Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Critical zero-day exploits dormant WinRAR vulnerability to target glob...
Survey finds 57% of respondents had experienced ransomware attacks in ...
Surveyed IT professionals report 78% ransomware targeting: highest ran...
Watch out for unsanctioned applications and usage amid rising AI adopt...
Cohesity Launches New Partner Program to Accelerate Partner Success
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Experts weigh in on Singapore’s response to UNC3886

      Experts weigh in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
    • Featured

      Securing trust in a digitally ambitious Singapore

      Securing trust in a digitally ambitious Singapore

      Tuesday, August 5, 2025, 10:19 AM Asia/Singapore | Features, Newsletter, Tips
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      Experts weigh in on Singapore’s response to UNC3886

      Experts weigh in on Singapore’s response to UNC3886

      Friday, August 8, 2025, 10:45 PM Asia/Singapore | Features, Newsletter, Opinions
    • Featured

      When legitimate URLs lead to dangerous destinations

      When legitimate URLs lead to dangerous destinations

      Wednesday, August 6, 2025, 11:04 AM Asia/Singapore | Features
    • Featured

      Securing trust in a digitally ambitious Singapore

      Securing trust in a digitally ambitious Singapore

      Tuesday, August 5, 2025, 10:19 AM Asia/Singapore | Features, Newsletter, Tips
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
News

When ransomware attack rates drop, do not let down your guard

By CybersecAsia editors | Tuesday, May 27, 2025, 1:18 PM Asia/Singapore

When ransomware attack rates drop, do not let down your guard

That is a cybersecurity firm’s stance on reporting its April 2025 user base data, which shows a drop in such attacks.

In a review of cyber statistics recorded in its user base for the month of April 2025, a cybersecurity firm has released some trends from the data.

First, the firm’s user base data showed a drop in ransomware attacks by 31%, totaling 416 cases. This was the second consecutive month of decline.

Second, in the data, the industrial sector was the most targeted, accounting for 32% of all attacks (133 incidents).

Other findings

Third, the next most targeted sector in the data was “consumer discretionary” (including retail), with 73 attacks, compared to 124 in March 2025. Also:

  • Users from North America had experienced the highest share of attacks, with 51% (211 cases), followed by those from Europe at 27% (110), Asia at 12% (51), and South America at 5% (21).
  • The most active ransomware group encountered in the April data was Akira (65 attacks), overtaking Babuk2, (16 attacks compared to 84 in March). Other active ransomware groups noted in the data were Qilin (49 attacks) and Play (42 attacks).
  • The month’s data showed a rise in the use of weaponized PDFs as a method for cyberattacks, leveraging increasingly sophisticated Zero Day exploits and advanced social engineering to target specific users or organizations.

According to Matt Hull, Head of Threat Intelligence, NCC Group, the firm releasing its April data findings: “While the number of reported ransomware victims declined further in April, it would be a mistake to assume that this is a sign that the threat is fading. Globally, many ransomware cases still fly under the radar, and are under-reported or deliberately kept quiet…  In this climate, a strong and embedded security culture is no longer optional; it is a critical enabler of organizational resilience… to maintain a strong security culture, respond quickly to emerging threats, and adapt to shifting tactics — all the while staying ahead of adversaries that never stop evolving.”

Share:

PreviousKnow the four most common password mistakes
NextToshiba Showcases Quantum-Safe Networks with SpeQtral and Ciena to Prepare Singapore Businesses for the Quantum Era

Related Posts

Why email security should be a top priority amidst the pandemic

Why email security should be a top priority amidst the pandemic

Thursday, May 14, 2020

Watch out: You’ve got mail

Watch out: You’ve got mail

Tuesday, August 30, 2022

Are fatigued IT teams and WFH employees putting their employers at risk?

Are fatigued IT teams and WFH employees putting their employers at risk?

Wednesday, August 4, 2021

Treat cybersecurity investments as you would grow your savings

Treat cybersecurity investments as you would grow your savings

Wednesday, March 27, 2024

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more
  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more
  • Thai government expands secure email management to close cybersecurity gaps

    Thai government expands secure email management to close cybersecurity gaps

    New measures address cybersecurity gaps in public sector communications, deploying advanced protections and operational support …Read more
  • How Iress optimized global DevSecOps

    How Iress optimized global DevSecOps

    Scaling compliance, security & efficiency – while seamlessly migrating to the cloud – with JFrog.Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.