Insights From Verizon’s 2025 Data Breach Investigations Report (DBIR)

Share:

Brendon Rod

Chief Evangelist

2025 DBIR Deep-Dive:
What the Numbers Really Say About Modern IAM Risk

TL;DR — Ransomware frequency is up 37 %, partner-driven breaches have doubled, and edge-device exploits are now almost as common as phishing. IAM teams face a two-front war: fast-moving automation (zero-days, API abuse) and slow-burn human error (mis-delivery, unsafe changes). The playbook now demands recoverability, supply-chain guard-rails, and change-governance as core controls—not “nice-to-haves.”

  1. Ransomware’s new economics
  • 44 % of all breaches involved ransomware (32 % in 2024) ​
  • Median ransom payment fell 23 % to $115 k; 64 % of victims refused to pay (up from 50 %) ​
  • SMBs were hit hardest—ransomware appeared in 88 % of their breaches vs. 39 % at large enterprises ​

Implication

Attackers now favour speed over size: fast-moving, lower-demand campaigns scaled across many small targets drive the overall payment median down.

For IAM leaders this confirms two design assumptions:

  1. Autonomous recovery beats negotiation
    If identity services can be restored in minutes, refusing to pay is economically sensible.
  2. Backups must cover the identity platform itself

Protecting only data and relying on periodic “snapshots” leaves a fatal gap: if ransomware or an admin error corrupts the live IdP, you lose the very controls needed to restore everything else. What’s required is a continuous, immutable capture of tenant configuration—users, groups, MFA policies, app connections—stored outside the IdP’s trust zone.

Traditional shared-responsibility models don’t provide this.

2. Third-party & SaaS exposure: 30 % of breaches

Partner involvement doubled year-over-year to 30 % of breaches ​.

Examples cited include Snowflake (credential-stuffing at scale) and CDK Global (software supply-chain outage impacting auto dealers) ​.

Partner role

Typical IAM blast-radius

DBIR signal

Software vendor (e.g., edge-device firmware)

Patch lag → zero-day exploit → initial access

22 % of vuln exploits were VPN/edge devices, up 8× YoY ​

Hosted SaaS (e.g., admin console)

Tenant lock-out / lost config state

165 orgs affected in Snowflake creds case (80 % reused creds) ​

Service provider (e.g., MSP, MDR)

SSO/OAuth relay risk

30 % overall partner share; many via stolen API keys & secrets

Implication

Risk-transfer via contracts is not enough; engineering teams must assume shared fates with suppliers and bake in portable configuration backups plus “plan B” access paths.

3. Initial-access shake-up: vulns vs. phishing

  • Use of stolen credentials still leads (22 %), but exploitation of vulnerabilities closed the gap at 20 % after a 34 % surge ​.
  • Edge/VPN flaws drove the rise (22 % of all vulns, up from 3 %) with a median 32-day remediation window; only 54 % were fully patched within the year ​.

Implication

The window between PoC release and mass weaponisation keeps shrinking. IAM teams should treat external-facing IdP endpoints as “edge devices” and isolate their backups on a different trust boundary.

4. The stubborn human factor

Humans were a contributing element in ≈60 % of breaches, unchanged from 2024 ​.

Breakdown:

  • Social-engineering chain (phish / pretext → creds)
  • Mis-delivery & configuration error
  • Malware launched by user action

Implication

User-focused controls (MFA, FIDO, EDR) matter, but the DBIR’s flat trend shows diminishing returns. Organisations must move up-stack to change-governance—testing IAM changes in sandboxes before they hit production.

5. Espionage & access-broker convergence

State-aligned actors made up 17 % of breaches (up from 6 %), using vuln exploits in 70 % of cases ​.
Notably,
28 % of those state incidents also had a financial motive, blurring lines between APT and cyber-crime.

Implication


Classic perimeter vs. “APT” mental models fail when the same actor both steals IP and runs a side hustle selling access. Zero-trust posture checks and immutable change logs are essential evidentiary tools when you can’t assume motives.

6. Shadow AI usage & secret sprawl

  • 15 % of employees used GenAI services from corporate devices; 72 % did so with non-corporate accounts ​.
  • Median remediation of leaked credentials in public GitHub repos: 94 days ​.

Implication

Secrets last a quarter in the wild—long enough for access-brokers to weaponise them. IAM teams should pair secret-scanning with periodic tenant-diffs to spot illicit changes made with those leaked keys.

7. Industry snapshots

Sector

Ransomware share

Notable DBIR call-out

Healthcare

44 % of its breaches

Knock-on downtime from Change Healthcare outage ​

Manufacturing

48 %

High OT/IT convergence → edge-device risk

Finance & Insurance

32 %

High audit pressure, but still long patch lags


Implication


Despite heavier regulation, finance still wrestles with patch latency; healthcare struggles most with third-party SaaS concentration risk; manufacturing faces growing operational disruption from identity outages.

Mapping DBIR findings to concrete controls

Threat observation

NIST / CIS control

Practical step

Rising edge-device exploits

CIS 7 – Continuous Vulnerability Management

Tag IAM edge components as critical for 24-hour patch SLA.

Partner breach doubling

CIS 15 – Service-Provider Management

Request evidence of the provider’s backup & recovery RTO/RPO for your tenant data.

Flat human-error trend

CIS 6 – Access Control / 5 – Account Management

Enforce safe-change workflows and role-based access limits, not just MFA.

Secret sprawl (94-day median fix)

CIS 3 – Data Protection

Run automated Git & artifact scans; rotate exposed keys on discovery.

64 % ransom refusal

CIS 11 – Data Recovery

Implement point-in-time, tenant-level restores with documented recovery tests.

Final thought

The 2025 DBIR paints a complex picture: attacker automation is up, but so is defender resilience (64 % won’t pay). The organisations that succeed are those that design for failure—they assume third-party outages, zero-day weekends, and human mis-steps—and rehearse the recovery path until it’s boring. Identity infrastructure now belongs in that “must-be-boring” bucket.

Whether you build or buy the tooling, treat IAM resilience as a core availability requirement—because the data show the adversary already does.

The DBIR’s numbers are clear: rapid recovery, third-party isolation, and airtight change-governance are now baseline requirements—especially for the identity layer that keeps the rest of the business running.

Acsense delivers those controls out-of-the-box for Okta and other leading IDPs:

  • One-click tenant recovery — < 10 min RTO / near-zero RPO

  • Immutable, off-tenant backups — replica stored outside your IdP’s trust zone

  • Safe-Change sandbox — test and diff configuration before production pushes

  • Continuous integrity & compliance reporting — audit-ready proof that backups work

See it in action
Schedule a 20-minute walkthrough and watch a full Okta recovery.

Book a live demo →

—–

P.S

 

Looking to stay in the loop on the latest IAM trends and updates?

 

Subscribe to the FiveNines IAM newsletter today and gain access to exclusive insights from industry leaders, groundbreaking companies, and global news outlets. Don’t miss out on the must-read monthly newsletter that delivers the juiciest edition yet of IAM resilience.

 

Subscribe on Linkedin now and stay ahead of the curve!

Scroll to Top
Skip to content