[Webinar] How to Boost Developer Productivity with Policy-Driven IaC

➡️ Register Now

General

50+ Ransomware Statistics for 2025

ransomware statistics

Subscribe to our Newsletter

Mission Infrastructure newsletter is a monthly digest of the latest posts from our blog, curated to give you the insights you need to advance your infrastructure game.

The threat posed by ransomware is ever-present. Ransomware attacks had already become more complex and audacious, but the advent of AI-enabled deepfakes in recent years has ensured they will continue to increase in volume and sophistication.

In this blog, we look at the latest ransomware statistics and trends and what they mean for businesses across various industries. 

Top ransomware statistics

Top ransomware statistics
  • Ransomware attacks are widespread: 59% of organizations were hit by ransomware in 2023, with a global average of 4,000 attacks daily.
  • Attack frequency is high: It is projected that a ransomware attack will occur every two seconds by 2031.
  • Ransomware attacks have risen 13% during the past five years.
  • Large organizations are more frequently targeted: Organizations with over $5 billion in revenue experience a 67% attack rate.
  • The United States is the most targeted country, accounting for 47% of ransomware attacks in 2023.
  • The most common attack vectors are email phishing campaigns, RDP vulnerabilities, and software vulnerabilities.
  • Windows-based executables account for 93% of ransomware.
  • Phishing remains the most common entry point for ransomware attacks.
  • 90% of ransomware attacks either fail or result in zero financial losses for the victim.

Financial impact of ransomware attacks

Although the nature of ransomware attacks depends on the kind of organization, the purpose of the attack is often financial gain. However, the cost to the victim is not solely the price of the ransom: The downtime the targeted organization suffers combined with the cost of restoring normal services can lead to substantial overall financial losses. 

  • Ransomware attacks are becoming more costly: Ransomware attacks in 2023 cost an average of $1.85 million each, with average recovery costs reaching $2.73 million.
  • Ransom payments are increasing: The average ransom payment increased to $2.73 million in 2024
  • The highest recorded ransom payment demanded in 2024 was $70 million.
  • The median ransom payment in 2024 was $2 million. (This compares with $400,000 in 2023.)
  • Negotiated payments are common: 44% of victims paid less than the demanded amount, while 31% paid more.
  • Downtime is significant: Companies subject to a ransomware attack endure an average of 24 days’ downtime.
  • Revenue loss and brand damage are common: 60% of survey respondents revealed they had lost revenue, and 53% stated their brands were damaged following a ransomware attack.
  • Cyber insurance coverage is often insufficient: 42% of companies with cyber insurance policies reported that their insurance compensated for only a small portion of the damages.
  • Ransomware is a major contributor to cybercrime costs: It is predicted that cybercrime will cost the world $10.5 trillion a year from 2025, and ransomware is forecast to cost its victims around $265 billion annually by 2031.
  • The average ransom demand in 2024 was $4.32M.
  • 63% of 2024 demands exceeded $1M+.
  • 30% of 2024 demands exceeded $5M.
  • For payments that were negotiated in 2024:
    • 44% paid less than what was demanded.
    • 31% paid more than what was demanded
    • 24% paid the amount demanded.

Data encryption and theft

In its simplest form, ransomware seeks to encrypt data and extort money from the victim in return for decrypting it. However, as ransomware has become more sophisticated, it may identify and extract sensitive data before going on to encrypt the files. The attacker transfers the stolen data to their own servers and may publish some of it if the victim refuses to pay the ransom.

  • Data encryption is common: 70% of ransomware attacks led to data encryption in 2024.
  • This has dropped from 76% in 2023.
  • Data theft often accompanies encryption: 32% of attacks involving encryption also included data theft.
  • For the IT industry and telecommunications, 53% of attacks involving encryption also included data theft.
  • The figure is far lower for the higher education sector: 18% of attacks involving encryption also included data theft.

Recovery and post-attack challenges

Recovery from ransomware is a complex process to restore and secure systems following an  attack. The first step is to identify the extent of the ransomware attack and what potential damage it might have caused. Organizations must act quickly and strategically to limit the damage and prevent further exposure.

  • Recovery takes time: For 34% of organizations, recovering from a ransomware attack takes longer than a month.
  • 35% of organizations took a week or less to recover from a ransomware attack in 2024. In 2023, this figure was 47%.
  • Data recovery methods vary
    • 68% of organizations restore from backups
    • 56% pay the ransom
    • 47% use multiple methods.
  • Backups are crucial for faster recovery: For organizations with uncompromised backups, 46% recover in a week or less, compared with 25% for those whose backups were compromised.
  • Repeat attacks are common: 80% of victims who paid a ransom experienced another attack soon after
  • Payment is no guarantee of data recovery: Just 46% of victims who paid a ransom received access to their data — and much of the data they did receive was corrupted.
  • Data Recovery Methods — this is how organizations recover their data:
    • 68% restored from backups.
    • 56% paid the ransom to recover data.
    • 47% used multiple methods (up from 21% in 2023).

Law enforcement and cyber insurance

Calling the police is a standard response when a crime is suspected, and this remains the case with cyber attacks. 

  • Law enforcement is often involved: 97% of ransomware victims engage law enforcement or official bodies.
  • More than half (59%) of organizations that engaged with law enforcement reported that the process was easy or somewhat easy. 
  • Of those who did engage with law enforcement, just 10% of those surveyed described the process as very difficult.
  • 61% received advice from law enforcement agencies on dealing with ransomware
  • 60% received assistance with investigating the ransomware attack. 
  • 58% of victims whose data was encrypted were helped by law enforcement agencies to recover their data. 
  • Cyber insurance is increasingly used to fund ransom payments: 23% of ransom payments are funded by cyber insurance.

Leading ransomware groups

There have been some significant disruptions in the ransomware ecosystem recently, with the takedown of ALPHV/BlackCat in late 2023 and the disruption of the LockBit syndicate in 2024. However, the ransomware-as-a-service (RaaS) landscape is resilient, and established players like Play and Akira seem to be intensifying their activities, and new ones are emerging. 

  • In Q2 of 2023, Akira and BlackCat were the top ransomware variants, with a combined 27% market share. ( BlackCat was taken down in late 2023).
  • In 2023, Magniber Trojan topped the list of the most common ransomware Trojans — being responsible for more than 17% of encounters. Extortion Trojans typically leverage attack vectors including the Remote Desktop Protocol, phishing emails, and software vulnerabilities.
  • LockBit 3.0’s activities rose 164% between 2022 and 2023. 
  • AlphVM’s activities rose 72% between 2022 and 2023.
  • CL0P’s activities rose 1,186% between 2022 and 2023 (30 cases to 386 cases).
  • PLAY’s activities rose 1.084% between 2022 and 2023.(26 cases to 308 cases)
  • BlackBasta’s activities rose 22% between 2022 and 2023 (172 cases to 210 cases).

Key takeaways

Solve your infrastructure challenges

Spacelift is a flexible orchestration solution for IaC development. It delivers enhanced collaboration, automation, and controls to simplify and accelerate the provisioning of cloud-based infrastructures.

Learn more

The Practitioner’s Guide to Scaling Infrastructure as Code

Transform your IaC management to scale

securely, efficiently, and productively

into the future.

ebook global banner
Share your data and download the guide