Data Extortion Intrusions Reach Record High: Cybersecurity Threats on the Rise

data-24

Cyberattacks Involving Data Extortion See Significant Increase in 2025

The number of cyberattacks involving data extortion has skyrocketed, with a staggering 6,800 incidents reported in 2025, representing a 63% increase from the previous year. This surge is largely attributed to the escalating activities of notorious ransomware groups, including Qilin, Sp1d3r Hunters, and Clop.

Analysis by Intel 471

According to an analysis by Intel 471, over 50% of the organizations affected by these extortion attacks were based in the United States, with the majority of intrusions targeting consumer and industrial product vendors, consulting companies, and manufacturing firms. The report also revealed that initial access brokers primarily focused on compromising remote access portals, exploiting vulnerabilities to gain unauthorized access to sensitive data.

Exploitation of Security Bugs

Furthermore, the analysis found that over 40% of the 520 security bugs reported in 2025 were exploited by attackers. While artificial intelligence (AI) is expected to accelerate the active exploitation of discovered vulnerabilities, researchers at Intel 471 note that AI will not be the primary driver of intrusions due to its high cost and complexity.

Instead, AI is likely to be used in more targeted and sophisticated attacks, such as deepfake-driven impersonation, AI-generated voice fraud targeting high-value individuals, and amplified synthetic media in influence operations. As Intel 471 researchers predict, “We expect to see targeted escalation in areas where AI demonstrably increases the return on investment.”

Need for Enhanced Cybersecurity Measures

The significant increase in data extortion attacks highlights the need for organizations to prioritize their cybersecurity measures, including implementing robust vulnerability management practices and ensuring the secure configuration of remote access portals. As the threat landscape continues to evolve, it is essential for organizations to stay vigilant and proactive in their approach to cybersecurity.



About Author

en_USEnglish