Surprised, Not Surprised, Ransomware Attacks Have Ticked Up
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章内容,抓住主要信息。 文章主要讲的是勒索软件在2025年的持续增长情况。数据显示,今年到目前为止,勒索软件案件比去年增加了47%,达到6330起。第三季度就有1943起,增长了31%。美国公司占了57%,制造业也受到了影响。小中型企业是主要目标。 文章还提到,攻击者即使收到赎金也不一定会提供解密密钥,导致系统继续被锁。专家建议加强备份和恢复计划,以及投资于安全措施来减少攻击面。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖增长率、受影响的行业、攻击者的策略以及防御建议。 可能的结构是:先说勒索软件的增长情况和数据,然后提到受影响的行业和小中型企业为目标,接着说明攻击者的行为和防御措施。 最后检查字数是否符合要求,并确保语言简洁明了。 </think> 勒索软件在2025年持续增长,前三季度案件数达6,330起,较去年增长47%。第三季度美国公司占57%,制造业受创严重。尽管支付赎金,系统仍可能被锁定以索要更多赎金。专家建议加强备份和恢复计划以应对威胁。 2025-10-28 06:0:44 Author: securityboulevard.com(查看原文) 阅读量:7 收藏

Like it or not, ransomware has been a durable and formidable thorn in the side of business, government and defenders.  

And this year has proved no different, with the uptick in ransomware continuing in the third quarter of 2025. This year to date, ransomware cases have zoomed up 47% over the same period last year, according to data compiled by NordStellar. That amounted to a whopping 6,330 incidents. 

Cruise Con 2025

Just between July and September, the number of ransomware cases topped 1,943, representing a 31% increase over Q3 last year.  

U.S. companies were most frequently in the crosshairs, accounting for 57% of all cases. The manufacturing sector found itself to be targeted as well, making up 19.7% of the cases. 

Small and medium-sized businesses may want to sharpen their defenses because they continue to be primary targets for ransomware attacks. 

We all know that keeping up with ransomware gangs and their affiliates still looks a lot like a proverbial game of whack-a-mole but NordStellar found that Qilin and Akira, two established ransomware groups, were behind the bulk of attacks. That’s mirrored in research from Ontinue that found the 4,000 claimed ransomware breaches in H1 2025 were spearheaded by CL0P, AKIRA and QILIN. 

“The continued rise in incidents shows that ransomware is still effective and highly profitable, incentivizing cybercriminals to ramp up activity,” the trends showing, in short, ransomware threats are here to stay,” according to a NordStellar blog post. 

But NordStellar warns that “attackers won’t necessarily hand the decryption key to restore access even after the ransom is paid.” Often, the blog post said, “the systems or files will stay locked for the second ransom, leaving companies to suffer dire consequences—financial, reputational, and legal.” 

Brandon Williams, CTO at Conversant Group, says Conversant’s research “shows that 93% of cyber events involve targeting of backup repositories, and 80% of data thought to be immutable does not survive.” 

But he explains that “being able to recover, but having no place to recover, will result in longer outages and larger business interruption costs.” 

That will make it necessary to make “strategic breach recovery plans that integrate real-time threat detection, adaptive defenses and incident response protocols,” Williams says. “The most effective component of breach recovery plans is immutable backups, which are essential for fast recovery from breaches.” 

Their tamper-proof design, he says, “guarantees the integrity of stored data and reduces recovery time while allowing for rapid restoration without the risk of reintroducing infected or corrupted files.” 
James Maude, field CTO at BeyondTrust, says that to deal effectively with ransomware and other threats, it’s crucial to “invest in shifting left and think more about securing identities and access to reduce our attack surface and blast radius in the event of compromise, rather than just thinking post breach.”  

Ransomware and other threats, he says, “are only as effective as the privileges and access they manage to acquire so if we can implement better hygiene and focus on least privilege, then the threat actors are far less likely to ransomware us in the first place.”

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/10/surprised-not-surprised-ransomware-attacks-have-ticked-up/
如有侵权请联系:admin#unsafe.sh