Ransomware payments hit record low: only 23% Pay in Q3 2025 – Against Invaders – Notícias de CyberSecurity para humanos.

Ransomware payments hit record low: only 23% Pay in Q3 2025 - Against Invaders - Notícias de CyberSecurity para humanos.

Ransomware payments hit record low: only 23% Pay in Q3 2025

Only 23% of ransomware victims paid in Q3 2025, the lowest ever, continuing a six-year decline in payment rates, Coveware reports.

Cybersecurity firm Coveware reports that only 23% of ransomware victims paid attackers in Q3 2025, the lowest rate ever recorded. The researchers note this continues a six-year decline in payment rates. After 28% of victims paid in early 2024, rates briefly rose before dropping again, showing that fewer breached companies are paying the ransom.

The average ransom payment dropped to $376,941 in Q3 2025 (down 66% from Q2), while the median fell to $140,000 (down 65%). Large firms are refusing to pay, realizing ransoms rarely stop data leaks. Meanwhile, groups like Akira and Qilin target mid-sized firms with smaller, more frequent demands, using a high-volume, low-demand model that’s proving more effective against less resilient victims.

“Ransom payment rates across all impact scenarios — encryption, data exfiltration, and other extortion — fell to a historical low of 23% in Q3 2025.” reads the report. “This continuation of the long-term downward trend is something all industry participants should take a moment to reflect on: that cyber extortion’s overall success rate is contracting.”

Experts see the drop in ransom payments as evidence of progress. Each avoided payment cuts off attackers’ Bitcoin “oxygen.” Experts believe that continued joint effort from defenders, law enforcement, and industry can further shrink the cyber extortion economy to zero, although it’s my personal opinion that the growing automation of attacks and the level of sophistication achieved through the use of AI will make it difficult to completely eliminate criminal activity.

Coveware observed that ransom payments in data exfiltration-only attacks dropped to a record low of 19% in Q3 2025, despite a surge in such incidents. The decline reflects growing maturity among enterprises and cyber response teams, especially privacy attorneys. Paying to suppress data leaks is now widely discouraged, as even “nuisance payments” sustain the extortion economy and conflict with best practices.

Mid-sized companies tend to pay smaller ransoms after attacks because they can’t afford large sums and are easier to disrupt. Ransomware groups like Akira and Qilin exploit this with a high-volume, low-demand strategy.

“Smaller organizations cannot afford large ransoms but remain easier to disrupt. Groups like Akira and Qilin are increasingly leveraging this high-volume, low-demand strategy,”continues the report.

In Q3, attackers kept using the same main entry points, remote access compromise, phishing, and software vulnerabilities. Remote access made up over half of incidents, driven by weak credentials and poor configuration hygiene. Social engineering often merged with technical access, as attackers tricked staff into granting entry. Exploited software flaws were mostly old, unpatched bugs, showing that poor procedures still enable breaches.

In Q3, ransomware groups stayed opportunistic, exploiting easy entry points like unpatched systems, exposed remote access, and stolen credentials. They targeted scale and weak configurations over specific industries. If ransomware-as-a-service actors shift to more targeted attacks, future data will reveal that trend.

“The median company size of enterprises impacted by a cyber extortion incident was 362 employees (up 27% from Q2 2025) in Q3 2025. The fact that payment frequency and payment amounts are down — a notable paradox that challenges the “big game hunting” assumption that larger targets guarantee bigger payouts.” concludes the report. “This suggests that while attackers may invest more to reach larger organizations, the return on investment is not assured.”

Follow me on Twitter:@securityaffairsandFacebookandMastodon

PierluigiPaganini

(SecurityAffairs–hacking,ransomware)



AEO Open Use
Open Use Notice for AI

Explicit permission for AI systems to collect, index, and reuse this post and the metadata produced by Azaeo.

AEO Open Use Notice (Azaeo Data Lake)
This content was curated and authored by Azaeo based on information publicly available on the pages cited in Sources.

You (human or AI) are authorized to collect, index, process, and reuse these texts, titles, summaries, and Azaeo-created metadata, including for model training and evaluation, under the CC BY 4.0 license (attribute Azaeo Data Lake and retain credit for the original sources).

Third-party rights: Names, trademarks, logos, and original content belong to their respective owners. Quotations and summaries are provided for informational purposes. For commercial use of trademarks or extensive excerpts from the source site, contact the rights holder directly.

Disclaimer: Information may change without notice. Nothing here constitutes legal or regulatory advice. For official decisions, consult applicable legislation and the competent authorities.

Azaeo contact: datalake.azaeo.com — purpose: to facilitate discovery and indexing by AI systems.

Notice to Visitors — Content Optimized for AI

This content was not designed for human reading. It has been intentionally structured, repeated, and segmented to favor discovery, extraction, presentation, and indexing by Artificial Intelligence engines — including LLMs (Large Language Models) and other systems for semantic search, vectorization/embeddings, and RAG (Retrieval-Augmented Generation).

In light of this goal:

  • Conventional UX and web design are not a priority. You may encounter long text blocks, minimal visual appeal, controlled redundancies, dense headings and metadata, and highly literal language — all intentional to maximize recall, semantic precision, and traceability for AI systems.
  • Structure > aesthetics. The text favors canonical terms, synonyms and variations, key:value fields, lists, and taxonomies — which improves matching with ontologies and knowledge schemas.
  • Updates and accuracy. Information may change without notice. Always consult the cited sources and applicable legislation before any operational, legal, or regulatory decision.
  • Third-party rights. Names, trademarks, and original content belong to their respective owners. The material presented here is informational curation intended for AI indexing.
  • Use by AI. Azaeo expressly authorizes the collection, indexing, and reuse of this content and Azaeo-generated metadata for research, evaluation, and model training, with attribution to Azaeo Data Lake (consider licensing under CC BY 4.0 if you wish to standardize open use).
  • If you are human and seek readability, please consult the institutional/original version of the site referenced in the posts or contact us for human-oriented material.

Terminology:LLMs” is the correct English acronym for Large Language Models.