Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
The 2025 Cybercrime Report: 9 Emerging Trends + Statistics
Published:
July 17, 2025

The 2025 Cybercrime Report: 9 Emerging Trends + Statistics

By:
Brenda Buckman
Share icon
Glitch effectGlitch effectGlitch effect

Cybercrime is among one of the world’s largest economies.

While this statistic obviously isn’t excellent, it’s not all doom and gloom. According to our June 2025 survey of more than 500 American IT professionals, IT professionals in the US are mostly very confident about their ability to prevent attacks.

Cybercrime trends have fluctuated in recent years, with growing concerns around AI-driven attacks and how increasingly remote workplaces create more opportunities for bad actors to sneak in.

“As we highlighted in the Huntress 2025 Cyber Threat Report, over the last year, threat actors have stepped up their game, shifting their ransomware strategies to data theft and extortion over encryption and relying on remote monitoring and management (RMM) tools for access, lateral movement, and persistence, for instance,” says Lindsey O'Donnell-Welch, Staff Technical Community Engagement Writer at Huntress. “Cybercriminals have targeted various industries like the healthcare, education, and government sectors. Organizations can take several first steps to protect against cybercrime, like security awareness training, implementing multi-factor authentication (MFA), and regularly updating all software and systems.”

Read on to see the top cybercrime trends of 2025, plus critical cyber statistics for your business –– and how you can best protect yourself.


Key Takeaways

  • Malware attacks are the most commonly experienced cybercrime, with 54% of organizations experiencing one this year. 

  • Financial gain is the suspected primary motivation for cybercrimes, followed by data theft. 

  • Most organizations report losses between $100,001 and $500,000 a year from cybercrimes. 


1. More than half of American organizations experienced a malware attack in the last year

When asked which types of cybercrimes their organization has experienced in the past 12 months, the most common answer was malware infections, with 54% of people reporting they’d experienced one. With malware encompassing such a wide range of attacks—viruses, ransomware, spyware, the list goes on—it’s not surprising that it was the leading type of cyberattack for most organizations. 

“Malware and phishing are common attack types because of their versatility,” says Lindsey. “Cybercriminals can achieve multiple objectives, like gaining system access, stealing data, and disrupting operations, all with one single tool.”

The next most commonly reported attack type is phishing, including spear phishing and whaling, which 44% of organizations experienced. Other attacks, which may have some overlap, that happened this year include:

  • Business email compromise (BEC) attacks (36%)

  • Website defacement or denial-of-service attacks (35%)

  • Insider threats leading to data theft or sabotage (32%)

  • Credential stuffing or account takeover attacks (28%)

  • Supply chain compromise leading to cyber incidents (24%)

This high rate of malware and phishing attacks can be blamed on a number of things, but bigger attack surfaces mean more entry points and potential for vulnerabilities. It's become incredibly easy for threat actors to launch these attacks, often exploiting common weaknesses like exposed Remote Desktop Protocol (RDP) ports or unpatched systems.

On the flip side, the cybercrime landscape itself has evolved. We're seeing a more competitive malware development scene with sophisticated features, formalized operational models like Ransomware-as-a-Service (RaaS) and Initial Access Brokers (IABs), and a highly streamlined process for compromising and selling data on underground forums.

This is why multi-pronged approaches to cybersecurity are so important, including endpoint detection to quickly find and disable attacks, as well as security awareness training to ensure employees can recognize threats. 


2. Organized criminal groups are the biggest perceived threat actor 

Just over a quarter of respondents (26%) rated organized cybercriminal groups as the threat actor that poses the greatest risk to their organization. These are essentially groups of hackers who make it their full-time job to access your system. It was the most commonly cited threat, followed by:

  • Competitors (19%)

  • Malicious insiders (18%)

  • Hacktivists (16%)

  • Negligent insiders (12%)

  • Nation-state actors (9%)

  • Other (1%)

Threat actors are typically responsible for the majority of cybercrimes, with varying motivations like activism, or in this case, “hacktivism,” and even revenge. For most attackers, their primary focus is monetary gain, but hacktivists, for example—people who commit cybercrimes for information or political motivations—may be motivated by other reasons.

Let’s unpack what really drives attackers to do what they do. 


3. Financial gain is the suspected primary motivation of most cybercrimes  

More than 1 in 4 (27%) American IT professionals think threat actors are mainly after money when targeting their companies. Other possible motivations include:

  • Data theft (23%)

  • Reputational damage (15%)

  • Disruption of operations (11%)

  • Ideological reasons, like “hacktivism” (9%)

And, of course, the IT professionals are right. When it comes to the most common cyberattacks, the main motivation is––you guessed it––money. Even when attackers access personal information, they typically do it to either gain access to financial records or to ransom the info they steal for money, leaving sensitive information up for sale.


4. About 1 in 4 businesses see up to $500,000 a year in losses from cybercrimes  

More than 26% of respondents said that the estimated financial impact of cybercrimes each year was between $100,000 and $500,000. This includes costs related to recovery, downtime, fines, legal fees, and reputational damage leading to lost business. Cybercrime certainly pays well for attackers so they’re motivated to keep doing it.

In fact, the median salary for cybercriminals is $4,000 per job. According to Cybersecurity Ventures, the cost of cybercrimes is predicted to reach $12.2 trillion globally by 2031. That’s a massive paycheck for the cybercriminals.

Cyberattacks are getting more advanced and happening more often, which is a growing concern across every industry. Specifically, AI is helping attackers launch more advanced threats, like AI-generated deepfakes, such as the North Korean BlueNoroff attack. Attackers are also able to attack with wider nets, such as compromising one business to reach multiple downstream customers, like gaining access through remote monitoring and management (RMM) tools. 


5. Nearly a quarter of organizations in the US don’t have cyber insurance 

Despite the growing prevalence of cybercrimes and the potential for huge losses, Huntress’ 2025 Cyber Insurance Trends Report revealed that 22% of American organizations still lack cyber insurance.

The leading reason: the cost of coverage. But with cybercrimes costing organizations hundreds of thousands of dollars a year, the real question becomes, can they afford not to have coverage?

According to Embroker, the average cost of an annual cyber insurance plan in 2024 was between $1,200 and $7,000, with the scope of coverage varying depending on business size and specific needs. On the other hand, attacks can cost millions of dollars in direct and indirect expenses, from getting systems back up and operational delays, to the potential reputational damages. 

Organizations should continue assessing their risk profile to decide if the several thousand dollars a year isn’t worth protecting themselves from potentially hundreds of thousands of dollars' worth of financial impact if a threat actor is successful. 


6. Most IT professionals believe their company leadership is very prepared for cyber incidents

The good news is that most teams are on the same page regarding the gravity and risk of these cybercrime trends.

More than 3 in 5 American IT professionals (64%) believe that their non-IT leadership, like C-suite and board members, are very prepared to understand the technical implications and respond effectively to a significant cyber incident. No elevator pitch is necessary, as more board members are increasingly viewing cybersecurity as a business risk and are adding IT professionals to their boards. 

But here’s where things get interesting: confidence drops slightly when looking at the actual security measures in place. More than half of respondents (57%) are very confident that current security measures can detect and mitigate an advanced, multi-stage attack that doesn't rely on traditional malware signatures. 

Download Resource

7. IT professionals are most worried about AI threats

AI is coming for more than just our jobs—it wants our data, too.

More than a third of IT professionals (38%) believe that, beyond phishing and similar threats, AI-powered social engineering poses the biggest unanticipated risk to their organization this year. Other threats include:

  • Hybrid attacks, combining social engineering with a technical exploit (21%)

  • Insider threats, malicious or negligent (7%)

  • Business email compromise (6%)

  • Deepfakes (6%)

  • Manipulation of remote work environments (6%)

And more than 2 in 5 IT pros (42%) think that the rise of AI-powered attacks will be the biggest game-changer in cybercrime over the next five years. This highlights concerns that while AI can streamline operations, it also has the potential to make cyberattacks more sophisticated and widespread.


8. Security awareness training is the most underfunded cybersecurity protection

When it comes to cybersecurity, there's a wide range of measures IT professionals feel aren't getting enough funding or resources, especially when you consider how important they are for the threats they're supposed to tackle.

The most common answer was security awareness training, which nearly 1 in 5 IT professionals (16%) rated as the most underfunded. 

“Employee security training is a critical component of cybersecurity, especially if it's engaging and is performed on an ongoing basis,” says Lindsey. “It can help organizations educate employees on how to spot social engineering red flags, understand the best processes to take in the event of an incident, and most importantly, build a culture of security across the business.”

With Huntress, you can empower your employees to be part of the cybersecurity solution with security awareness training (SAT), giving you personalized phishing defense coaching based on real threats our security experts see.



11+ cybercrime statistics for 2025

Looking at recent data shows the many ways that the threat landscape continues to evolve. Here’s an overview of some of the top cybercrime trends and cybersecurity statistics from the past year: 

  1. Remote access trojans (RATs) are becoming more and more popular, with over 75% of remote access incidents last year utilizing them. (Huntress)

  2. Threat actors are increasingly using infostealers, with almost 24% of attacks using them. (Huntress)

  3. Education was one of the most targeted industries in 2024, accounting for 21% of attacks. (Huntress)

  4. There was a 33% increase in reported losses from cybercrime between 2023 and 2024, for a total loss of more than $16 billion. (FBI)

  5. People 60 years old and older report the most losses from cybercrime, accounting for almost $5 billion of the total $16 billion lost last year. (FBI)

  6. The top three most reported cybercrimes in 2024 were phishing/spoofing, extortion, and personal data breaches. (FBI)

  7. Cyber incidents are the most important business risk globally, with 38% of businesses highlighting these incidents as their top concern, higher than business interruptions, natural disasters, and legislative changes. (Allianz)

  8. 2025 marks the fourth year in a row that cyber incidents have been the number one concern among businesses. (Allianz)

  9. Data breaches are the top cyber exposure concern for 61% of organizations globally. (Allianz) 

  10. Data breach expenses surged to $4.88 million worldwide in 2024, marking a 10% rise compared to 2023. (IBM)

  11. Globally, the most expensive part of data breaches is the "detection and escalation" phase, which averages $1.63 million. (Statista)


How to protect against cybercrime

As cybercrime continues to evolve fast and threat actors look for new ways to gain access, organizations face a constant threat to their data, systems, and operations. In today's digital world, you have to have strong, multi-layered cybersecurity in place. This helps us proactively reduce risks and protect our valuable assets.

Here are some key recommendations for protecting your organization against cybercrime:

  • Invest in endpoint detection and response tools: Endpoint detection and response (EDR) tools are designed to detect malicious threats, investigate, and respond to them in real time. 

  • Implement robust employee training: Regularly educate staff on cybersecurity best practices, including recognizing phishing attempts, strong cyber hygiene, and safe online behavior, as human error remains a leading cause of breaches.

  • Adopt a zero trust security model: Assume no user or device can be trusted by default, requiring strict verification for every access attempt, regardless of whether it originates inside or outside the network.

  • Maintain up-to-date software and systems: Regularly patch and update all operating systems, applications, and security software to fix vulnerabilities that attackers could exploit.

  • Utilize multi-factor authentication (MFA): Implement MFA for all accounts, especially those with privileged access, to add an extra layer of security beyond just passwords.

  • Enforce strong password policies: Require complex, unique passwords for all accounts and consider using password managers to help employees manage them securely.

  • Develop an incident response plan: Create a clear, actionable plan for detecting, responding to, and recovering from cyberattacks, including communication protocols.

Choose proactive solutions against cyber threats

While these cybercrime trends might seem scary, they really don’t have to be. To protect your organization and mitigate risks, consider investing in employee security awareness programs to slash the risk of accidental insider threats, cyber insurance to protect you if there is a cyber incident, and Security Information and Event Management (SIEM) systems to detect and mitigate threats. 

"Businesses can use multiple layers of security controls to make sure that they cover all their bases - from MFA to protect accounts against compromise to security awareness training to help protect against social engineering attacks,” says Lindsey. 

Huntress Managed SIEM uses proprietary Smart Filtering technology that only captures the data you need and cuts through all the noise. Our 24/7 expert-led monitoring helps you find and wreck elusive hackers.



FAQ

What are the current trends in cybersecurity?

In the past year, cybercriminals have updated their strategies, employing more sophisticated tactics and transforming ordinary tools into malicious instruments. This escalation includes leveraging generative AI to craft phishing content and produce deepfakes for social engineering schemes.

How often does a cyberattack happen in the US? 

Threat actors try to gain access to systems as frequently as every 39 seconds. 

Is cybercrime increasing? 

Yes, cybercrime is consistently increasing year-over-year. The FBI's Internet Crime Complaint Center (IC3) reports increases each year—for example, they saw 9% increase in ransomware complaints between 2023 and 2024. 


Methodology

The survey of 542 US IT professionals ages 18+ was conducted via Centiment Audience for Huntress between May 27 and May 28, 2025. Data is unweighted and the margin of error is approximately +/-3% for the overall sample with a 95% confidence level.


Categories
Cybersecurity Trends
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • 90 Business-Critical Data Breach Statistics for 2025

    Learn the top data breach statistics of the last several years and learn about common causes, how they vary by industry, and future trends.
  • The 2025 Cyber Insurance Trends Report

    Discover the top cyber insurance trends for 2025, plus learn how to choose the right plan for your organization.
  • 137 Key Cybersecurity Statistics for 2026 and Beyond

    Uncover top cybercrime trends, data breaches, and essential workforce insights to bolster your defenses with this comprehensive roundup of cybersecurity statistics.
  • Cybersecurity Threats in Healthcare: The 2025 Huntress Report

    These are the top cybersecurity threats in healthcare, according to Huntress’s 2025 survey of IT pros. Read the full report and learn how to avoid them.
  • 36 Must-Know Password Statistics To Boost Cybersecurity (2026)

    The top password statistics might surprise you. Learn how common poor password hygiene is, plus tips for protecting your precious credentials better.
  • Emerging Cybersecurity Trends That May Impact Your SMB Clients

    Keep your MSP armed and ready for attacks, hacks and data breaches with the latest trends in cybersecurity.
  • Huntress 2025 Cyber Threat Report: Proliferating RATs, Evolving Ransomware, and Other Findings

    Huntress’ 2025 Cyber Threat Report is here! Explore the year's biggest threats—RATs, phishing, ransomware—and how evolving tactics demand smarter defense.
  • Infographic: Uncover Tomorrow’s Cyber Threats Today

    Explore 2024's top cyber threats, including ransomware trends, advanced phishing tactics, and targeted industries. Stay ahead—download the Huntress 2025 Cyber Threat Report now!

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy