Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsRemote Access Abuse Drives Majority of Breaches
Remote Access Abuse Drives Majority of Breaches
CIO PulseGovTechCybersecurity

Remote Access Abuse Drives Majority of Breaches

•February 19, 2026
0
SC Media
SC Media•Feb 19, 2026

Companies Mentioned

Arctic Wolf

Arctic Wolf

Why It Matters

The rise of remote‑access abuse and data‑only extortion forces organizations to rethink identity security and incident response, as traditional ransomware defenses become less sufficient.

Key Takeaways

  • •Data‑only extortion rose from 2% to 22% in 2025
  • •Remote‑access tool abuse caused 65% of non‑BEC breaches
  • •AI‑enabled phishing drove 85% of BEC incidents
  • •77% of ransomware victims refused to pay
  • •Negotiated settlements cut ransom demands by 67% on average

Pulse Analysis

The 2026 Arctic Wolf Threat Report highlights a strategic pivot among cybercriminals from classic ransomware encryption to data‑only extortion. By threatening to publish stolen files, attackers can extract value without deploying disruptive malware, a tactic that grew eleven‑fold in just one year. This evolution reflects a broader industry trend where threat actors prioritize stealth and leverage the victim’s reputation risk, making data breaches a more lucrative and less noisy revenue stream.

Remote‑access tools have become the preferred entry point, accounting for roughly two‑thirds of non‑BEC breaches. Hackers exploit legitimate remote‑desktop protocols, VPNs, and third‑party management utilities, effectively "logging in" rather than forcing a break‑in. Coupled with AI‑generated phishing lures, these vectors enable rapid credential harvesting and lateral movement, especially in small and midsize enterprises that often lack robust multi‑factor authentication and segmentation. The Australian market illustrates this vulnerability, with 71% of affected firms being SMBs.

Mitigation now hinges on disciplined identity governance, continuous patch management, and early detection capabilities. Organizations should enforce zero‑trust principles, regularly audit privileged accounts, and deploy behavioral analytics to spot anomalous remote‑login patterns. Investing in threat‑intel feeds that flag emerging extortion groups, such as Qilin and Akira, can further reduce dwell time. As attackers refine their playbooks, a proactive, layered security posture will be essential to curb both data‑only extortion and remote‑access abuse.

Remote access abuse drives majority of breaches

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...