Sophos has released its fifth annual Sophos State of Ransomware in Education report. The global study of 441 IT and cybersecurity leaders showed that the education sector is making measurable progress in defending against ransomware, with fewer ransom payments, dramatically reduced costs, and faster recovery rates.

As per the report, over the past five years, ransomware has emerged as one of the most pressing threats to education around the world, with attacks becoming a daily occurrence. Primary and secondary institutions are seen by cybercriminals as “soft targets”, often underfunded, understaffed, and holding highly sensitive data. The consequences are severe: disrupted learning, strained budgets, and growing fears over student and staff privacy. Without stronger defences, schools risk not only losing vital resources but also the trust of the communities they serve.

The study demonstrated that the global education sector is getting better at reacting and responding to ransomware, forcing cybercriminals to evolve their approach. Trending data from the Sophos study reveals an increase in attacks where adversaries attempt to extort money without encrypting data. Unfortunately, paying the ransom remains part of the solution for about half of all victims. However, the payment values are dropping significantly, and for those who have experienced data encryption in ransomware attacks, 97 per cent were able to recover data in some way. The study found several key indicators of success against ransomware in education:

  • Stopping more attacks: When it comes to blocking attacks before files can be encrypted, both lower and higher education institutions reported their highest success rate in four years (67 per cent and 38 per cent of attacks, respectively).
  • Following the money: In the last year, ransom demands fell 73 per cent (an average drop of US$2.83M), while average payments dropped from US$6M to US$800K in lower education and from US$4M to US$463K in higher education.
  • Plummeting cost of recovery: Outside of ransom payments, average recovery costs dropped 77 per cent in higher education and 39 per cent in lower education. Despite this success, lower education reported the highest recovery bill across all industries surveyed.

The report mentioned that while the education sector has made progress in limiting the impact of ransomware, serious gaps remain. In the Sophos study, 64 per cent of victims reported missing or ineffective protection solutions; 66 per cent cited a lack of people (either expertise or capacity) to stop attacks; and 67 per cent admitted to having security gaps. These risks highlight the critical need for schools to focus on prevention, as cybercriminals develop new techniques, including AI-powered attacks.

Highlights from the study that shed light on the gaps that still need to be addressed include:

  • AI-powered threats: Lower education institutions reported that 22 per cent of ransomware attacks had origins in phishing. With AI enabling more convincing emails, voice scams, and even deepfakes, schools risk becoming test grounds for emerging tactics.
  • High-value data: Higher education institutions, custodians of AI research and large language model datasets, remain a prime target, with exploited vulnerabilities (35 per cent) and security gaps the provider was not aware of (45 per cent) as leading weaknesses that were exploited by adversaries.
  • Human toll: Every institution with encrypted data reported impacts on IT staff. Over one in four staff members took leave after an attack, nearly 40 per cent reported heightened stress, and more than one-third felt guilt they could not prevent the breach.

Based on its work protecting thousands of educational institutions, Sophos experts recommend several steps to maintain momentum and prepare for evolving threats:

  • Focus on prevention: The dramatic success of lower education in stopping ransomware attacks before encryption offers a blueprint for broader public sector organisations. Organisations need to couple their detection and response efforts with preventing attacks before they compromise the organisation.
  • Unify strategies: Educational institutions should adopt coordinated approaches across sprawling IT estates to close visibility gaps and reduce risks before adversaries can exploit them.
  • Relieve staff burden: Ransomware takes a heavy toll on IT teams. Schools can reduce pressure and extend their capabilities by partnering with trusted providers for managed detection and response (MDR) and other around-the-clock expertise.
  • Strengthen response: Even with stronger prevention, schools must be prepared to respond when incidents occur. They can recover more quickly by building robust incident response plans, running simulations to prepare for real-world scenarios, and enhancing readiness with 24/7/365 services like MDR.

Data for the State of Ransomware in Education 2025 report comes from a vendor-agnostic survey of 441 IT and cybersecurity leaders – 243 from lower education and 198 from higher education institutions hit by ransomware in the past year. The organisations surveyed ranged from 100 – 5,000 employees and across 17 countries. The survey was conducted between January and March 2025, and respondents were asked about their experience of ransomware over the previous 12 months.

Commenting on the report, Alexandra Rose, director, CTU Threat Research, Sophos, said, “Ransomware attacks in education do not just disrupt classrooms, they disrupt communities of students, families, and educators. While it is encouraging to see schools strengthening their ability to respond, the real priority must be preventing these attacks in the first place. That requires strong planning and close collaboration with trusted partners, especially as adversaries adopt new tactics, including AI-driven threats.”