Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    How Boll & Branch leverages AI for operational and creative tasks

    While holdcos build ‘death stars of content,’ indie creative agencies take alternative routes

    Future of Marketing Briefing: AI’s branding problem is why marketers keep it off the label

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      How Polymarket Is Turning Bitcoin Volatility Into a Five-Minute Betting Market

      February 13, 2026

      Israel Indicts Two Over Secret Bets on Military Operations via Polymarket

      February 13, 2026

      Binance’s October 10 Defense at Consensus Hong Kong Falls Flat

      February 13, 2026

      Argentina Congress Strips Workers’ Right to Choose Digital Wallet Deposits

      February 13, 2026

      Monero Price Breakdown Begins? Dip Buyers Now Fight XMR’s Drop to $135

      February 13, 2026
    • Technology

      How Boll & Branch leverages AI for operational and creative tasks

      February 13, 2026

      While holdcos build ‘death stars of content,’ indie creative agencies take alternative routes

      February 13, 2026

      Future of Marketing Briefing: AI’s branding problem is why marketers keep it off the label

      February 13, 2026

      ‘A brand trip’: How the creator economy showed up at this year’s Super Bowl

      February 13, 2026

      From feeds to streets: How mega influencer Haley Baylee is diversifying beyond platform algorithms 

      February 13, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Known. Emerging. Unstoppable? Ransomware Attacks Still Evade Defenses
    Technology

    Known. Emerging. Unstoppable? Ransomware Attacks Still Evade Defenses

    TechAiVerseBy TechAiVerseSeptember 20, 2025No Comments7 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Known. Emerging. Unstoppable? Ransomware Attacks Still Evade Defenses
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Known. Emerging. Unstoppable? Ransomware Attacks Still Evade Defenses

    No, it’s not new or particularly exotic, but after years of attacks, ransomware continues to rank among the most destructive threats facing global organizations today. 

    Even with security teams pouring significant resources into prevention and detection efforts, attackers are still finding ways to bypass their defenses. Double extortion has become the default approach, with groups encrypting systems and stealing sensitive data for leverage.

    Some actors are now skipping the encryption step entirely, focusing only on data theft and extortion to avoid detection and streamline their efforts.

    Picus Security’s Blue Report 2025 pulls back the curtain to show just how easily cybersecurity defenses are slipping.

    Drawing on more than 160 million Breach and Attack Simulation (BAS) results, this year’s Blue Report saw overall prevention effectiveness fall from 69% in 2024 to 62% in 2025. The most alarming finding, however, was data exfiltration: prevention collapsed to just 3%, down from an already unacceptably low 9% last year. This leaves organizations exposed at exactly the stage ransomware groups exploit most.

    The takeaway is clear: assumptions don’t equal protection, and non-validated defenses will continue to fail when it matters most.

    Parsing the results, it quickly becomes clear that ransomware readiness can’t be assumed. It has to be proven. That means continuously validating your organization’s defenses against both long-known ransomware families as well as the emerging strains now active in the wild.

    Breach and Attack Simulation provides that proof, showing in real time whether protections stand or fail.

    Why Known and Emerging Ransomware Both Matter

    Unfortunately, with ransomware, familiarity all too often breeds false confidence. Security teams may believe they are protected against the big-name strains, but over time, if left alone, their defenses are steadily weakening as configurations drift and environments change.

    Ransomware operators, meanwhile, keep moving. Code is repackaged, loaders are updated, and evasion techniques are refined to keep attacks from being detected. Unfortunately, what worked against yesterday’s campaign often won’t work against today’s updated attempt.

    This year’s Blue Report shows this all too clearly. 

    Among the top 10 most underprevented ransomware strains, five were new or emerging, yet they bypassed defenses just as effectively as long-established names.

    • Known families still succeed. BlackByte (26%) remains the hardest ransomware to prevent for the second year in a row, exploiting public-facing apps and exfiltrating data before encryption. BabLock (34%) continues to pressure victims with double extortion, while Maori (41%) leverages fileless delivery and regional campaigns. Their persistence shows how easily defenses can erode in real-world environments.

    • Emerging ransomware strains hit just as hard. FAUST (44%), Valak (44%), and Magniber (45%) bypass controls through registry modifications, modular payloads, and staged execution. Nearly half of all attacks succeed, proving that new names quickly become effective in the wild.

    • Established names adapt. BlackKingdom (48%), Black Basta (49%), and Play (50%) evade defenses with stolen credentials, process hollowing, and remote service execution. Even after years of documentation, they remain difficult to stop.

    • Advanced ransomware operators remain resilient. AvosLocker achieved only a 52% prevention rate, exploiting privilege escalation and advanced obfuscation to compromise critical sectors despite specifically targeted defenses.

    These findings illustrate a critical point: the distinction between “known” and “emerging” ransomware is becoming less and less meaningful. When organizations fail to continuously test their defenses, both known and emerging strains can, and will eventually, evade their defenses.

    The Biggest Gaps in Defense

    Ransomware groups rarely depend on a single trick. Instead, they link multiple techniques across the kill chain and take advantage of whichever set of defenses is the weakest. 

    The Blue Report 2025 shows that persistent gaps in prevention and detection continue to give attackers exactly the opening they’ve been looking for.

    • Malware delivery: Prevention dropped to 60% (down from 71% in 2024). Despite being one of the oldest attack vectors, loaders and droppers are still bypassing static defenses.

    • Detection pipeline: Only 14% of attacks generated an alert, even though 54% were logged. This log-to-alert gap can easily leave defenders blind to both established families like BlackByte and newer variants such as FAUST and Magniber.

    • Data exfiltration: Effectiveness at preventing data exfiltration fell to just 3% in 2025 (down from 9% in 2024), the worst score of any attack vector. This weakness fuels the surge in double extortion attacks, where stolen data is leaked to increase pressure on victims.

    • Endpoint protection: Endpoints blocked 76% of attacks, but lateral movement and privilege escalation still worked in a quarter of cases. Families such as Black Basta and Play exploited these weaknesses to spread within compromised networks.

    Overall, ransomware thrives not because of cutting-edge techniques but because defenses continue to fail at critical points. 

    Five of the ten ransomware families highlighted in the report are long-established strains, yet they’re evading defenses as effectively as new or emerging threats. Attackers don’t need novel breakthroughs, only the ability to exploit what’s already broken.

    How BAS Strengthens Ransomware Readiness

    Picus Breach and Attack Simulation (BAS) helps close the gap between what organizations think their defenses can do and how they actually perform against ransomware. 

    Unlike traditional penetration testing, which is periodic and manual, BAS provides continuous, automated checks that show you where your defenses hold up against real attack behaviors, and where they don’t, in your unique and dynamic environment.

    Key BAS benefits include:

    • Continuous Ransomware Simulations. BAS safely simulates and emulates ransomware TTPs seen in the wild, from initial compromise through encryption and data theft, to show exactly where your defenses break down, across perimeter controls and endpoint security.

    • Validation Against Known and Emerging Families. Picus updates BAS threat libraries daily with intelligence on both established ransomware and new variants, letting organizations test against the same families seen in advisories and those first appearing in the wild.

    • Actionable Fixes. When attacks succeed in simulation, BAS provides practical remediation guidance, both vendor-specific and vendor-agnostic, so defenders know exactly what to adjust.

    • Evidence of Readiness. BAS generates measurable data on ransomware resilience, including prevention rates, detection coverage, and mitigation status, giving security teams tangible data they can show to leadership and auditors.

    Closing the Readiness Gap

    One of the most dangerous beliefs in ransomware readiness is assuming your defenses are working because they’ve worked up until this point, or because you’ve deployed the “right” products.

    The Blue Report 2025 shows how misleading both of these assumptions can be: nearly 50% of ransomware attempts bypassed defenses, and only 14% triggered alerts.

    BAS turns assumptions into proof by answering the questions that matter most:

    • Would your DLP system actually stop sensitive data from leaving your network?

    • If ransomware slips past endpoint controls, would your SIEM raise the alarm in time?

    • Are email gateways tuned well enough to block phishing payloads used by BabLock or Play?

    • Would newer families like FAUST or Magniber pass through unnoticed?

    With BAS, security teams don’t have to guess. They know.

    Conclusion

    In the end, the Blue Report 2025 makes one thing clear: ransomware thrives not because attackers reinvent the playbook, but because defenses are rarely tested in practice. The same security weaknesses resurface year after year, with prevention slipping, detection lagging, and data theft going almost entirely unchecked.

    Breach and Attack Simulation is the missing piece. By safely emulating end-to-end ransomware attacks, including initial compromise, credential access, lateral movement, and data theft, BAS pinpoints exactly where your defenses are and aren’t working and confirms whether fixes are holding. It shifts readiness from trusting and assuming to proving, giving defenders something they can measure, improve, and demonstrate every day.

    Ransomware readiness has moved way beyond asking “Are we protected?”. It’s about continuously demonstrating proof of resilience, and BAS is the only sustainable way to get there.

    Download the Blue Report 2025 to get the full picture, from ransomware and data exfiltration to industry-by-industry performance, regional disparities, MITRE ATT&CK tactic and technique gaps, and the vulnerabilities attackers are exploiting right now. See where defenses are slipping, and why continuous validation is the way forward.

    Sponsored and written by Picus Security.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleHow to share your Gemini Gems custom AI experts with all your friends
    Next Article Fortra warns of max severity flaw in GoAnywhere MFT’s License Servlet
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    How Boll & Branch leverages AI for operational and creative tasks

    February 13, 2026

    While holdcos build ‘death stars of content,’ indie creative agencies take alternative routes

    February 13, 2026

    Future of Marketing Briefing: AI’s branding problem is why marketers keep it off the label

    February 13, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025668 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025257 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025153 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Technology February 13, 2026

    How Boll & Branch leverages AI for operational and creative tasks

    How Boll & Branch leverages AI for operational and creative tasks By Gabriela Barkho  • …

    While holdcos build ‘death stars of content,’ indie creative agencies take alternative routes

    Future of Marketing Briefing: AI’s branding problem is why marketers keep it off the label

    ‘A brand trip’: How the creator economy showed up at this year’s Super Bowl

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    How Boll & Branch leverages AI for operational and creative tasks

    February 13, 20262 Views

    While holdcos build ‘death stars of content,’ indie creative agencies take alternative routes

    February 13, 20262 Views

    Future of Marketing Briefing: AI’s branding problem is why marketers keep it off the label

    February 13, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.