{"id":52228,"date":"2023-06-06T15:59:21","date_gmt":"2023-06-06T15:59:21","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34694\/Ransomware-Attacks-Have-Room-To-Grow-Verizon-Report-Shows.html"},"modified":"2023-06-06T15:59:21","modified_gmt":"2023-06-06T15:59:21","slug":"ransomware-attacks-have-room-to-grow-verizon-report-shows","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/","title":{"rendered":"Ransomware Attacks Have Room To Grow, Verizon Report Shows"},"content":{"rendered":"<p>Ransomware attacks now make up an huge chunk of all recorded security incidents, the Log4j vulnerability was used in 3 in 4 digital espionage campaigns and employees continue to pose more of a practical cyber threat to most organizations than the Russian GRU or Chinese Ministry of State Security.<\/p>\n<p>Those are some of the conclusions gleaned from the latest annual Verizon Data Breach Investigations Report <a href=\"https:\/\/www.documentcloud.org\/documents\/23834864-2023-dbir_full-report-final-1\" target=\"_blank\" rel=\"noreferrer noopener\">released<\/a> this morning.<\/p>\n<p>Verizon\u2019s findings are drawn from 16,000 security incidents over the past year, including over 5,000 data breaches from Nov. 1, 2021 to Oct. 31, 2022.<\/p>\n<p>A plurality of 15,000-plus incidents (42%) were distributed-denial-of-service (DDoS) attacks, which can disrupt service from or access to websites and other systems.<\/p>\n<p>There are solid indicators that DDoS attacks are getting worse, or at least more intense, as the internet of things (IoT) give attackers billions of zombie devices to hijack and incorporate into botnets. Over the past two years, companies like <a href=\"https:\/\/www.scmagazine.com\/news\/application-security\/cloudflare-blocked-largest-reported-ddos-attack-at-71m-requests-per-second\">Cloudflare<\/a> and <a href=\"https:\/\/cybernews.com\/news\/yandex-claims-to-be-hit-by-the-largest-ddos-attack-in-history\/\">Yandex<\/a> have observed increasingly larger and record-breaking &nbsp;DDoS attacks, while the U.S. Department of Justice recently highlighted its interest in the problem when it <a rel=\"noreferrer noopener\" href=\"https:\/\/www.scmagazine.com\/news\/application-security\/doj-seizes-13-domains-ddos-for-hire-booter-services\" target=\"_blank\">targeted and seized<\/a> 13 domains used in various \u201cDDoS for hire\u201d operations earlier this year.<\/p>\n<h2>Ransomware holding steady<\/h2>\n<p>A number of threat intelligence and cybersecurity firms <a href=\"https:\/\/www.scmagazine.com\/analysis\/ransomware\/ransomware-watchers-creative-ways-track-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">have said<\/a> their internal data, gleaned from customers and incident responses, indicate that ransomware activity <a href=\"https:\/\/www.scmagazine.com\/news\/ransomware\/ransomware-resurgence-after-strange-year-in-2022-insurance-data-shows\" target=\"_blank\" rel=\"noreferrer noopener\">dropped off <\/a>in 2022, before jumping back up in the first half of 2023. Verizon\u2019s data shows a similar trend, with reported ransomware incidents plateauing over the past 24 months at 24%, after years of steady growth.<\/p>\n<figure><img alt=\"After steady growth since 2019, reported ransomware activity has plateaued over the past two years.(Source: Verizon Data Breach Investigations Report 2023)\" srcset=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=750&amp;q=75 1x, https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75 2x\" src=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75\" width=\"697\" height=\"418\" decoding=\"async\" data-nimg=\"1\" class=\"MediaItem_img__WJ8V4\" loading=\"lazy\"><figcaption><em>After steady growth since 2019, reported ransomware activity has plateaued over the past two years.(Source: Verizon Data Breach Investigations Report 2023)<\/em><\/figcaption><\/figure>\n<p>However, if someone does break into your system, the most likely cause will be ransomware. Encryption and extortion overall have risen to 15.5% of all reported cybersecurity incidents, the second most frequently reported action after DDoS. It\u2019s also the No. 1 most-frequent action taken by hackers during system intrusion incidents.<\/p>\n<p>These results are \u201cstaggering,\u201d and Verizon\u2019s report suggests we have yet to see rock bottom.<\/p>\n<p>\u201c[W]e had been anticipating that Ransomware would soon be hitting its theoretical ceiling, by which we mean that all the incidents that could have Ransomware, would have,\u201d the authors wrote. \u201cRansomware is present today in more than 62% of all incidents committed by Organized crime actors and in 59% of all incidents with a Financial motivation, so sadly there is still some room for growth.\u201d<\/p>\n<p>The most common entry points into a victim system for ransomware attackers were through email, desktop applications and web applications.<\/p>\n<p>Only a fraction (5%) of the breaches captured in the DBIR report involved exploiting security vulnerabilities in systems or devices.<\/p>\n<h2>Log4j: not as bad as feared, still impactful<\/h2>\n<p>When Log4j was first disclosed, federal agencies and threat intelligence companies <a href=\"https:\/\/www.scmagazine.com\/analysis\/application-security\/log4j-vulnerability-cleanup-expected-to-take-months-or-years\">sounded the alarm<\/a>, not just because the bug was embedded in untold numbers of commercial systems and software, but also because they had observed early signs that cybercriminal groups and nation-states were racing to find vulnerable instances and exploit them before industry could identify and patch them.<\/p>\n<p>That led to one of the <a href=\"https:\/\/www.scmagazine.com\/analysis\/application-security\/cisa-sees-low-levels-of-log4j-exploitation-against-agencies-and-critical-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">largest coordination efforts<\/a> ever done between government and the private sector around a vulnerability, and Verizon\u2019s data validates some of those concerns.<\/p>\n<p>While the flaw was widely publicized in November 2021, fully one-third (32%) of vulnerability scanning around Log4j since took place in the 30 days following disclosure. However, those numbers likely include both bad actors as well as defenders looking to scan their own networks.<\/p>\n<p>Verizon thinks the collective effort to identify and patch dramatically reduced the number of exploitable systems, but that doesn&#8217;t mean the hype was fake. They also found that 73% of cases involving digital espionage and 26% involving organized crime included use of the bug in some way.<\/p>\n<figure><img alt=\"Impact from the Log4J vulnerability may have been dampened by a massive public-private effort to identify and patch affected systems in the wake of disclosure. (Source: Verizon Data Breach Investigations Report 2023)\" srcset=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.07.12-PM.png&amp;w=750&amp;q=75 1x, https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.07.12-PM.png&amp;w=1920&amp;q=75 2x\" src=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.07.12-PM.png&amp;w=1920&amp;q=75\" width=\"697\" height=\"418\" decoding=\"async\" data-nimg=\"1\" class=\"MediaItem_img__WJ8V4\" loading=\"lazy\"><figcaption><em>Impact from the Log4j vulnerability may have been dampened by a massive public-private effort to identify and patch affected systems in the wake of disclosure. (Source: Verizon Data Breach Investigations Report 2023)<\/em><\/figcaption><\/figure>\n<h2>Worry about your disgruntled contractor, not China<\/h2>\n<p>While espionage and other nation-state-directed hacks can be extremely impactful and tend to dominate news headlines, Verizon\u2019s data underscores just how much of the malicious activity we see in cyberspace is for profit. Nearly 95% of all breaches were financially motivated (to be fair: some nations, like North Korea, are known to hack for profit as well.)<\/p>\n<p>Only a small fraction (5%) of the breaches captured in the DBIR report involved exploiting security vulnerabilities in systems or devices.<\/p>\n<p>Approximately 1 in 5 breaches Verizon tracked last year had some form on insider participation, whether malicious and intentional or through errors. Despite larger business trends toward digitization and automation, the vast majority of breaches still include some type of human element, whether error, misuse, being victim to a social engineering attack or stolen credentials.<\/p>\n<p>Still, the average organization is far more likely to suffer a breach due to an end user \u2014 an employee, contractor, intern or other insider \u2014 as they are from a state-backed hacking group or politically motivated hacktivists.<\/p>\n<p>\u201cThis is relevant because we were expecting some increased activity in State-sponsored attacks, be it Espionage-related or not, due to the ongoing conflict in Ukraine,\u201d the authors wrote. \u201cEven with anecdotal evidence of increased ideology or hacktivism-related attacks stemming from the geopolitical discussion, it really isn\u2019t making a dent in larger statistical terms.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34694\/Ransomware-Attacks-Have-Room-To-Grow-Verizon-Report-Shows.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[5497],"class_list":["post-52228","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-blogs","tag-headlinehackerdata-losscryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Attacks Have Room To Grow, Verizon Report Shows 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Attacks Have Room To Grow, Verizon Report Shows 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-06T15:59:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ransomware Attacks Have Room To Grow, Verizon Report Shows\",\"datePublished\":\"2023-06-06T15:59:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/\"},\"wordCount\":894,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75\",\"keywords\":[\"headline,hacker,data loss,cryptography\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/\",\"name\":\"Ransomware Attacks Have Room To Grow, Verizon Report Shows 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75\",\"datePublished\":\"2023-06-06T15:59:21+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75\",\"contentUrl\":\"https:\\\/\\\/www.scmagazine.com\\\/_next\\\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/ransomware-attacks-have-room-to-grow-verizon-report-shows\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,data loss,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerdata-losscryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Attacks Have Room To Grow, Verizon Report Shows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Attacks Have Room To Grow, Verizon Report Shows 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Attacks Have Room To Grow, Verizon Report Shows 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-06T15:59:21+00:00","og_image":[{"url":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ransomware Attacks Have Room To Grow, Verizon Report Shows","datePublished":"2023-06-06T15:59:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/"},"wordCount":894,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75","keywords":["headline,hacker,data loss,cryptography"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/","url":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/","name":"Ransomware Attacks Have Room To Grow, Verizon Report Shows 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75","datePublished":"2023-06-06T15:59:21+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/#primaryimage","url":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75","contentUrl":"https:\/\/www.scmagazine.com\/_next\/image?url=https%3A%2F%2Ffiles.scmagazine.com%2Fwp-content%2Fuploads%2F2023%2F06%2FScreenshot-2023-06-05-at-4.05.24-PM-1.png&amp;w=1920&amp;q=75"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-attacks-have-room-to-grow-verizon-report-shows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,data loss,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerdata-losscryptography\/"},{"@type":"ListItem","position":3,"name":"Ransomware Attacks Have Room To Grow, Verizon Report Shows"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52228"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52228\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}