Only a Fifth of Ransomware Attacks Now Encrypt Data – Infosecurity Magazine


Published on: 2025-02-25

Intelligence Report: Only a Fifth of Ransomware Attacks Now Encrypt Data – Infosecurity Magazine

1. BLUF (Bottom Line Up Front)

Recent findings indicate a shift in ransomware tactics, with only 20% of attacks now focusing on data encryption. Instead, threat actors are prioritizing data exfiltration due to its speed and ease. This trend poses significant challenges for network defenders, who have limited time to respond to breaches. Key vulnerabilities include compromised service accounts and insufficient logging practices. Organizations are advised to enhance security measures, particularly through automation and AI, to improve threat detection and response times.

2. Detailed Analysis

The following structured analytic techniques have been applied for this analysis:

Analysis of Competing Hypotheses (ACH)

The shift from encryption to exfiltration may be driven by the increased profitability and lower risk associated with selling stolen data. Another hypothesis is that improved encryption defenses have forced attackers to adapt their strategies.

SWOT Analysis

Strengths: Increased awareness and improved encryption defenses.

Weaknesses: Overprivileged accounts and insufficient logging.

Opportunities: Adoption of AI and automation for faster threat response.

Threats: Rapid lateral movement and exploitation of legitimate software.

Indicators Development

Key indicators of emerging threats include increased use of credential dumping techniques and exploitation of public-facing applications. Monitoring these activities can provide early warning signs of potential breaches.

3. Implications and Strategic Risks

The trend towards data exfiltration over encryption increases the risk of sensitive information being sold on the black market, potentially impacting national security and economic interests. The rapid pace of these attacks poses a significant threat to regional stability, as organizations struggle to keep up with evolving tactics.

4. Recommendations and Outlook

Recommendations:

  • Implement AI-driven security solutions to enhance threat detection and response times.
  • Strengthen logging practices and regularly audit service accounts to prevent unauthorized access.
  • Adopt multifactor authentication and secure VPNs to protect against credential theft.
  • Ensure timely patching of vulnerabilities in internet-facing devices.

Outlook:

Best-case scenario: Organizations rapidly adopt AI and automation, significantly reducing the impact of ransomware attacks.

Worst-case scenario: Attackers continue to outpace defensive measures, leading to widespread data breaches and economic disruption.

Most likely scenario: A gradual improvement in defensive capabilities, with ongoing challenges in keeping pace with evolving threats.

5. Key Individuals and Entities

The report highlights the insights of Michael McPherson and the organization ReliaQuest, emphasizing the importance of rapid response and the advantages of automation in cybersecurity.

Only a Fifth of Ransomware Attacks Now Encrypt Data - Infosecurity Magazine - Image 1

Only a Fifth of Ransomware Attacks Now Encrypt Data - Infosecurity Magazine - Image 2

Only a Fifth of Ransomware Attacks Now Encrypt Data - Infosecurity Magazine - Image 3

Only a Fifth of Ransomware Attacks Now Encrypt Data - Infosecurity Magazine - Image 4