In the second half of 2025, more than two-thirds of ransomware attacks leveraged data theft, not encryption, as cybercriminals prioritized long-term leverage overIn the second half of 2025, more than two-thirds of ransomware attacks leveraged data theft, not encryption, as cybercriminals prioritized long-term leverage over

Resilience Cyber Claims Data Reveals The New Economics of Professionalized Cybercrime

2026/02/25 20:31
5 min read

In the second half of 2025, more than two-thirds of ransomware attacks leveraged data theft, not encryption, as cybercriminals prioritized long-term leverage over immediate disruption

SAN FRANCISCO, Feb. 25, 2026 /PRNewswire/ — New cyber insurance claims data from leading cyber risk company Resilience reveals a dramatic evolution in the economics of cybercrime. An analysis of claims across Resilience’s client portfolio in 2025 showcases a remarkable shift in how threat actors execute prolonged attacks on organizations, while painting an increasingly common picture of the material consequences of cyber incidents, both in their immediate aftermath and in the shockwaves that follow.

Based on claims data and research from Resilience’s Risk Operations Center (ROC), Resilience’s 2025 Cyber Risk Report details a particularly complex challenge for organizations—and provides a unique look into how they can best mitigate material loss. In 2025:

  • Extortion demands to suppress stolen data comprised less than half (49%) of all extortion claims in the first half of the year, then grew to nearly two-thirds (65%) in the second half. Across the entire year, data theft-only attacks accounted for more than half (57%) of all attacks, as hackers look to bypass organizations’ increasingly strong backup practices. 
  • Infostealers harvested more than 2 billion credentials and were frequently observed in victim organizations’ environments before ransomware attacks occurred, meaning that infostealer activity should be treated as a critical early warning signal requiring immediate action to prevent credential harvesting and prevent follow-on attacks.
  • Threat groups like Interlock continued to find victim organizations’ cyber insurance policies among stolen data to better calibrate their ransom demands—maximizing payouts while staying below coverage limits.
  • Vendor risk was the second-highest loss category across Resilience’s portfolio, representing nearly one-fifth (18%) of total losses. Threat actors are successfully leveraging password reset attacks and are increasingly infiltrating open-source code repositories that serve as the foundation for enterprise applications; this opens the door to an industry-wide cascade of short- and long-term disruption following the compromise of a critical vendor.

Taken together, the data points to a concerning new reality for organizations. Cyberattacks are more calculated, strategic, and well-planned; resulting losses can extend well beyond the moment they happen and accumulate over months and even years.

“Cyber risk is constantly changing. As cybercriminals shift their tactics, a new reality is setting in: the real risk is about more than a security incident’s immediate disruption, it’s about the long-tail aftershocks that follow,” said Vishaal “V8” Hariprasad, Co-Founder and CEO of Resilience. “Claims data gives us the best and most granular insight into the real-world costs of those shockwaves. Understanding the materiality of the full lifecycle of a cyber incident is the only way to meaningfully arm ourselves against advanced new tactics and grow more resilient to inevitable threats.”

Resilience’s report recommends that organizations work to meaningfully mitigate material losses by prioritizing investments in data loss prevention systems and zero-trust architecture, credential monitoring, vendor incident contingency plans, tabletop exercises, and comprehensive insurance coverage that reflects 2025’s severity levels rather than mere historical averages.

“Looking at the increasing professionalization of the threat landscape, it can be tempting to assume that there’s no recourse. But our latest findings give us incredibly useful insight into the incentives behind the incidents—and how we can best fight back,” said Judson Dressler, Head of Resilience’s Risk Operations Center (ROC). “For instance, to mitigate infostealer activity, our ROC team proactively hunts for stolen credentials on the dark web or new exploits or vulnerabilities that affect their environment and alerts our clients to these critical findings. That’s one example of what it looks like in practice to adjust to the reality that we’re facing an ‘everything, everywhere, all at once’ model of cyber risk.”

Resilience’s 2025 Cyber Risk Report leverages data from the company’s ROC and claims in their insurance portfolio to analyze trends in cybercrime and industry responses throughout the year. To read the full report, see here.

For more information about Resilience, visit www.cyberresilience.com or follow us on LinkedIn.

About Resilience
Resilience helps organizations become cyber resilient to material losses by staying ahead of bad actors. Founded by experts from across the highest tiers of the US military and intelligence communities – and built by prominent leaders and innovators from the cybersecurity, technology, and insurance industries – Resilience is the world’s first cyber risk company that offers risk quantification software, cybersecurity experts, and highly rated insurance in integrated solutions purpose-built for large and middle-market organizations.

Resilience is proud to be backed by leading technology investment firms, including General Catalyst, Lightspeed Venture Partners, Intact Ventures, Founders Fund, CRV, and Shield Capital. With headquarters in San Francisco, Resilience is globally dispersed, with teams in New York, Chicago, Los Angeles, Baltimore, Toronto, London, Milan, Madrid, Stockholm, Rotterdam and Dublin. Resilience offers insurance coverage through its licensed and appointed insurance agents and security services through its expert security team. The Resilience Solution is available through all broker partners to clients in the United States, the United Kingdom, Canada, and Europe.

Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/resilience-cyber-claims-data-reveals-the-new-economics-of-professionalized-cybercrime-302696505.html

SOURCE Resilience

Market Opportunity
CyberConnect Logo
CyberConnect Price(CYBER)
$0.5524
$0.5524$0.5524
-1.23%
USD
CyberConnect (CYBER) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
Bitcoin, Ethereum, XRP, Dogecoin Surge With Stocks, But Analyst Warns This Might Just Be A 'Relief Rally'

Bitcoin, Ethereum, XRP, Dogecoin Surge With Stocks, But Analyst Warns This Might Just Be A 'Relief Rally'

Leading cryptocurrencies jumped on Wednesday, though analysts view the uptick as a relief bounce rather than a momentum shift.read more
Share
Coinstats2026/02/26 10:04
The Chen Zhi case and the Zhao Changpeng case: The United States profited nearly $20 billion from them.

The Chen Zhi case and the Zhao Changpeng case: The United States profited nearly $20 billion from them.

Author: Yuan Hong , Global Times On February 26, a new report jointly released by the National Computer Virus Emergency Response Center of China and other departments
Share
PANews2026/02/26 11:18