1 in 3 Ransomware Claims Started with SonicWall in 2025 as VPN Attacks Nearly Double in Two Years | Nation/World | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


SAN FRANCISCO–(BUSINESS WIRE)–Apr 22, 2026–

At-Bay, the InsurSec provider for the digital age, today released its 2026 InsurSec Report, revealing that ransomware has entered a new phase of infrastructure-driven exploitation. Based on an analysis of more than 6,500 claims and 100,000 policy years, the report shows that nearly 3 in 4 ransomware attacks (73%) started with a VPN in 2025, a share that nearly doubled in just two years. SonicWall was the most targeted VPN for the first time, accounting for 1 in 3 ransomware claims (27%). Akira ransomware was the primary force behind this surge, representing more than 40% of all ransomware claims — the highest concentration of a single strain At-Bay has ever recorded. The group achieved this dominance through the systematic exploitation of SonicWall appliances, which were present in 86% of Akira’s attacks. During this campaign, Akira ransom demands averaged $1.2M, outpacing other groups by 50%.


This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAm%9:D AC6DD C6=62D6 762EFC6D >F=E:>65:2] ‘:6H E96 7F== C6=62D6 96C6i k2 9C67lQ9EEADi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ae_caadbdf`g^6?^Q C6=lQ?@7@==@HQm9EEADi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ae_caadbdf`g^6?^k^2mk^Am

kAmpE\q2J C6=62D6D :ED a_ae x?DFC$64 C6A@CE C6G62=:?8 E92E C2?D@>H2C6 92D 6?E6C65 2 ?6H A92D6 @7 :?7C2DECF4EFC6\5C:G6? 6IA=@:E2E:@?]k^Am

kAmQx? a_ad[ H6 D2H D@>6E9:?8 H6VG6 ?6G6C D66? 367@C6 \ @?6 C2?D@>H2C6 8C@FA 962G:=J 6IA=@:E:?8 2 D:?8=6 56G:46 EJA6 2?5 5@>:?2E:?8 ?62C=J 92=7 @7 2== C2?D@>H2C6 4=2:>D[” D2:5 p52> %JC2[ r9:67 x?7@C>2E:@? $64FC:EJ ~77:46C 7@C rFDE@>6CD 2E pE\q2J] “%96 52E2 DF886DED 2 564:D:G6 D9:7E] %9:D 8C@FA 5:5?’E D6=64E G:4E:>D 32D65 @? H9@ E96J H6C6] x?DE625[ E96J 7@4FD65 @? 4@>A2?:6D H96C6 E96:C AC676CC65 E24E:4D H@F=5 92G6 E96 >@DE :>A24E] %96 D:?8=6 3:886DE 56E6C>:?2?E @7 J@FC C2?D@>H2C6 C:D< =2DE J62C H2D?’E J@FC :?5FDECJ[ J@FC D:K6[ @C 6G6? J@FC D64FC:EJ 3F586E] xE H2D H96E96C J@F @A6C2E65 2 DA64:7:4 EJA6 @7 ?6EH@C< 2AA=:2?46] %9:D 2AAC@249 6?23=65 2EE24<6CD E@ >@G6 H:E9 :?5FDEC:2= 677:4:6?4J[ C2A:5=J 6IA=@:E:?8 G:4E:>D @7 2== D:K6D 2?5 24C@DD 2== :?5FDEC:6D]”k^Am

kAm~E96C <6J 7:?5:?8D 7C@> E96 C6A@CEik^Am

kF=mk=:mk6>m#6>@E6 2446DD E@@=D 5C@G6 gfT @7 2== C2?D@>H2C6 4=2:>Dk^6>m[ H:E9 E96 2G6C286 C2?D@>H2C6 D6G6C:EJ 4=:>3:?8 `eT E@ Sd_gz k6>m]k^6>m $>2== 3FD:?6DD6D E@@< E96 92C56DE 9:E] r@>A2?:6D H:E9 F?56C Sad| 😕 C6G6?F6 D2H C2?D@>H2C6 7C6BF6?4J ;F>A a`T 2?5 D6G6C:EJ DFC86 c_T J62C\@G6C\J62C E@ Scaaz — E96 DE66A6DE :?4C62D6 @7 2?J D68>6?E] p4C@DD 2== :?4:56?E EJA6D[ E96D6 D>2== @C82?:K2E:@?D D2H 2 aeT :?4C62D6 😕 @G6C2== 4=2:> D6G6C:EJ[ D:8?2=:?8 E92E E96 7:?2?4:2= 7=@@C 7@C 4J36C 2EE24mw2G:?8 6?5A@:?E D64FC:EJ :D?VE 6?@F89]k^6>m |@C6 E92? 92=7 We_TX @7 p<:C2VD G:4E:>D 925 2 =625:?8 t?5A@:?E s6E64E:@? U2>Aj #6DA@?D6 Wts#X D@=FE:@? 😕 A=246 2?5 H6C6 DE:== 4@>AC@>:D65] %96 @?=J 3FD:?6DD6D E92E 2G@:565 7F== C2?D@>H2C6 6?4CJAE:@? 925 E96:C ts# 324<65 3J ac^f >@?:E@C:?8 G:2 |2?2865 s6E64E:@? U2>Aj #6DA@?D6 W|s#X[ >2<:?8 9F>2?\>@?:E@C65 56E64E:@? E96 4C:E:42= =2DE =:?6 @7 5676?D6 282:?DE E@52JVD C2?D@>H2C6]k^=:mk=:mk6>mq6J@?5 E96 :?:E:2= 2EE24<[ E@E2= =@DD D6G6C:EJ 😀 :?4C62D:?8 5F6 E@ D64@?52CJ 724E@CD]k^6>m %9:C5\A2CEJ =:23:=:EJ D2H E96 9:896DE ;F>A @7 2?J :?4:56?E EJA6[ :?4C62D:?8 f_T J62C\@G6C\J62C 2D 2? 288C6DD:G6 A=2:?E:77DV 32C 5C:G6D 2 DFC86 😕 AC:G24J\C6=2E65 4=2DD 24E:@? =2HDF:ED] $:>F=E2?6@FD=J[ C2?D@>H2C6 4=2:>D :?G@=G:?8 3FD:?6DD :?E6CCFAE:@? H6C6 b) >@C6 D6G6C6 @? 2G6C286[ H:E9 ` 😕 `_ G:4E:>D 724:?8 @A6C2E:@?2= 5@H?E:>6 6I4665:?8 b_ 52JD]k^=:mk=:mk6>mu:?2?4:2= 7C2F5 C6>2:?65 E96 >@DE 7C6BF6?E :?4:56?E EJA6k^6>m[ 244@F?E:?8 7@C b_T @7 2== 4=2:>D[ H:E9 E96 2G6C286 2>@F?E DE@=6? C:D:?8 `eT E@ Sagdz 2?5 E96 D:?8=6 =2C86DE E967E 9:EE:?8 Sh]f|] pE\q2J’D r=2:>D E62> C64@G6C65 Sde| 😕 DE@=6? 7F?5D[ 3FE DA665 😀 4C:E:42=] !@=:4J9@=56CD H9@ ?@E:7:65 pE\q2J H:E9:? E9C66 52JD C64@G6C65 7F?5D f_T @7 E96 E:>6[ H96C62D E9@D6 H9@ H2:E65 >@C6 E92? b_ 52JD C64@G6C65 7F?5D ;FDE afT @7 E96 E:>6]k^=:mk=:mk6>m#2?D@> 56>2?5D 2AAC@24965 S`| @? 2G6C286[ 3FE >@DE H6C6 ?6G6C A2:5]k^6>m p4C@DD 2== C2?D@>H2C6 :?4:56?ED[ 2EE24<6CD H2=<65 2H2J 6>AEJ\92?565 egT @7 E96 E:>6 2?5 H96? 4@>A2?:6D 5:5 A2J[ 7:?2= A2J>6?ED 42>6 😕 eaT 36=@H :?:E:2= 56>2?5D[ D2G:?8 A@=:4J9@=56CD Sh`| 😕 C2?D@>D]k^=:mk^F=m

kAmQrJ36C 4C:>:?2=D 2C6 >@G:?8 2E F?AC64656?E65 DA665 2?5 D42=6[ 3FE C6D:=:6?46 😀 A@DD:3=6] (92E 4@?D:DE6?E=J >256 E96 5:776C6?46 36EH66? 2 4C:D:D 2?5 2 ?F:D2?46 😕 a_ad H2D 56E64E:@? 2?5 C6DA@?D6 E649?@=@8:6D 4@FA=65 H:E9 9F>2?\=65 G:8:=2?46] xE’D 2 DEC@?8 C6>:?56C 2D H6 >@G6 :?E@ E96 px 286[ E92E 6G6? E96 36DE D64FC:EJ E@@=D DE:== ?665 D<:==65 AC@76DD:@?2=D E@ @A6C2E6 E96>[Q 25565 %JC2]k^Am

kAm%@ 5@H?=@25 E96 7F== C6A@CE 2?5 =62C? 9@H @C82?:K2E:@?D 42? 36EE6C AC@E64E E96>D6=G6D 7C@> 4J36C4C:>6[ G:D:Ei k2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEADTbpTauTauHHH]2E\32J]4@>Taua_ae\:?DFCD64\C6A@CETauU2>Aj6D966Eldcd`hhdeU2>Aj?6HD:E6>:5la_ae_caadbdf`gU2>Aj=2?l6?\&$U2>Aj2?49@Cla_aeZx?DFC$64Z#6A@CEU2>Aj:?56IlbU2>Aj>5dl`g23_3b`d5a4427hag764“b_bhe2afeQ C6=lQ?@7@==@HQ D92A6lQC64EQma_ae x?DFC$64 #6A@CEk^2m]k^Am

kAmp55:E:@?2= #6D@FC46Dik^Am

kF=mk=:mk2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEADTbpTauTauHHH]2E\32J]4@>Taua_ad\:?DFCD64\C2?<:?8D\C6A@CETauU2>Aj6D966Eldcd`hhdeU2>Aj?6HD:E6>:5la_ae_caadbdf`gU2>Aj=2?l6?\&$U2>Aj2?49@Cla_adZx?DFC$64Z#2?<:?8DZ#6A@CETbpZt>2:=Z2?5Z#6>@E6Zp446DDU2>Aj:?56IlcU2>Aj>5dl_5acec_eh2hd53e3eba_a36277332ad`Q C6=lQ?@7@==@HQ D92A6lQC64EQma_ad x?DFC$64 #2?<:?8D #6A@CEi t>2:= 2?5 #6>@E6 p446DDk^2mk^=:mk=:mk2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEADTbpTauTauHHH]2E\32J]4@>Taua_ad\:?DFCD64\C6A@CETauU2>Aj6D966Eldcd`hhdeU2>Aj?6HD:E6>:5la_ae_caadbdf`gU2>Aj=2?l6?\&$U2>Aj2?49@Cla_adZx?DFC$64Z#6A@CEU2>Aj:?56IldU2>Aj>5dld77ddb`4hbffee_gd6hef27562e_4b7cQ C6=lQ?@7@==@HQ D92A6lQC64EQma_ad x?DFC$64 #6A@CEk^2mk^=:mk=:mk2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEATbpTauTau2E\32J]4@>Tau>5CU2>Aj6D966Eldcd`hhdeU2>Aj?6HD:E6>:5la_ae_caadbdf`gU2>Aj=2?l6?\&$U2>Aj2?49@ClpE\q2JZ$E2?46Z|s#U2>Aj:?56IleU2>Aj>5dlb7cb3342bggg_afeecg5c`4h`7`62_b4Q C6=lQ?@7@==@HQ D92A6lQC64EQmpE\q2J $E2?46 |s#k^2mk^=:mk^F=m

kAmk6>mp3@FE pE\q2Jk^6>mk^Am

kAmk2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEADTbpTauTauHHH]2E\32J]4@>TauU2>Aj6D966Eldcd`hhdeU2>Aj?6HD:E6>:5la_ae_caadbdf`gU2>Aj=2?l6?\&$U2>Aj2?49@ClpE\q2JU2>Aj:?56IlfU2>Aj>5dl4ghbb2ef2f5a3fd`eb`bbf44_bceag2cQ C6=lQ?@7@==@HQ D92A6lQC64EQmpE\q2Jk^2m 😀 E96 x?DFC$64 AC@G:56C 7@C E96 5:8:E2= 286] qJ 4@>3:?:?8 H@C=5\4=2DD E649?@=@8J H:E9 :?5FDECJ\=625:?8 :?DFC2?46[ pE\q2J H2D 56D:8?65 7C@> E96 8C@F?5 FA E@ 6>A@H6C 3FD:?6DD6D @7 6G6CJ D:K6 E@ >66E 4J36C C:D< 9625\@?] pE\q2J x?DFC2?46 $6CG:46D[ {{r AC@G:56D :?DFC2?46 AC@E64E:@? 2?5 D64FC:EJ AC6G6?E:@? D@=FE:@?D E@ 4=@D6 E@ c_[___ 3FD:?6DD6D 😕 E96 &$[ D2768F2C5:?8 FA E@ Sg__q 😕 4@==64E:G6 3FD:?6DD C6G6?F6[ 2?5 @776CD 4@G6C286 3J ?@?\25>:EE65 :?DFC6CD 7@C rJ36C[ %649?@=@8J tCC@CD U2>Aj ~>:DD:@?D W%649 tU2>Aj~X[ 2?5 |:D46==2?6@FD !C@76DD:@?2= {:23:=:EJ W|!{X] pD 2 D64FC:EJ 4@>A2?J[ pE\q2J @776CD AC@AC:6E2CJ D64FC:EJ D@=FE:@?D :?4=F5:?8 pE\q2J $E2?46 |2?2865 s6E64E:@? U2>Aj #6DA@?D6 W|s#X]k^Am

kAm’:6H D@FC46 G6CD:@? @? k2 9C67lQ9EEAi^^3FD:?6DDH:C6]4@>Qm3FD:?6DDH:C6]4@>k^2mik2 9C67lQ9EEADi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ae_caadbdf`g^6?^Q C6=lQ?@7@==@HQm9EEADi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ae_caadbdf`g^6?^k^2mk^Am

kAmr~}%pr%i |65:2 r@?E24Ek^Am

kAm|:4926= {@H6[ w625 @7 |2C<6E:?8k^Am

kAmk2 9C67lQ>2:=E@iAC6DDo2E\32J]4@>QmAC6DDo2E\32J]4@>k^2mk^Am

kAmzt*(~#si rp{xu~#}xp &}x%ts $%p%t$ }~#%w p|t#xrpk^Am

kAmx}s&$%#* zt*(~#si %trw}~{~v* x}$p}rt $tr%* !#~ut$$x~}p{ $t#’xrt$ $|p{{ q&$x}t$$ $~u%(p#t }t%(~#z$ x}%t#}t% sp%p |p}pvt|t}%k^Am

kAm$~rti pE\q2Jk^Am

kAmr@AJC:89E qFD:?6DD (:C6 a_ae]k^Am

kAm!&qi _c^aa^a_ae _gi__ p|^sx$ri _c^aa^a_ae _gi_a p|k^Am

kAmk2 9C67lQ9EEAi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ae_caadbdf`g^6?Qm9EEAi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ae_caadbdf`g^6?k^2mk^Am

Copyright Business Wire 2026.



——————————————————–


Click Here For The Original Source.

.........................

National Cyber Security

FREE
VIEW