Ransomware vs Phishing
Ransomware
814
statistics from 83 sources
Phishing
331
statistics from 74 sources
Latest Ransomware
70% of global ransomware activity targets English-speaking countries.
In the second half of 2025, 40% of all ransomware attacks targeted US-based companies.
In the second half of 2025, ransomware attacks against Canada and the UK accounted for a combined 30% of attacks.
Scattered Spider accounted for 42.9% of all actor-related alerts in the second half of 2025.
44% of attacks in the Automotive and Smart Mobility ecosystem are ransomware-related, more than double the volume in 2024.
90% of ransomware incidents exploit firewalls through a CVE or a vulnerable account.
The fastest ransomware case observed, involving Akira ransomware, takes just three hours from breach to encryption.
96% of incidents involving lateral movement end with the release of ransomware.
Ransomware attacks against industrial organizations increased 64% year-over-year.
Organizations with comprehensive OT visibility detect and contain OT ransomware incidents in an average of 5 days, compared to the industry-wide average of 42 days.
The average dwell time for ransomware in OT environments is 42 days.
Manufacturing accounts for more than two-thirds of all ransomware victims.
The number of ransomware groups targeting industrial organizations increased 49% year-over-year to 119 groups, collectively impacting 3,300 organizations globally.
In 2025, 55% of Chief Information Security Officers (CISOs) in the US and UK reported that their organization experienced a cyberattack, ransomware infection, compromise, or data breach that rendered mobile, remote, or hybrid endpoint devices inoperable.
In 2025, 61% of CISOs indicated that their organization’s board and C-suite expect the cybersecurity group to guarantee zero breaches and ransomware incidents.
Latest Phishing
88% of internal audit leaders identify AI-powered phishing attacks as a top risk.
51% of organizations have faced sophisticated, personalized phishing emails powered by deepfake technology.
In Q4 2025, callback phishing increased from 3% to 18% of all phishing incidents, a 500% spike.
82% of malicious files have unique hashes that traditional pattern-matching fails to detect.
Credential phishing campaigns using .es domains increase 51 times year-over-year, with the .es top-level domain jumping from the 56th to the 3rd most-abused TLD.
76% of initial infection URLs in abalyzed phishing attacks were unique and have not appeared in other campaigns across Cofense's customer base.
Conversational attacks comprise 18% of all malicious emails.
In 2025, a malicious email attack occurs every 19 seconds, more than doubling from 2024’s pace of one every 42 seconds.
Abuse of legitimate remote access tools increased by 900% by volume.
Fifty percent of affected consumers cite immediate financial fraud as their primary fear, and 54 percent of consumers report an increase in targeted phishing attempts after a breach (2025)
Eighty-eight percent of consumers who received a data breach notice experience at least one negative consequence after a breach; 40 percent experience an increase in phishing or scam attempts; 49 percent experience an increase in spam emails or robocalls; 40 percent experience attempted takeover of an existing account (2025)
Clicks on phishing links decreased by 27%, from 119 per 10,000 users last year to 87 per 10,000 users this year.
87 out of every 10,000 users clicked on a phishing link each month in 2025.
77% of advanced email attacks failed SPF, DKIM, or DMARC authentication yet still reached inboxes.
Approximately 45% of advanced email attacks showed indicators of AI assistance, projected to rise to 75–95% within the next 18 months