ADVERTISEMENT
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
Thursday, October 30, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
  • News
  • Finance
  • StartUPs
  • TechTAINMENT
  • Guest Writer
  • Digital Assets
  • IndustryINFLUENCERS
  • Environment
  • Macro Monday
ADVERTISEMENT

Home » Extortion and Ransomware Drive Over Half of Cyberattacks

Extortion and Ransomware Drive Over Half of Cyberattacks

| By Amy Hogan-Burney, corporate vice president, Customer Security & Trust, Microsoft

Techeconomy by Techeconomy
October 30, 2025
in Security
Reading Time: 6 mins read
0
Amy Hogan-Burney says Extortion and Ransomware Drive Over Half of Cyberattacks

Amy Hogan-Burney, corporate vice president, Customer Security & Trust

UBA
Advertisements

In 80% of the cyber incidents Microsoft’s security teams investigated last year, attackers sought to steal data, a trend driven more by financial gain than intelligence gathering.

According to the latest Microsoft Digital Defense Report, written with our Chief Information Security Officer Igor Tsyganskiy, over half of cyberattacks with known motives were driven by extortion or ransomware.

That’s at least 52% of incidents fueled by financial gain, while attacks focused solely on espionage made up just 4%.

Nation-state threats remain a serious and persistent threat, but most of the immediate attacks organizations face today come from opportunistic criminals looking to make a profit.

Every day, Microsoft processes more than 100 trillion signals, blocks approximately 4.5 million new malware attempts, analyzes 38 million identity risk detections, and screens 5 billion emails for malware and phishing.

Advances in automation and readily available off-the-shelf tools have enabled cybercriminals – even those with limited technical expertise – to expand their operations significantly.

The use of AI has further added to this trend with cybercriminals accelerating malware development and creating more realistic synthetic content, enhancing the efficiency of activities such as phishing and ransomware attacks.

As a result, opportunistic malicious actors now target everyone, big or small, making cybercrime a universal, ever-present threat that spills into our daily lives.

In this environment, organizational leaders must treat cybersecurity as a core strategic priority, not just an IT issue, and build resilience into their technology and operations from the ground up.

In our sixth annual Microsoft Digital Defense Report, which covers trends from July 2024 through June 2025 we highlight that legacy security measures are no longer enough; we need modern defenses and strong collaboration across industries and governments to keep pace with the threat.

For individuals, simple steps like using strong security tools, especially phishing-resistant multifactor authentication (MFA), makes a big difference as MFA can block over 99% of identity-based attacks. Below are some of the key findings.

Extortion and Ransomware Drive Over Half of Cyberattacks

Critical services are prime targets with a real-world impact

Malicious actors remain focused on attacking critical public services, targets that, when compromised, can have a direct and immediate impact on people’s lives.

Hospitals and local governments, for example, are all targets because they store sensitive data, or have tight cybersecurity budgets with limited incident response capabilities, often resulting in outdated software.

In the past year, cyberattacks on these sectors had real world consequences, including delayed emergency medical care, disrupted emergency services, canceled school classes, and halted transportation systems.

Ransomware actors in particular focus on these critical sectors because of the targets’ limited options. For example, a hospital must quickly resolve its encrypted systems or patients could die, potentially leaving no other recourse but to pay.

Additionally, governments, hospitals, and research institutions store sensitive data that criminals can steal and monetize through illicit marketplaces to the dark web, fueling downstream criminal activity. Government and industry can collaborate to strengthening cybersecurity in these sectors, particularly for the most vulnerable.

These efforts are critical to protecting communities and ensuring continuity of care, education, and emergency response.

Nation-state actors are expanding operations

While cybercriminals are the biggest cyber threat by volume, nation-state actors still target key industries and regions, expanding their focus on espionage, and in some cases on financial gain.

Geopolitical objectives continue to drive a surge in state-sponsored cyber activity, with a notable expansion in targeting communications, research and academia.

Extortion and Ransomware Drive Over Half of Cyberattacks
Microsoft Report

Key insights:

. China is continuing its broad push across industries to conduct espionage and steal sensitive data. State-affiliated actors are increasingly attacking non-governmental organizations (NGOs) to expand their insights and are using covert networks and vulnerable internet-facing devices to gain entry and avoid detection.

They have also become faster at operationalizing newly disclosed vulnerabilities.

. Iran is going after a wider range of targets than ever before, from the Middle East to North America, as part of broadening espionage operations.

Recently, three Iranian state-affiliated actors attacked shipping and logistics firms in Europe and the Persian Gulf to gain ongoing access to sensitive commercial data, raising the possibility that Iran may be pre-positioning to have the ability to interfere with commercial shipping operations.

. Russia, while still focused on the war in Ukraine, has expanded its targets. For example, Microsoft has observed Russian state-affiliated actors targeting small businesses in countries supporting Ukraine.

In fact, outside of Ukraine, the top ten countries most affected by Russian cyber activity all belong to the North Atlantic Treaty Organization (NATO), a 25% increase compared to last year.

MTN New

Russian actors may view these smaller companies as possibly less resource-intensive pivot points they can use to access larger organizations. These actors are also increasingly leveraging the cybercriminal ecosystem for their attacks.

. North Korea remains focused on revenue generation and espionage. In a trend that has gained significant attention, thousands of state-affiliated North Korean remote IT workers have applied for jobs with companies around the world, sending their salaries back to the government as remittances.

When discovered, some of these workers have turned to extortion as another approach to bringing in money for the regime.

The cyber threats posed by nation-states are becoming more expansive and unpredictable. In addition, the shift by at least some nation-state actors to further leveraging the cybercriminal ecosystem will make attribution even more complicated.

This underscores the need for organizations to stay abreast of the threats to their industries and work with both industry peers and governments to confront the threats posed by nation-state actors.

2025 saw an escalation in the use of AI by both attackers and defenders

Over the past year, both attackers and defenders harnessed the power of generative AI. Threat actors are using AI to boost their attacks by automating phishing, scaling social engineering, creating synthetic media, finding vulnerabilities faster, and creating malware that can adapt itself. Nation-state actors, too, have continued to incorporate AI in their cyber influence operations.

This activity has picked up in the past six months as actors use the technology to make their efforts more advanced, scalable, and targeted.

Extortion and Ransomware Drive Over Half of Cyberattacks

For defenders, AI is also proving to be a valuable tool. Microsoft, for example, uses AI to spot threats, close detection gaps, catch phishing attempts, and protect vulnerable users.

As both the risks and opportunities of AI rapidly evolve, organizations must prioritize securing their AI tools and training their teams.

Everyone, from industry to government, must be proactive to keep pace with increasingly sophisticated attackers and to ensure that defenders keep ahead of adversaries.

Adversaries aren’t breaking in, they’re signing in 

Amid the growing sophistication of cyber threats, one statistic stands out: more than 97% of identity attacks are password attacks.

In the first half of 2025 alone, identity-based attacks surged by 32%. That means the vast majority of malicious sign-in attempts an organization might receive are via large-scale password guessing attempts.

Attackers get usernames and passwords (“credentials”) for these bulk attacks by in large from credential leaks.

However, credential leaks aren’t the only place where attackers can obtain credentials. This year, we saw a surge in the use of infostealer malware by cybercriminals. Infostealers can secretly gather credentials and information about your online accounts like browser session tokens, at scale.

Cybercriminals can then buy this stolen information on cybercrime forums, making it easy for anyone to access accounts for purposes such as the delivery of ransomware.

Luckily, the solution to identity compromise is simple. The implementation of phishing-resistant multifactor authentication (MFA) can stop over 99% of this type of attack even if the attacker has the correct username and password combination.

To target the malicious supply chain, Microsoft’s Digital Crimes Unit (DCU) is fighting back against the cybercriminal use of infostealers.

In May, the DCU disrupted the most popular infostealer, Lumma Stealer, alongside the US Department of Justice and Europol.

Moving forward: Cybersecurity is a shared defensive priority

As threat actors grow more sophisticated, persistent, and opportunistic, organizations must stay vigilant, continually updating their defenses, and sharing intelligence.

Microsoft remains committed to doing its part to strengthen our products and services via our Secure Future Initiative. We also continue to collaborate with others to track threats, alert targeted customers, and share insights with the broader public when appropriate.

However, security is not only a technical challenge, but a governance imperative. Defensive measures alone are not enough to deter nation-state adversaries.

Governments must build frameworks that signal credible and proportionate consequences for malicious activity that violate international rules.

Encouragingly, governments are increasingly attributing cyberattacks to foreign actors and imposing consequences such as indictments and sanctions.

This growing transparency and accountability are important steps toward building collective deterrence. As digital transformation accelerates, amplified by the rise of AI, cyber threats pose risks to economic stability, governance, and personal safety.

Addressing these challenges requires not only technical innovation but coordinated societal action.

0Shares

MTN ADS
Tags: infostealersMicrosoft’s security teams
Techeconomy

Techeconomy

Next Post
Ben Jacob | Sophos | Deepfakes

Deepfakes: The Next Human Vulnerability for Businesses?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

MTN New
UBA
Advertisements
  • About
  • Advertise
  • Careers
  • Contact Us

© 2025 TECHECONOMY.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs

© 2025 TECHECONOMY.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.