Gadget

Half of targeted companies opt to pay ransom

A new survey has found that nearly 50% of companies paid ransom to get their data back – the second highest rate of ransom payment for ransom demands in six years.

The revelation comes from the sixth annual State of Ransomware report, a vendor-agnostic survey of IT and cybersecurity leaders across 17 countries by global security solutions provider Sophos.

Despite the high percentage of companies that paid the ransom, over half – 53% – paid less than the original demand. In 71% of cases where the companies paid less, they did so through negotiation – either through their own negotiations or with help from a third party. In fact, while the median ransom demand dropped by a third between 2024 and 2025, the median ransom payment dropped by 50%, illustrating how companies are becoming more successful at minimising the impact of ransomware.

Overall, the median ransom payment was one million dollars, although the initial demand varied significantly depending on organisation size and revenue. The median ransom demand for companies with over $1-billion in revenue was five million dollars, while organisations with $250-million revenue or less, saw median ransom demands of less than $350,000.

For the third year in a row, exploited vulnerabilities were the number one technical root cause of attacks, while 40% of ransomware victims said adversaries took advantage of a security gap that they were not aware of – highlighting organisations’ ongoing struggle to see and secure their attack surface. Overall, 63% of organisations said resourcing issues were a factor in them falling victim to the attack, with lack of expertise named as the top operational cause in organisations with more than 3,000 people and lack of people/capacity most frequently cited by those with 251-500 employees.

“For many organisations, the chance of being compromised by ransomware actors is just a part of doing business in 2025. The good news is that, thanks to this increased awareness, many companies are arming themselves with resources to limit damage. This includes hiring incident responders who can not only lower ransom payments but also speed up recovery and even stop attacks in progress,” says Chester Wisniewski, director, field CISO, Sophos.

“Of course, ransomware can still be ‘cured’ by tackling the root causes of attacks: exploited vulnerabilities, lack of visibility into the attack surface, and too few resources. We’re seeing more companies recognise they need help and moving to Managed Detection and Response (MDR) services for defense. MDR coupled with proactive security strategies, such as multifactor authentication and patching, can go a long way in preventing ransomware from the start.”

Additional key findings from the State of Ransomware 2025 Report:

Sophos recommends the following best practices to help organisations defend against ransomware and other cyberattacks:

Data for the State of Ransomware 2025 report comes from a vendor-agnostic survey of 3,400 IT and cybersecurity leaders in organisations that were hit by ransomware in the previous year. Organisations surveyed ranged from 100 – 5,000 employees and across 17 countries. The survey was conducted between January and March 2025, and respondents were asked about their experience of ransomware over the previous 12 months. Sophos will be releasing additional industry findings throughout the year.

Download the full State of Ransomware 2025 report on Sophos.com.

Learn how MDR can neutralise attacks like ransomware in real-time by registering for the webinar Behind the Shield: Real-World Stories of Thwarted Ransomware Attacks on Sophos.com.

Learn more about

Exit mobile version