Sophos - State of Ransomware in Education 2025 - White Paper Released
EDScoop summarizes an August 2025 Sophos report on Education sector ransomware and suggests "Education sector improving on ransomware, but IT teams are stressed, report shows" (article link on edscoop.com)
The article notes that “Ransomware attacks in education don’t just disrupt classrooms, they disrupt communities of students, families, and educators,” Alexandra Rose, Director, CTU threat research at Sophos, said in a press release.
The Sophos white paper State of Ransomware in Education 2025 is available to the GW Community Sophos Whitepaper (linked PDF file).
The impacts of ransomware the report notes go beyond services interruptions and potential financial payments. The report notes the Human impact of ransomware on IT/cybersecurity teams:
-
41% of education sector-based IT/cybersecurity teams reported increased anxiety or stress about future attacks.
-
40% reported increased pressure from senior leaders, while 31% reported increased recognition.
-
38% cited both a change of team priorities/focus and an ongoing increase in workload as impacts on their IT/cybersecurity team.
-
37% reported changes to the team/organizational structure because of the incident.
-
One third (34%) said the team experienced feelings of guilt that the attack was not stopped in time.
-
31% of teams experienced staff absence due to stress/mental health issues related to the attack.
-
In one quarter of cases, the team’s leadership was replaced as a consequence of the attack.
The Sophos report also notes attackers are interested in data theft in addition to encrypting it "19% of all [higher education] victims, and 33% of those with encrypted data, reporting data theft,". Interestingly the report also notes: "97% of education providers [sector wide] that had data encrypted were able to recover it." either through backups or ransom payment.
-
Among higher education providers, only 47% used backups to restore data, a sharp drop from 78% in 2024, placing the sector among the bottom three for backup use. This may be due to the decentralized IT infrastructure, complex data environments, legacy systems, and inconsistent backup practices often seen across higher education institutions.
-
54% of higher education providers paid the ransom and got their data back — slightly above the 49% cross-sector average, but a welcome decrease from the 78% recorded in 2024.
The Sophos white paper reports the "median ransom demanded dropped in 2025 (right column below) compared to 2024 (left column below)

The report also notes that the median payments are decreased from 2024 (left column to 2025 right column)

The data analysis also suggests payments were lower than the initial demand for several reasons. "39 higher education providers that paid less than the initial demand explained how they were able to lower their payment:"
-
59%: We negotiated a lower amount with the attackers (the highest percentage recorded against this factor in this year’s survey).
-
46%: We paid the ransom quickly, so we got a discount.
-
44%: The attackers reduced their demand to encourage us to pay.
-
41%: A third party negotiated a lower amount with the attackers.
-
38%: The attackers reduced their demand due to external pressures (e.g., from the media or law enforcement).
Recovery times for higher education institutions impacted by a ransomware attack have improved, with 59% of higher education institutions reporting being "fully recovered" in under 1 week.

Recommendations
Although education providers have experienced several changes in their encounters with ransomware over the last year, it remains a significant threat. As adversaries continue to iterate and evolve their attacks, it’s essential that defenders and their cyber defenses keep pace with ransomware and other threats. Leverage the insights in this report to fortify your defenses, sharpen your threat response, and limit ransomware’s impact on your business and people. Focus on these four key areas to stay ahead of attacks:
Prevention. The most successful defense against ransomware is one where the attack never happens because adversaries couldn’t breach your organization. Take steps to eliminate the technical and organizational root causes highlighted in this report.
Protection. Strong foundational security is a must. Endpoints (including servers) are the primary destination for ransomware actors, so ensure that they are well defended, including dedicated anti-ransomware protection to stop and roll back malicious encryption.
Detection and response. The sooner you stop an attack, the better your outcomes. Around-the-clock threat detection and response is now an essential layer of defense. If you lack the resources or skills to deliver this in-house, look to work with a trusted managed detection and response (MDR) provider.
Planning and preparation. Having an incident response plan that you are well versed in deploying will greatly improve your outcomes if the worst happens and you experience a major attack. Be sure to make quality backups and regularly practice restoring data from them to accelerate recovery if you do get hit.
This content is presented by the GW IT Cybersecurity Risk and Assurance team. #CyberSafeGW is a shared responsibility, if you see something, say something. Report suspicious digital activities, including phishing emails, to abuse[@]gwu.edu. This information is provided for reference and awareness purposes. References to external organizations, products, and reports do not constitute endorsement or validation of the views, conclusions, or recommendations they contain.



