A new threat intelligence report from KELA, titled "Escalating Ransomware Threats to National Security," reveals a dramatic escalation in ransomware attacks against critical infrastructure. Between January and September 2025, attacks on these sectors surged by 34% compared to the same period in 2024. Critical industries were the victims in 50% of the 4,701 total ransomware incidents recorded globally. The United States was the most impacted nation, suffering approximately 1,000 attacks. The report underscores a significant trend where a small number of prolific ransomware groups, including Qilin, Clop, Akira, Play, and SafePay, are responsible for a disproportionate share of the attacks, indicating a consolidation of power in the cybercrime ecosystem.
The report paints a grim picture of the current ransomware landscape. The total number of attacks rose from 3,219 in 2024 to 4,701 in 2025 for the same nine-month period. Of these, 2,332 targeted critical infrastructure sectors. The manufacturing sector was hit hardest, with a 61% increase in attacks, highlighting its vulnerability to operational disruptions. Other heavily targeted sectors include healthcare, energy, transportation, and finance. KELA's analysis suggests these incidents should be treated as threats to national security, not just financial crimes, due to their potential to disrupt essential services and erode public trust. The geographical distribution of attacks shows a clear focus on Western nations, with the U.S. followed by Canada, Germany, the U.K., and Italy as the most targeted countries.
While the report focuses on trends rather than specific TTPs, the activities of the top groups provide insight into common attack methods:
T1190 - Exploit Public-Facing Application). Other groups like Akira and Qilin frequently gain access through stolen VPN credentials (T1078 - Valid Accounts) or phishing campaigns.T1486 - Data Encrypted for Impact. This is almost always coupled with data theft for double extortion, where attackers threaten to leak stolen data if the ransom is not paid.T1562.001 - Disable or Modify Tools and T1490 - Inhibit System Recovery by deleting volume shadow copies.The 34% surge in attacks on critical infrastructure has profound implications for national security and economic stability. A successful ransomware attack on a manufacturing plant can halt production, causing supply chain disruptions. An attack on a hospital can lead to canceled surgeries and risk to patient lives. An attack on an energy provider could cause power outages. The financial costs are immense, including ransom payments, recovery expenses, and regulatory fines. The report's finding that five groups are responsible for 25% of attacks suggests that focused threat intelligence and law enforcement action against these key players could have a significant impact on reducing the overall threat.
General observables for ransomware activity include:
| Type | Value | Description |
|---|---|---|
file_name |
*.[ext] |
Monitor for mass file renaming with a new, unknown extension (e.g., .akira, .qilin). |
file_name |
*readme.txt |
Monitor for the creation of ransom notes in multiple directories across a file system. |
command_line_pattern |
vssadmin.exe delete shadows /all /quiet |
Command used to delete volume shadow copies to prevent easy recovery. |
process_name |
PsExec.exe, wmic.exe |
Tools commonly used by ransomware groups for lateral movement and remote execution. |
D3-PA: Process Analysis.D3-DO: Decoy Object.D3-NTA: Network Traffic Analysis.D3-FR: File Restoration.M1051 - Update Software).M1032 - Multi-factor Authentication).M1030 - Network Segmentation).Ransomware attacks surged to 50% increase with over 5,000 incidents; Qilin group now leads, and PowerShell is a dominant attack tool.
New data from Cyble indicates a 50% year-over-year increase in ransomware attacks in 2025, with over 5,000 incidents recorded by late October. This is an escalation from the previously reported 34% increase. The Qilin group has solidified its position as the market leader, responsible for a significant portion of recent attacks. A key development in attacker tactics is the widespread adoption of PowerShell, used in nearly 78% of observed campaigns for payload execution. Other prevalent tools include PsExec for lateral movement and SoftPerfect Network Scanner for reconnaissance, indicating a strong 'Living off the Land' approach by threat actors.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats