Financial Sector Cyberattacks Doubled in 2025, Fueled by Geopolitical Hacktivism

Report: Cyberattacks on Financial Sector Doubled in 2025, Driven by 105% Surge in DDoS Attacks

HIGH
February 6, 2026
5m read
CyberattackThreat IntelligenceRansomware

Related Entities

Organizations

Full Report

Executive Summary

The global financial sector experienced an unprecedented surge in cyberattacks in 2025, with the total number of incidents more than doubling from 864 in 2024 to 1,858. According to the "2025 Finance Sector Landscape Report" by Check Point Software, this sharp increase was primarily fueled by a 105% rise in Distributed Denial-of-Service (DDoS) attacks. Significantly, the motivation behind many of these attacks shifted from traditional financial gain to ideologically and geopolitically motivated disruption. Hacktivist groups targeted financial institutions to make political statements and deny services to citizens in conflict-ridden regions. In addition to DDoS attacks, the sector also saw a 73% increase in data breaches and leaks, exposing ongoing weaknesses in cloud and supply chain security. The findings paint a picture of a financial industry under siege from a complex mix of state-aligned actors, hacktivists, and sophisticated ransomware gangs.


Threat Overview

The report highlights several key trends that defined the threat landscape for the financial sector in 2025.

The Rise of Geopolitical DDoS

The most significant trend was the explosion of DDoS attacks, which increased by 105% year-over-year. Unlike typical financially motivated attacks, these were often part of coordinated hacktivist campaigns designed to disrupt services and send a political message. The goal was not to steal money but to make banking portals and payment systems unavailable, impacting the daily lives of citizens in targeted countries.

Persistent Data Breach and Leak Threats

Data breaches and leaks saw a 73% increase, indicating that attackers continue to find and exploit weaknesses in security postures. These incidents were often linked to:

  • Cloud Misconfigurations: Improperly secured cloud storage and services remain a major source of data exposure.
  • Third-Party Ecosystems: Compromises at third-party vendors and partners provided attackers with a pathway into financial institutions' networks (T1199 - Trusted Relationship).

Sophisticated Ransomware Operations

The sector recorded 451 ransomware incidents, carried out by mature Ransomware-as-a-Service (RaaS) groups. These actors employed aggressive multi-extortion tactics, including:

  1. Data Encryption: T1486 - Data Encrypted for Impact.
  2. Data Exfiltration and Leak Threats: T1041 - Exfiltration Over C2 Channel followed by threats to publish stolen data.
  3. DDoS Attacks: Using denial-of-service as additional leverage to force payment.

Impact Assessment

The shift towards disruptive, politically motivated attacks has a unique impact on the financial sector.

  • Erosion of Trust: When banking systems are unavailable, it erodes public trust in the stability of the financial infrastructure, which can have broader economic consequences.
  • Operational Disruption: DDoS attacks cause significant operational disruption, preventing customers from accessing accounts, making payments, and conducting business. This leads to direct costs related to mitigation and customer support.
  • Systemic Risk: Coordinated attacks against multiple financial institutions in a single country can create systemic risk, threatening the functioning of the entire economy.
  • Increased Compliance and Security Costs: The rising tide of attacks forces institutions to invest heavily in advanced security technologies like DDoS mitigation services and cloud security posture management, increasing the cost of doing business.

Detection & Response

Defending against this multi-faceted threat landscape requires a layered approach.

  1. DDoS Detection and Mitigation: Subscribe to a cloud-based DDoS mitigation service that can absorb and scrub large volumes of malicious traffic before it reaches the organization's network. On-premise solutions are often insufficient to handle the scale of modern DDoS attacks.
  2. Cloud Security Posture Management (CSPM): Implement CSPM tools to continuously monitor cloud environments for misconfigurations, public exposures, and overly permissive access rights.
  3. Network Traffic Analysis: Use D3-NTA: Network Traffic Analysis to detect signs of ransomware activity, such as lateral movement and large-scale data exfiltration, before the final encryption stage.
  4. Threat Intelligence Integration: Integrate geopolitical threat intelligence feeds into the security program to anticipate hacktivist campaigns and proactively bolster defenses for assets in at-risk regions.

Mitigation

Strategic mitigations should focus on resilience and reducing the attack surface.

  • DDoS Protection: A robust, hybrid DDoS protection strategy combining on-premise detection with cloud-based scrubbing is essential. This is a form of M1031 - Network Intrusion Prevention.
  • Supply Chain Risk Management: Implement a thorough vendor risk management program. Scrutinize the security posture of all third-party partners and enforce strict security requirements for any vendor connecting to your network or handling your data.
  • Zero Trust Architecture: Adopt a Zero Trust mindset, assuming that no user or device is inherently trustworthy. Enforce strict access controls, network segmentation (M1030 - Network Segmentation), and continuous authentication to limit the blast radius of any single compromise.
  • Immutable Backups: Maintain offline, immutable backups of all critical data and systems. This is the most critical defense against ransomware, ensuring that the organization can recover without paying a ransom.

Timeline of Events

1
January 1, 2025
Throughout 2025, the number of cyber incidents targeting the financial sector rose to 1,858.
2
February 6, 2026
This article was published

MITRE ATT&CK Mitigations

Deploy dedicated DDoS mitigation services to detect and filter malicious traffic.

Mapped D3FEND Techniques:

Segment networks to limit the blast radius of a ransomware attack and protect critical assets.

Mapped D3FEND Techniques:

Harden cloud configurations to prevent data breaches from misconfigured services.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To combat the 105% surge in DDoS attacks targeting the financial sector, a robust Inbound Traffic Filtering strategy is essential. This goes beyond traditional firewalls. Financial institutions must partner with a specialized, cloud-based DDoS mitigation provider. These services operate at massive scale, allowing them to absorb and 'scrub' terabit-scale volumetric attacks before they reach the institution's own internet circuits. The service should be configured in an 'always-on' mode for critical applications like online banking portals and payment gateways. This ensures that mitigation kicks in automatically and immediately, minimizing downtime. This defensive measure directly counters the Network Denial of Service (T1498) tactic used by hacktivist groups, preserving service availability and public trust in the financial system.

With 451 ransomware incidents hitting the financial sector, having a reliable recovery plan is non-negotiable. The core of this plan is File Restoration, enabled by a modern backup architecture. Financial institutions must implement the 3-2-1 backup rule (3 copies of data, on 2 different media, with 1 copy off-site). Crucially, at least one of these copies must be immutable or air-gapped. Immutability, offered by many modern backup solutions, prevents the backup data itself from being encrypted or deleted by ransomware. An air-gapped copy (e.g., on offline tape or in a logically separate cloud environment with different credentials) provides the ultimate failsafe. Regularly testing the restoration process is just as important as creating the backups. This ensures that in the event of a successful ransomware attack (T1486), the institution can restore its systems and data without paying the ransom, neutralizing the attacker's primary leverage.

Sources & References

Financial institutions under the cyberattack whip
IT-Online (it-online.co.za) February 6, 2026
Check Point: Which Cyber Risks Rule the Financial Sector?
Cyber Magazine (cybermagazine.com) February 5, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

DDoShacktivismfinancial servicesCheck Pointcyberattack trendsgeopolitics

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading