Cybersecurity Industry Statistics: ATO, Ransomware, Breaches & Fraud

Cybersecurity Industry Statistics: ATO, Ransomware, Breaches & Fraud

Table of Contents

Check your exposure

TL,DR:

With cybersecurity reports and fraud studies launching almost weekly, it can be hard to keep track of the latest stats related to:

  • Account takeover (ATO)
  • Ransomware
  • Malware
  • Phishing
  • Authentication bypass and session hijacking
  • Data breaches
  • Business email compromise (BEC)
  • Fraud and identity theft
  • Supply chain
  • Digital identity threats

At SpyCloud, we know our readers need the latest cybersecurity statistics to bolster their case for investing in solutions to combat cybercrime and protect employees and customers. Here is the latest list of cybersecurity statistics you should know for 2026:

Account Takeover (ATO) Statistics:

Ransomware Statistics:

  • Ransomware payments hit a record $1.1 billion in 2023, despite a decline in the share of victims who pay
  • The median ransom demand increased to $650,000 in 2023
  • 85% of organizations were affected by ransomware in some capacity over the past 12 months, with 31% experiencing 6 to 10 incidents. SpyCloud 2025 Identity Threat Report
  • Ransomware attacks saw a drop of nearly 12% last year, yet ransomware remains a critical threat, accounting for 17% of attacks involving malware.
  • The FBI received 2,825 ransomware complaints in 2023, an 18% increase from the previous year, with adjusted losses rising 74%.
  • According to security leaders, the top three perceived riskiest entry points for ransomware are: #1 Phishing and social engineering #2 Exposed or weak APIs #3 Stolen cookies that enable session hijacking. SpyCloud 2025 Identity Threat Report
  • Dark web research suggests that Akira, LockBit, Black Basta, RansomHub, and Hunters International were among the most active ransomware families over the past year. IBM X-Force 2025 Threat Intelligence Index
  • 54% of ransomware victim domains showed up in infostealer marketplaces/logs before the attack, and 40% contained corporate email addresses, suggesting that initial access brokers (IABs) are using these stolen credentials to facilitate ransomware attacks. Verizon 2025 Data Breach Investigations Report
  • Improving ransomware prevention and response is the second highest priority for security teams in 2025 after improving cross-functional team collaboration across IT, IAM, security, and other stakeholders. SpyCloud 2025 Identity Threat Report

Malware Statistics:

Phishing Statistics:

Authentication Bypass & Session Hijacking Statistics:

Data Breach Statistics:

Business Email Compromise (BEC) Statistics:

Fraud & Identity Theft Statistics:

Supply Chain Attack Statistics:

Digital Identity Threat Statistics for Human and Non-Human Identities:

For more insights, get the 2026 SpyCloud Identity Exposure Report

About SpyCloud:

SpyCloud transforms recaptured darknet data to disrupt cybercrime. Its automated identity threat protection solutions use advanced analytics and AI to accelerate investigations and  protect workforce, consumer, and supplier identities from the threats that matter most: authentication bypass, session hijacking, malicious insiders, account takeover, ransomware, and fraud. Its data from malware-infected devices, successful phishes, combolists, and third-party breaches also powers many popular dark web monitoring and identity theft protection offerings. Customers include seven of the Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies worldwide. Headquartered in Austin, TX, SpyCloud is home to more than 250 cybersecurity experts whose mission is to protect businesses and consumers from the stolen identity data criminals are using to target them now.

To get insights on your company’s exposed data, check your exposure today.

Keep reading

Illustration of device code phishing attack bypassing multi-factor authentication.
Device Code Phishing: The AiTM Attack That Bypasses MFA
Device code phishing is a fast-growing adversary-in-the-middle (AiTM) attack that exploits OAuth 2.0 device flow to harvest access and refresh tokens — bypassing MFA. SpyCloud Labs researchers break down how it works, what attackers do with stolen tokens, and how to detect and shut down compromised sessions.
Cybercrime update graphic showing ShinyHunters and criminal forums trends.
ShinyHunters, Supply CHAINS$ & Sketchy New Criminal Forums
Read on for the latest in supply chain compromises, cloud account takeovers, and breach forum shake-ups as we break down the biggest cybercrime trends of the month, including attacks by TeamPCP and ShinyHunters.
SpyCloud and Ping Identity logo showcasing identity security integration.
SpyCloud + Ping Identity: Holistic Identity Intelligence, Built Into Every Login
SpyCloud’s new partnership with Ping Identity embeds our recaptured darknet identity data directly into PingOne DaVinci & PingOne Advanced Identity Cloud at every identity event.

Check Your Company's Exposure

See your real-time exposure details powered by SpyCloud.

Going passwordless changes your attack surface. Explore session hijacking prevention

X