{"id":195,"date":"2025-02-26T19:36:16","date_gmt":"2025-02-26T19:36:16","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4293789"},"modified":"2025-02-26T19:36:16","modified_gmt":"2025-02-26T19:36:16","slug":"sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/","title":{"rendered":"SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250226-sonicwall-threat-report-2025.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>SonicWall\u2019s new 2025 Annual Threat Report highlights startling revelations, including that hackers exploited new vulnerabilities within two days 61% of the time, and that it takes the average organization between 120 and 150 days to apply a patch. In addition, the firm\u2019s researchers detected 210,258 \u201cnever-before-seen\u201d malware variants in 2024.<\/p>\n<p>Researchers reported that, in 2024, the average <a href=\"https:\/\/www.techrepublic.com\/article\/ransomware-cheat-sheet-everything-you-need-to-know\/\">ransomware<\/a> payment reached $850,700, with total related losses often exceeding $4.91 million when factoring in downtime and recovery costs. Global losses from business email compromise (BEC) attacks exceeded $2.95 billion in 2024.<\/p>\n<p><a href=\"https:\/\/www.sonicwall.com\/news\/threat-actors-are-moving-faster-than-ever-sonicwall-warns-smbs-and-highlights-the-importance-of-not-fighting-alone\" target=\"_blank\" rel=\"noopener\">SonicWall<\/a> also detailed increased cyberattacks impacting Latin America and the U.S. healthcare sector.<\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<h2><span class=\"ez-toc-section\" id=\"Ransomware_skyrocketed_in_Latin_America\"><\/span>Ransomware skyrocketed in Latin America<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Ransomware was up 259% in Latin America and up 8% in North America, the firm said.<\/p>\n<p>IoT attacks jumped 124%, encrypted threats climbed 93%, and malware spiked 8% year-over-year.<\/p>\n<p>Highly visible ransomware groups such as LockBit and BlackCat leveraged ransomware-as-a-service models to carry out widespread attacks and take advantage of critical vulnerabilities to infiltrate systems, SonicWall\u2019s 2025 Annual Threat Report noted.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"198M_American_patients_were_impacted_by_cyberattacks\"><\/span>198M+ American patients were impacted by cyberattacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The U.S. healthcare sector faced \u201cunprecedented challenges, with over 198 million American patients impacted by ransomware,\u2019\u2019 said Bob VanKirk, president and chief executive officer of SonicWall, in the report. He attributed the new malware variants to the rapid adoption of and advancements in AI tools.<\/p>\n<p>Double extortion was prolific throughout the year with triple extortion also rising, especially in healthcare. \u201cThis specific tactic involves encrypting an organization\u2019s most critical data while simultaneously threatening to release sensitive information unless demands are met,\u2019\u2019 the report stated. \u201cThis tactic is used to place even more pressure on ransomware victims to pay the threat actors as the criminals are essentially holding the data hostage in multiple different ways.\u201d<\/p>\n<p>In the case of triple extortion in the healthcare industry, threat actors will even go directly to patients and threaten to release their data unless that ransom is paid. The report noted that healthcare organizations \u201cwere also among the least prepared to handle the fallout.\u201d<\/p>\n<h2><span class=\"ez-toc-section\" id=\"SMBs_increasingly_need_to_bolster_their_defenses\"><\/span>SMBs increasingly need to bolster their defenses<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>VanKirk wrote, \u201cSonicWall\u2019s data indicates that threat actors are moving at unprecedented speeds.\u201d<\/p>\n<p>He noted that this especially puts pressure on small and medium-sized businesses and added \u201cthey should not go it alone in the fight against cybercrime.\u201d<\/p>\n<p>The report urged SMBs to use trusted managed service providers (MSPs) or managed security service providers (MSSPs) to bolster defenses. These partners can provide real-time monitoring, rapid patch deployment, zero-trust security models, and ongoing education, the report said.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Methodology\"><\/span>Methodology<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The report is based on perspectives from SonicWall\u2019s 24\/7 security operations center analysts and market insights from respected cybersecurity insurance providers, VanKirk said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SonicWall\u2019s new 2025 Annual Threat Report highlights startling revelations, including that hackers exploited new vulnerabilities within two days 61% of the time, and that it takes the average organization between 120 and 150 days to apply a patch. In addition, the firm\u2019s researchers detected 210,258 \u201cnever-before-seen\u201d malware variants in 2024. Researchers reported that, in 2024, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":196,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-195","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"SonicWall\u2019s new 2025 Annual Threat Report highlights startling revelations, including that hackers exploited new vulnerabilities within two days 61% of the time, and that it takes the average organization between 120 and 150 days to apply a patch. In addition, the firm\u2019s researchers detected 210,258 \u201cnever-before-seen\u201d malware variants in 2024. Researchers reported that, in 2024, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-26T19:36:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250226-sonicwall-threat-report-2025.jpg\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/\",\"name\":\"SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/02\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds.jpg\",\"datePublished\":\"2025-02-26T19:36:16+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/02\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/02\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds.jpg\",\"width\":1400,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/","og_locale":"en_US","og_type":"article","og_title":"SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d - TecnoArtesanos Tech Blog","og_description":"SonicWall\u2019s new 2025 Annual Threat Report highlights startling revelations, including that hackers exploited new vulnerabilities within two days 61% of the time, and that it takes the average organization between 120 and 150 days to apply a patch. In addition, the firm\u2019s researchers detected 210,258 \u201cnever-before-seen\u201d malware variants in 2024. Researchers reported that, in 2024, [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-02-26T19:36:16+00:00","og_image":[{"url":"https:\/\/assets.techrepublic.com\/uploads\/2025\/02\/tr_20250226-sonicwall-threat-report-2025.jpg","type":"","width":"","height":""}],"author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/","name":"SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/02\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds.jpg","datePublished":"2025-02-26T19:36:16+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/02\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/02\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds.jpg","width":1400,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/02\/26\/sonicwall-report-threat-actors-are-moving-at-unprecedented-speeds\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"SonicWall Report: \u201cThreat Actors are Moving at Unprecedented Speeds\u201d"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/195","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=195"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/195\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/196"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}