Discussion – 

0

Discussion – 

0

Ransomware Payments Hit Historic Lows — But Attackers Are Getting Smarter

In a rare bright spot for defenders, ransomware and extortion groups are experiencing their own financial squeeze. According to new reporting from Help Net Security, only 23% of victims paid ransom demands in Q3 2025, and for data-theft-only extortion attacks, that number fell to just 19%.

Coveware notes this decline is proof that prevention, coordinated law enforcement pressure, and improved incident response are making a measurable impact:

“Each avoided payment constricts cyber attackers of oxygen (i.e., Bitcoin),” the firm wrote.

But success brings unintended consequences.
As payments shrink, attackers are becoming more targeted, more creative, and more willing to invest heavily in gaining initial access. The ransomware economy isn’t collapsing — it’s evolving, and not in ways that favor unprepared organizations.

Still, Carson & SAINT’s perspective is clear: lower payment rates do not equal lower risk. They signal a pivot to more aggressive tactics.


A Divided Threat Landscape: Mid-Market vs. Large Enterprise

Ransomware-as-a-Service (RaaS) groups and independent extortion operators are splitting into two strategies:

1. Mid-Market Attackers (e.g., Akira): Volume Over Value

Groups like Akira aim for mid-size companies, requesting smaller ransom amounts but keeping payment rates slightly above average.
Their model depends on:

  • High-volume targeting

  • Short dwell times

  • Lower ransom expectations

This tier remains highly opportunistic and agile.

2. High-End Attackers: Focusing on Enterprise Targets

Other threat actors target only large enterprises capable of paying seven- or eight-figure ransoms. But Coveware reports these efforts are now “largely unfruitful” because major organizations increasingly understand that:

“Paying to suppress the proliferation of stolen data has de minimis to zero utility.”

As a result, attackers pursuing large enterprises must spend more, plan more, and innovate more—leading to far more sophisticated intrusion tactics.


Initial Access: How Attackers Are Getting In Now

As revenue tightens, threat actors are abandoning simplistic smash-and-grab tactics and investing in multi-stage social engineering, insider access, and remote compromise.

Insider Threats and Bribery Surge

A major trend in 2025: attackers directly contacting employees and offering money or cryptocurrency for:

  • Credentials

  • Remote access

  • MFA approval

This bypasses technical controls entirely and exposes weaknesses in insider threat programs.

Helpdesk Social Engineering Goes Mainstream

What started with Scattered Spider is now widespread.
Attackers:

  • Call helpdesks

  • Impersonate employees

  • Persuade technicians to reset passwords or approve new devices

This tactic exploits process gaps more than technology gaps.

Callback Phishing Becomes Standard Playbook

Fake invoices, voicemail alerts, or “support messages” direct victims to call the attacker — enabling:

  • Device enrollment

  • Credential harvesting

  • Remote access installation

Callback phishing has moved from niche to baseline intrusion technique.

Remote Access Compromise Remains the #1 Entry Point

Coveware reports that over half of all ransomware/extortion incidents last quarter originated from remote access issues:

  • VPN exposure

  • Cloud gateway weaknesses

  • SaaS misconfigurations

The Hidden Risk: Configuration Debt

Even organizations with strong patching programs remain vulnerable because of forgotten, aging, or misaligned configurations — including:

  • Old local accounts

  • Unrotated credentials

  • Dormant OAuth tokens

Attackers now routinely search for — and exploit — this configuration debt.

Vulnerability Exploitation Still Occurs, But Mostly Old Bugs

Threat actors continue exploiting network appliances and enterprise software — but overwhelmingly through known, unpatched vulnerabilities, reflecting gaps in vulnerability risk management programs and patch prioritization.


Once Inside: Data Exfiltration Is the New Ransom

Coveware notes that data theft is now “almost guaranteed” in ransomware/extortion events — encryption optional.

Why?
Because data exposure creates faster, more predictable pressure:

  • Regulatory scrutiny

  • Customer backlash

  • Reputational harm

  • Contractual violations

Attackers know that even if organizations won’t pay to recover systems, some may pay (or feel pressured) to contain fallout.

Reconnaissance Before Exploitation

Most groups now conduct methodical reconnaissance before stealing data:

  • Privilege enumeration

  • Sensitive folder mapping

  • Identifying high-value systems

Because this activity mimics normal IT administration, organizations must rely on behavioral monitoring to detect it.

Lateral Movement: Still RDP, SSH, PSExec — Still Effective

Lateral movement techniques remain unchanged, but better monitoring and anomaly detection is needed to detect them quickly.


What Organizations Must Prioritize Now

Carson & SAINT recommends five immediate focus areas to reduce exposure to next-generation ransomware threats.

1. Harden Identity and Access Governance

  • Strengthen helpdesk authentication workflows

  • Enforce least privilege

  • Tighten VPN/MFA policies

  • Monitor session activity across cloud and SaaS

Identity is the new perimeter — and attackers know it.

2. Eliminate Configuration Debt

  • Audit credentials and legacy accounts

  • Rotate OAuth tokens

  • Remove unused integrations

  • Reassess remote access policies

Most breaches Coveware observed involve misconfigurations, not exploits.

3. Mature Insider Threat Programs

  • Train staff on bribery/red flag behaviors

  • Deploy user behavior analytics

  • Establish reporting paths for suspicious contact

Insiders — willing or unwitting — are now one of the most cost-effective access paths for attackers.

4. Strengthen Detection of Reconnaissance & Lateral Movement

  • Monitor for privilege mapping and account enumeration

  • Flag abnormal RDP, SSH, and PSExec behaviors

  • Use UEBA solutions to detect subtle anomalies

Organizations that detect reconnaissance early dramatically reduce breach impact.

5. Modernize Vulnerability Risk Management (VRM)

Your VRM program must do more than tally CVEs — it must prioritize exploitability, identity weaknesses, and configuration risks.

Carson & SAINT’s Vulnerability Risk Management approach focuses on:

  • Continuous scanning of remote access systems

  • Prioritizing vulnerabilities attackers actually exploit

  • Exposing identity and configuration weaknesses early

This is how organizations stay ahead of attacker innovation.


Progress Is Real — But So Is the Evolution of the Threat

The drop in ransom payments is a legitimate win for defenders—but it does not mean ransomware is fading. Instead, attackers are:

  • Becoming more targeted

  • Using more human-centric access methods

  • Exploiting identity and configuration weaknesses

  • Prioritizing data theft over encryption

So, organizations that mistake “fewer payments” for “less danger” risk becoming the next headline.

Carson & SAINT helps enterprises modernize identity security, reduce configuration debt, and build resilience against this next era of ransomware and extortion.

Let’s strengthen your defenses before attackers adapt again.
Contact us to assess your risk.

Tags:

Quinn Hopkins, Senior Marketing Manager

Quinn Hopkins serves as head of the Marketing Department. He graduated with Bachelor of Science in Marketing at Penn State University in 2020. With a comprehensive skill set encompassing digital marketing, branding, sales processes, SEO, e-commerce, email marketing, and trade shows, Quinn orchestrates a wide range of initiatives to elevate the company’s brand presence and drive customer acquisition. He plays a pivotal role in shaping the company’s identity and fostering customer loyalty. From spearheading innovative digital marketing campaigns to orchestrating impactful brand appearances, Quinn’s dedication to excellence propels the company forward in the competitive cybersecurity landscape, positioning us as a trusted leader in the industry.

0 Comments

You May Also Like

Loading...
My cart
Your cart is empty.

Looks like you haven't made a choice yet.