facing an evolving supply chain landscape in 2025, companies are being forced to rethink their distribution strategies to cope with challenges like rising cost pressures, persistent labor shortages, and the complexities of managing SKU proliferation.

But according to the systems integrator Fortna, businesses can remain competitive if they focus on five core areas:

Keep ReadingShow less
artistic image of a building roof

BCG: tariffs would accelerate change in global trade flows

Geopolitical rivalries, alliances, and aspirations are rewiring the global economy—and the imposition of new tariffs on foreign imports by the U.S. will accelerate that process, according to an analysis by Boston Consulting Group (BCG).

Without a broad increase in tariffs, world trade in goods will keep growing at an average of 2.9% annually for the next eight years, the firm forecasts in its report, “Great Powers, Geopolitics, and the Future of Trade.” But the routes goods travel will change markedly as North America reduces its dependence on China and China builds up its links with the Global South, which is cementing its power in the global trade map.

Keep ReadingShow less
woman shopper with data

RILA shares four-point policy agenda for 2025

As 2025 continues to bring its share of market turmoil and business challenges, the Retail Industry Leaders Association (RILA) has stayed clear on its four-point policy agenda for the coming year.

That strategy is described by RILA President Brian Dodge in a document titled “2025 Retail Public Policy Agenda,” which begins by describing leading retailers as “dynamic and multifaceted businesses that begin on Main Street and stretch across the world to bring high value and affordable consumer goods to American families.”

Keep ReadingShow less
ATRI releases annual list of nation’s top truck bottlenecks

ATRI releases annual list of nation’s top truck bottlenecks

New Jersey is home to the most congested freight bottleneck in the country for the seventh straight year, according to research from the American Transportation Research Institute (ATRI), released today.

ATRI’s annual list of the Top 100 Truck Bottlenecks aims to highlight the nation’s most congested highways and help local, state, and federal governments target funding to areas most in need of relief. The data show ways to reduce chokepoints, lower emissions, and drive economic growth, according to the researchers.

Keep ReadingShow less