• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

Verizon Report Suggests Ransomware Is Getting Worse

Ransomware is up 13%, a larger rise than the past five years combined, according to Verizon's Data Breach Investigations Report.

May 25, 2022 Zachary Comeau Leave a Comment

Royal Ransomware
stock.adobe.com

Despite a global focus on cybersecurity, increased pressure from law enforcement on cybercrime groups and a software industry that continues to rapidly innovate to solve security issues, ransomware continues its upward trajectory, rising as much in one year as it has over the past five years combined, according to Verizon’s 2022 Data Breach Investigations Report.

According to Verizon, ransomware continues to be a financial lifeline for cybercriminals and organized groups, with the extortion method now present in nearly 70% of all malware breaches this year, with such attacks increasing by 13% in a single year.

The report also details how ransomware groups are gaining initial access in the first place, with credential stealing, phishing, exploiting vulnerabilities and botnets—in that order—continuing to provide hackers access to victim environments to deploy ransomware.

Verizon’s report also found that desktop sharing software was involved in 40% of ransomware incidents, suggesting that organizations need to do a much better job of securing those tools. Another 35% involved the use of email, which has long been known as a tool easily compromised by malicious threat actors.

“There are a variety of different tools the threat actor can use once they are inside your network, but locking down your external-facing infrastructure, especially RDP and Emails, can go a long way toward protecting your organization against ransomware,” the report says.

Those four paths pervade all areas of Verizon’s Data Breach Investigation Report, and every organization needs a plan to handle them all, the company urges.

Credential stealing and social engineering as initial access vectors are rampant, indicating that account compromise continues to be a massive target for cybercriminals and nation state actors.

Also highlighted in the report is the devastating effect a supply chain breach can have on the IT ecosystem. We only need to look at a few recent examples to see just how dangerous these compromises can be, with the SolarWinds breach, Kaseya ransomware deployment and Log4Shell still fresh in the minds of many IT professionals.

The report found that compromising the right partner is a force multiplier for threat actors, with many nation-state groups skipping the breach entirely and simply maintaining access to leverage it in the future.

The report found that supply chain partners accounted for the vector in 62% of system intrusion incidents, which Verizon defines as complex attacks that leverage malware and/or hacking to achieve objectives. This outranks software updates, desktop sharing software, email, web apps, backdoors, VPNs and all other action vectors.

Other notable findings include that about 80% of breaches are attributed to organized crime, with external network attackers about four times more likely to be the source of data breaches than internal actors.

Verizon Chairman and CEO Hans Vestberg said in a statement that the past few years have exposed a number of critical security issues, including the need to adapt to the rapidly changing cybersecurity climate.

“As we continue to accelerate toward an increasingly digitized world, effective technological solutions, strong security frameworks, and an increased focus on education will all play their part in ensuring that businesses remain secure, and customers protected,” Vestberg said.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, ransomware, Verizon

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.