The global financial sector experienced an unprecedented surge in cyberattacks in 2025, with the total number of incidents more than doubling from 864 in 2024 to 1,858. According to the "2025 Finance Sector Landscape Report" by Check Point Software, this sharp increase was primarily fueled by a 105% rise in Distributed Denial-of-Service (DDoS) attacks. Significantly, the motivation behind many of these attacks shifted from traditional financial gain to ideologically and geopolitically motivated disruption. Hacktivist groups targeted financial institutions to make political statements and deny services to citizens in conflict-ridden regions. In addition to DDoS attacks, the sector also saw a 73% increase in data breaches and leaks, exposing ongoing weaknesses in cloud and supply chain security. The findings paint a picture of a financial industry under siege from a complex mix of state-aligned actors, hacktivists, and sophisticated ransomware gangs.
The report highlights several key trends that defined the threat landscape for the financial sector in 2025.
The most significant trend was the explosion of DDoS attacks, which increased by 105% year-over-year. Unlike typical financially motivated attacks, these were often part of coordinated hacktivist campaigns designed to disrupt services and send a political message. The goal was not to steal money but to make banking portals and payment systems unavailable, impacting the daily lives of citizens in targeted countries.
T1498 - Network Denial of Service.Data breaches and leaks saw a 73% increase, indicating that attackers continue to find and exploit weaknesses in security postures. These incidents were often linked to:
T1199 - Trusted Relationship).The sector recorded 451 ransomware incidents, carried out by mature Ransomware-as-a-Service (RaaS) groups. These actors employed aggressive multi-extortion tactics, including:
T1486 - Data Encrypted for Impact.T1041 - Exfiltration Over C2 Channel followed by threats to publish stolen data.The shift towards disruptive, politically motivated attacks has a unique impact on the financial sector.
Defending against this multi-faceted threat landscape requires a layered approach.
D3-NTA: Network Traffic Analysis to detect signs of ransomware activity, such as lateral movement and large-scale data exfiltration, before the final encryption stage.Strategic mitigations should focus on resilience and reducing the attack surface.
M1031 - Network Intrusion Prevention.M1030 - Network Segmentation), and continuous authentication to limit the blast radius of any single compromise.Deploy dedicated DDoS mitigation services to detect and filter malicious traffic.
Mapped D3FEND Techniques:
Segment networks to limit the blast radius of a ransomware attack and protect critical assets.
Mapped D3FEND Techniques:
Harden cloud configurations to prevent data breaches from misconfigured services.
Mapped D3FEND Techniques:
To combat the 105% surge in DDoS attacks targeting the financial sector, a robust Inbound Traffic Filtering strategy is essential. This goes beyond traditional firewalls. Financial institutions must partner with a specialized, cloud-based DDoS mitigation provider. These services operate at massive scale, allowing them to absorb and 'scrub' terabit-scale volumetric attacks before they reach the institution's own internet circuits. The service should be configured in an 'always-on' mode for critical applications like online banking portals and payment gateways. This ensures that mitigation kicks in automatically and immediately, minimizing downtime. This defensive measure directly counters the Network Denial of Service (T1498) tactic used by hacktivist groups, preserving service availability and public trust in the financial system.
With 451 ransomware incidents hitting the financial sector, having a reliable recovery plan is non-negotiable. The core of this plan is File Restoration, enabled by a modern backup architecture. Financial institutions must implement the 3-2-1 backup rule (3 copies of data, on 2 different media, with 1 copy off-site). Crucially, at least one of these copies must be immutable or air-gapped. Immutability, offered by many modern backup solutions, prevents the backup data itself from being encrypted or deleted by ransomware. An air-gapped copy (e.g., on offline tape or in a logically separate cloud environment with different credentials) provides the ultimate failsafe. Regularly testing the restoration process is just as important as creating the backups. This ensures that in the event of a successful ransomware attack (T1486), the institution can restore its systems and data without paying the ransom, neutralizing the attacker's primary leverage.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats