CRD #17

On ransomware payments, MITRE ATT&CK techniques, OT security, and DDoS targeting.

CRD #17
Photo by Billy Huynh / Unsplash
The Cybersecurity Research Digest cuts through the marketing fluff and bias to bring you relevant and objective insights on cybersecurity stats and trends, all backed by empirical data.
The post features highlights from trustworthy research sources released between February 2-17, 2025, followed by a list of all monitored reports.

Positive signs from crypto transaction data: ransomware payments down

Annual ransomware payments total (Chainanalysis)

Analysis of cryptopayments shows a 35% year-over-year decline in total ransom payments in 2024.

Percent change in ransom payments from H1 to H2 by year (Chainanalysis)

The data shows that even though more ransomware events occurred in H2 2024 (measured by the number of victims listed on leak sites), fewer organizations – less than half – chose to pay.

Ransomware payments vs. data leak site victim disclosures (Chainanalysis)

These positive trends likely result from a combination of factors, including the effectiveness of international law enforcement efforts, improved organizational preparedness — such as enhanced backup strategies — and a broader shift in victim responses, with an increasing willingness to resist ransom demands.

Furthermore, the data from 2024 reveals that ransomware actors operated within three distinct tiers based on payment demands. Lower-tier groups typically received payments below $1,000, while a mid-tier cluster targeted victims with ransom demands around $10,000. At the highest level, more sophisticated actors demanded payments exceeding $100,000, with some cases surpassing $1 million. The data also indicates a growing prevalence of high-value ransom events, suggesting an increasing proportion of attacks involving demands above $1 million.

MITRE ATT&CK insights: top 12 techniques drive 93% of actions

An analysis of over one million malware samples collected between January and December 2024 revealed that 93% of malicious actions in 2024 leveraged the top ten MITRE ATT&CK techniques. This finding clearly reinforces the need for security teams to prioritize defenses against the most prevalent threats.

The analysis also showed a threefold surge in malware targeting credential stores, rising from 8% in 2023 to 25% in 2024, underscoring the increasing effectiveness and preference for credential theft among threat actors.

Other key findings included:

  • Modern malware continues to exhibit increasing sophistication, executing an average of 14 malicious actions and utilizing 12 ATT&CK techniques per sample.
  • Stealth techniques remain central to attacker strategies, with Process Injection (T1055) observed in 31% of samples, enabling malicious code to evade detection within legitimate processes.
  • The exploitation of native scripting tools, particularly Command and Scripting Interpreter (T1059), remains widespread, allowing attackers to leverage PowerShell and Bash.
  • Credential theft continues to drive lateral movement, with Credentials from Password Stores (T1555) appearing in 25% of malware samples as sttackers increasingly target password managers and cached login data to gain elevated access.

Old CVEs dominate OT security incidents

Research based on telemetry from Palo Alto Networks' OT security products shows that manufacturing remains the most targeted and compromised industry, accounting for nearly 90% of network-internal exploit attempts observed by the company.

The continued reliance on legacy systems in OT networks is a key enabler of these exploitations, with the research showing that over 60% of exploit triggers were linked to CVEs at least six years old.

The most prevalent exploitation method involved the use of remote services for initial access, representing 20% of observed incidents. Additionally, nearly 80% of malware detected by the company was classified as "unknown," suggesting that threat actors are consistently deploying novel variants.

DDoS attacks: gaming and financial services top targets

A global cloud service provider’s report confirms that gaming remains the most targeted industry for DDoS attacks, accounting for over one-third of incidents. Service disruptions are frequently used to manipulate online tournaments, while downtime directly impacts revenue, making gaming a prime target for ransomware actors increasingly using double or triple extortion tactics.

The report also highlights a surge in attacks on financial services, now comprising a quarter of incidents. Like gaming, the sector is highly sensitive to availability issues, making it attractive for disruption-based extortion schemes.

Reports monitored: 4-17 February

To take a deeper dive in the topics most relevant for you, find below a list of all the monitored research reports (31) that were published during the observed period.

Title Organisation(s) Topic(s)
OT Security Insights Palo Alto Networks / Siemens OT security
The Global InfoSec / Cybersecurity Salary Index for 2025 isecjobs salaries
Q4 and Full-Year 2024 Cyber Threat Report Nuspire threat intel
Red Report™ 2025 Credentials at Risk: Infostealer 3X Leap in 2024 Picus Labs threat intel / credentials
2025 LevelBlue Threat Trends Report, Edition One LevelBlue threat intel
The Chainalysis 2025 Crypto Crime Report Chainanalysis crytpo crime
2025 ThreatDown State of Malware Malwarebytes malware / threat intel
Modern Heist Bank Report 2025 Contract Security banking / threat intel
State of CPS Security: OT Exposures 2025 Claroty OT security
Cybersecure Report Clever education / schools / US
Cyber security longitudinal survey - wave four technical report UK Department for Science, Innovation and Technology (DSIT) UK / businesses / charities
Over half of UK financial services institutions have suffered at least one third-party supply chain attack in 2024 Orange Cyberdefense UK / financial services / DORA
2025 Fortra State of Cybersecurity Survey Fortra risk perceptions
Unlock Regulatory Compliance With DORA, NIS2, and the EU AI Act AuditBoard DORA
Fraud in the Cyber Era: 2025 Fraud Trends & Insights Trustpair fraud / US
Cloud Risk Exposure Impact Report ZEST Security cloud security
Second Annual Generative AI Study Report: Business Rewards vs. Security Risks ISMG et al. GenAI
From Payrolls to Patents: The Spectrum of Data Leaked into GenAI harmonic GenAI / sensitive data
Gcore Radar: DDoS Attack Trends Q3-Q4 2024 Gcore DDoS
10th February – Threat Intelligence Report Check Point Reserach general threat intel
Cyber Threat Intelligence Review of December 2024 NCC Group general threat intel
The state of third-party access in cybersecurity Imprivata / Ponemon Institute 3rd party risk
Unlock the Resilience Factor Zscaler resilience / general
CYBER360 REPORT Everfox threat detection
Q4/2024 Gen Threat Report Gen consumer / individual
Cloud and threat report: 2025 netskope cloud
Acronis Cyberthreats Report, H2 2024: The rise of AI-driven threats Acronis general threat intel / endpoint data
XDR roundup 2024: Ransomware rises fourfold in a year of complex threats Barracuda Networks threat intel / endpoint data
17th February – Threat Intelligence Report Check Point general threat intel
January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate Check Point malware / threat intel
Cybercrime: A Multifaceted National Security Threat Google Threat Intelligence Group cybercrime / threat intel

About

evisec's Cybersecurity Research Digest provides security leaders verified strategic insights via a carefully curated weekly summary of evidence-led, unbiased and objective cybersecurity research publications. Read more about our service here.


✉️ Suggestions or want to collaborate? Get in touch via LinkedIn or email (henry@evisec.xyz)