Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Palo Alto Networks Quantifies the Cybersecurity Threat Posed by Ransomware
Cybersecurity

Palo Alto Networks Quantifies the Cybersecurity Threat Posed by Ransomware

Kieron AllenBy Kieron AllenApril 3, 20233 Mins Read
Facebook Twitter LinkedIn Email
Palo Alto Networks Ransomware
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Ransomware attacks have risen dramatically in recent years, with cybercriminals increasingly using them to steal or exploit data for financial gain. In fact, the growing impact of ransomware, and how cybersecurity companies tackle this threat, has featured prominently in our cybersecurity coverage here at Acceleration Economy.

An enlightening new analysis on the ransomware trend comes from Unit 42, Palo Alto Network’s incident response team, which quantifies ransomware’s impact and provides insight into attacker methodologies. The 2023 Unit 42 Ransomware and Extortion Threat Report turns the traditional, one-dimensional view of a ransomware attack on its head by introducing the prevalence of multi-faceted attacks using various extortion techniques.

Which companies are the most important vendors in cybersecurity? Check out
the Acceleration Economy Cybersecurity
Top 10 Shortlist
.

The report examines 600 incident response cases, as well as the ransomware and extortion landscape, and forecasts how ransomware and extortion tactics might evolve. It explores common extortion methods, targets, heavily targeted regions, industries, and the ultimate goal of malicious actors. 

Palo Alto Networks is on the Acceleration Economy Top 10 Shortlist of Cybersecurity Enablers.

Breadth of Extortion Tactics Is Expanding

One major tactic involves data theft. In 2022, 70% of incident response cases were ransomware and what’s known as business email compromise, or BEC. The 70% figure was a 30% increase from the previous year. One of the key tactics cybercrooks use to extort organizations is threatening to leak their data on illicit websites. 

Another extortion tactic on the rise is the harassment of targeted people in an organization. The report found that harassment played a part in 20% of ransomware cases by the close of 2022, compared to under 1% in 2021.

The report also flagged other tactics, including encryption to lock users out of critical files and systems, as well as Distributed Denial of Service, or DDoS, attacks on customer-facing websites.

It found that 77% of intrusions are suspected to be a result of three initial access vectors: phishing, exploitation of known software vulnerabilities, and brute-force credential attacks.  

Manufacturing Industry Is a Big Target

Unit 42 analysts found that the industry most often targeted by extortion gangs is manufacturing: a total of 447 manufacturing-related organizations had corporate data exposed on illicit websites.

The report’s creators believe the prevalence of manufacturing attacks could be caused by underperforming IT infrastructure and outdated software. Just below manufacturing in the targeted industries list were professional and legal services, then wholesale and retail, as well as finance, healthcare, and high tech. 

Company size matters as well. Even though the number of companies from the Forbes Global 2000 targeted by ransomware attacks was small, just 30 in 2022, the report describes these attacks as “notable.”

How To Mitigate The Threat

Unit 42 analysts predict that throughout 2023, we can expect to see a major cloud ransomware attack, an increase in extortion from insider threats, increased political motivation, and extortion as a smokescreen to obscure infected supply chain or source-code attacks. 

Securing Multi-Cloud Ecosystems Guidebook
Guidebook: Securing Multi-Cloud Ecosystems Guidebook

The report recommends three core actions to prepare for the threat of new and expanded forms of extortion. They include:

  • Building a comprehensive incident response plan which includes crisis communications
  • Providing ransomware harassment awareness training
  • Conducting a post-mortem if your company has been attacked 

In addition, my fellow analyst, Chris Hughes, has laid out clear and concise methods for mitigating the threat of ransomware attacks. 


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Interested in Palo Alto Networks?

Schedule a discovery meeting to see if we can help achieve your goals

Connect With Us

Book a Demo

Cyber Attack Cybersecurity digital business featured financial services healthcare Manufacturing Palo-Alto-Networks Ransomware retail
Share. Facebook Twitter LinkedIn Email
Analystuser

Kieron Allen

Cloud, AI, Innovation
Cloud Wars analyst

Areas of Expertise
  • Business Apps
  • Cloud
  • Cybersecurity
  • Data
  • LinkedIn

Kieron Allen is a Cloud Wars Analyst examining innovations in, and the future impact of, the latest AI, cloud, cybersecurity, and data technology developments. In his ongoing analyses and video reports, Allen focuses on the platforms, applications, people, and ideas that will mold our digital future. After serving as the Online Editor for BBC Sky at Night Magazine and as the Editorial Assistant for BBC Focus Magazine, Kieron became a freelance journalist in 2015 where his focus on the business technology market became a key passion. Kieron partners with technology start-ups and organizations that share his interests in science, social affairs, non-profit work, fashion and the arts.

  Contact Kieron Allen ...

Related Posts

Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact

May 16, 2025

Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds

May 16, 2025

C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future

May 15, 2025

AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills

May 15, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Workday Dismisses Agentic AI Arms Race, Focuses on Business Impact
  • Workday Lone Wolf: Focuses on 8 AI Agents vs. Competitors’ Hundreds
  • C-Suite Perspective: What the AI-Powered Org Looks Like, Today and in The Future
  • AI Maturity Declines Year Over Year, But Leaders Push Ahead on Innovation, AI Skills
  • Microsoft’s Mission to Make Your Company AI First

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.