Megan Crouse
2025-04-28 14:30:00
www.techrepublic.com
Cyberattacks through third parties are on the rise, according to the 2025 Verizon Data Breach Investigations Report. And, the percentage of VPNs and edge devices in attacks classified as exploitation of vulnerabilities grew nearly eightfold compared to the 3% instance rate in the previous report.
Verizon studied 12,195 data breaches out of 22,052 real-world security incidents collected between Nov. 1, 2023 to Oct. 31, 2024, from more than 100 data contributors globally.
Exploitation of vulnerabilities increased
Exploited vulnerabilities increased by 35% and represented 20% of all initial access vectors. The most common attack vector remains credential abuse (about 22%), according to the 18th annual report. The exploitation of vulnerabilities (about 20%) and phishing (about 16%) follow.
“Organizations worked very hard to patch those edge device vulnerabilities, but our analysis showed only about 54% of those were fully remediated throughout the year, and it took a median of 32 days to accomplish,” report authors C. David Hylender, Philippe Langlois, Alex Pinto, and Suzanne Widup wrote.
“It’s pretty clear that VPN technologies should not be readily available to anyone to access,” said Lawrence Pingree, vice president of Dispersive and former Gartner cybersecurity lead, in a comment to TechRepublic. “This is one of the fundamental problems with the design of VPN technology. Eliminating the infrastructure VPN attack surface should be of crucial importance to enterprises, given that it’s often an overlooked aspect of security. Moving off legacy VPNs and firewalls isn’t easy—but it’s worth it.”
Fewer organizations paid ransoms than the previous year
Ransomware attacks increased by 37% in terms of its presence in breaches compared to last year, but on the other hand, ransom payments decreased. The median amount was $115,000, down from $150,000 the previous year. This trend suggests that more organizations are refusing to pay ransoms, with 64% of surveyed victim organizations choosing not to pay.
The decrease might also reflect how ransomware actors often attack smaller organizations, with 88% of ransomware-related breaches involving SMBs compared to ransomware being a component of 39% of total breaches.
SEE: In this TechRepublic exclusive, reporter Fiona Jackson details how new ransomware attacks are getting more personal as hackers ‘apply psychological pressure’
“Glass-half-full types can celebrate the rise in the number of victim organizations that did not pay ransoms with 64% not paying vs 50% two years ago. The glass-half empty personas will see in the DBIR that organizations that don’t have the proper IT and cybersecurity maturity — often the SMB sized organizations — are paying the price for their size with ransomware being present in 88% of breaches,” said Craig Robinson, research vice president of security services at IDC, in a press release.
Ransomware was present in 44% of all breaches reviewed by the Verizon team, representing a 32% increase from the previous year.
Third-party risks could stem from Software-as-a-Service or BYOD
The importance and risk of third-party relationships were key in this year’s report. The number of breaches involving a third party jumped from 15% to 30%. The Verizon team pointed out that the attackers in the Snowflake breach in April 2024 accessed the platform through stolen credentials.
“Much ink has been spilled over the Shared Responsibility Model, so we definitely won’t go into all that, but it is worth understanding that when you are working with a third party, you have to consider their security limitations as well as your own,” the authors wrote.
Software-as-a-Service (SaaS) providers can also be a source of third-party credential leaks. Stolen credentials and BYOD policies can significantly impact third-party risks. The report found that 30% of compromised systems were enterprise-licensed devices, while 46% were non-managed devices that held both business and personal credentials. The report lacked precise insight into those devices, but attributed them to either a BYOD policy or the use of enterprise-owned devices for personal activities.
“The DBIR’s findings underscore the importance of a multi-layered defense strategy,” said Chris Novak, vice president of global cybersecurity solutions at Verizon Business. “Businesses need to invest in robust security measures, including strong password policies, timely patching of vulnerabilities, and comprehensive security awareness training for employees.”
SURVEY: Is your software supply chain secure? Calling all security savants to share your experiences, tips, and insights with the community on our sister site DZone. Take this security survey now!
Keep your entertainment at your fingertips with the Amazon Fire TV Stick 4K! Enjoy streaming in 4K Ultra HD with access to top services like Netflix, Prime Video, Disney+, and more. With an easy-to-use interface and voice remote, it’s the ultimate streaming device, now at only $21.99 — that’s 56% off!
With a 4.7/5-star rating from 43,582 reviews and 10K+ bought in the past month, it’s a top choice for home entertainment! Buy Now for $21.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.