Veeam’s 2025 Ransomware Report Reveals Persistent Threats and Gaps in Preparedness
Veeam’s 2025 Ransomware Trends and Proactive Strategies Report highlights the ongoing cybersecurity challenges faced by global organizations, with nearly 69% of surveyed companies including respondents from Australia experiencing ransomware attacks in the past year. While this marks a slight improvement from the previous year’s 75%, the report underscores that cyber threats remain pervasive and adaptive.
Despite progress in defenses, perceived preparedness often fails to match reality. Among Australian organizations, confidence in readiness dropped by 17% after an attack, with only 43% feeling fully prepared post-incident. Key vulnerabilities include over 70% lacking a detailed containment plan and fewer than 20% having a defined ransom payment process.
Veeam CEO Anand Eswaran noted that while organizations are strengthening defenses, 70% still fell victim to attacks, with only 10% recovering over 90% of their data and 57% recovering less than half. The report warns that ransomware will continue to evolve, with smaller, independent threat actors filling the void left by disrupted groups like LockBit and BlackCat.
A notable shift is the rise in data exfiltration attacks, where cybercriminals steal sensitive information rather than encrypting it. Additionally, ransom payments declined in 2024, with 36% of affected organizations refusing to pay, and 82% of those that did negotiating lower amounts. This trend aligns with new regulatory pressures discouraging ransom payments.
The report identifies collaboration between IT and security teams, law enforcement engagement, and robust backup strategies as critical to resilience. Successful organizations follow the 3-2-1-1-0 rule maintaining multiple, immutable, and malware-free backups while only 44% of response playbooks include backup verifications, and just 30% define a clear chain of command.
A key finding is the disconnect between perceived and actual preparedness: 69% of victims believed they were prepared before an attack, but confidence dropped by over 20% afterward, with CIOs reporting a 30% decline compared to 15% among CISOs. The report emphasizes the need for proactive strategies, cross-departmental alignment, and regular training to bridge these gaps.
Source: https://securitybrief.com.au/story/veeam-report-finds-69-of-firms-hit-by-ransomware-in-past-year
Veeam TPRM report: https://www.rankiteo.com/company/veeam-software
"id": "vee1771993446",
"linkid": "veeam-software",
"type": "Ransomware",
"date": "1/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'location': 'Global (with focus on Australia)',
'name': 'Global organizations (including Australian '
'companies)',
'type': 'Organizations'}],
'data_breach': {'data_encryption': True,
'data_exfiltration': True,
'personally_identifiable_information': True,
'sensitivity_of_data': 'High (personally identifiable '
'information likely included)',
'type_of_data_compromised': 'Sensitive information'},
'date_publicly_disclosed': '2025',
'description': 'Veeam’s 2025 Ransomware Trends and Proactive Strategies '
'Report highlights ongoing cybersecurity challenges, with '
'nearly 69% of surveyed companies (including Australian '
'organizations) experiencing ransomware attacks in the past '
'year. The report reveals gaps in preparedness, rising data '
'exfiltration attacks, and declining ransom payments due to '
'regulatory pressures.',
'impact': {'data_compromised': True,
'operational_impact': 'Significant data recovery challenges'},
'lessons_learned': 'Perceived preparedness often does not match reality. '
'Confidence in readiness drops significantly post-attack. '
'Gaps exist in containment plans, ransom payment '
'processes, and backup verifications. Cross-departmental '
'collaboration and law enforcement engagement are '
'critical.',
'motivation': ['Financial gain', 'Data exfiltration'],
'post_incident_analysis': {'corrective_actions': 'Implementing robust backup '
'strategies, defining clear '
'incident response '
'protocols, and enhancing '
'cross-departmental '
'collaboration',
'root_causes': 'Lack of detailed containment '
'plans, undefined ransom payment '
'processes, insufficient backup '
'verifications, and overconfidence '
'in preparedness'},
'ransomware': {'data_encryption': True,
'data_exfiltration': True,
'ransom_demanded': True,
'ransom_paid': '36% refused to pay; 82% of payers negotiated '
'lower amounts'},
'recommendations': ['Adopt the 3-2-1-1-0 backup rule',
'Define a clear chain of command in incident response '
'playbooks',
'Include backup verifications in response plans',
'Strengthen collaboration between IT and security teams',
'Engage with law enforcement',
'Conduct regular training and preparedness assessments'],
'references': [{'source': 'Veeam’s 2025 Ransomware Trends and Proactive '
'Strategies Report'}],
'regulatory_compliance': {'regulatory_notifications': 'New regulatory '
'pressures discouraging '
'ransom payments'},
'response': {'containment_measures': 'Over 70% lack a detailed containment '
'plan',
'law_enforcement_notified': 'Encouraged as part of resilience '
'strategies',
'recovery_measures': 'Only 10% recovered over 90% of data; 57% '
'recovered less than half',
'remediation_measures': 'Backup strategies (3-2-1-1-0 rule), '
'cross-departmental collaboration'},
'threat_actor': ['Smaller independent threat actors',
'Former groups like LockBit and BlackCat'],
'title': 'Veeam’s 2025 Ransomware Trends and Proactive Strategies Report',
'type': 'Ransomware'}