Thursday, May 15, 2025
HomeCyber AttackRansomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

Published on

SIEM as a Service

Follow Us on Google News

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in ransomware attacks during 2024, driven largely by sophisticated exploitation of third-party vendor ecosystems.

As cybercriminals refine their tactics, third-party vendors have emerged as the predominant entry point for some of the most catastrophic breaches in recent history.

The report underscores how these vulnerabilities, often overlooked by organizations until disaster strikes, have triggered widespread disruptions across global supply chains, exposing the interconnected nature of modern cyber threats.

- Advertisement - Google News

Vendor Ecosystem Vulnerabilities Exposed

The data from 2024 paints a grim picture of how third-party breaches have become a linchpin for cybercriminals.

High-profile incidents such as the $75 million ransomware payout by Cencora and the colossal $5 billion global outage caused by a CrowdStrike-related incident demonstrate the cascading effects of vendor-centric attacks.

These breaches exploited weak links in vendor networks, leveraging unauthorized access, credential misuse, and unpatched software vulnerabilities to infiltrate systems.

The report details how ransomware, in particular, has evolved into a preferred weapon, with attackers targeting vendors to gain a foothold into larger supply chains, amplifying the impact of their malicious activities across multiple organizations simultaneously.

Industry-Specific Cyber Impacts

Certain sectors bore the brunt of these evolving threats, with healthcare, finance, and manufacturing identified as the most vulnerable industries.

In healthcare, sensitive patient data became a prime target, often accessed through compromised third-party service providers.

Financial institutions faced significant losses due to disrupted operations and ransomware demands, while manufacturing supply chains ground to a halt as attackers exploited vendor dependencies to paralyze production.

The Black Kite report emphasizes that these industries’ reliance on extensive vendor networks, while operationally efficient, creates a sprawling attack surface that cybercriminals are quick to exploit.

The ripple effects of a single breach in these sectors often extend far beyond the initial target, affecting customers, partners, and even entire economies.

This surge in ransomware through vendor ecosystems signals a paradigm shift in cyber warfare, where threats are no longer confined to an organization’s internal defenses.

The breaches of 2024 serve as a stark reminder that an organization’s security posture is only as strong as its weakest vendor.

Black Kite’s analysis provides data-driven insights into how these attacks unfold, revealing patterns of exploitation that include phishing, stolen credentials, and zero-day vulnerabilities in third-party software.

The report warns that without robust third-party risk management (TPRM) practices, companies remain perilously exposed to these advanced persistent threats.

To combat this escalating menace, the 2025 Third-Party Breach Report offers actionable strategies for organizations to fortify their defenses.

Recommendations include conducting thorough vendor security assessments, implementing continuous monitoring of third-party access points, and enforcing strict access controls to mitigate risks of credential misuse.

Additionally, organizations are urged to invest in incident response planning that accounts for supply chain dependencies, ensuring rapid containment of breaches before they cascade.

As cyber threats continue to evolve, the report serves as a critical wake-up call: securing your own walls is no longer enough-your vendors’ vulnerabilities are inextricably tied to your own risk profile. In 2025, proactive TPRM could be the difference between resilience and ruin.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...
OSZAR »