Ransomware Attacks on Critical Industries Skyrocket by 34%, KELA Reports

KELA Report Finds Ransomware Attacks on Critical Infrastructure Surged 34% in 2025, with U.S. as Top Target

HIGH
October 21, 2025
October 25, 2025
m read
RansomwareThreat IntelligenceCyberattack

Related Entities(initial)

Threat Actors

AkiraClopPlayQilinSafePay

Organizations

KELA

Other

United States

Full Report(when first published)

Executive Summary

A new threat intelligence report from KELA, titled "Escalating Ransomware Threats to National Security," reveals a dramatic escalation in ransomware attacks against critical infrastructure. Between January and September 2025, attacks on these sectors surged by 34% compared to the same period in 2024. Critical industries were the victims in 50% of the 4,701 total ransomware incidents recorded globally. The United States was the most impacted nation, suffering approximately 1,000 attacks. The report underscores a significant trend where a small number of prolific ransomware groups, including Qilin, Clop, Akira, Play, and SafePay, are responsible for a disproportionate share of the attacks, indicating a consolidation of power in the cybercrime ecosystem.

Threat Overview

The report paints a grim picture of the current ransomware landscape. The total number of attacks rose from 3,219 in 2024 to 4,701 in 2025 for the same nine-month period. Of these, 2,332 targeted critical infrastructure sectors. The manufacturing sector was hit hardest, with a 61% increase in attacks, highlighting its vulnerability to operational disruptions. Other heavily targeted sectors include healthcare, energy, transportation, and finance. KELA's analysis suggests these incidents should be treated as threats to national security, not just financial crimes, due to their potential to disrupt essential services and erode public trust. The geographical distribution of attacks shows a clear focus on Western nations, with the U.S. followed by Canada, Germany, the U.K., and Italy as the most targeted countries.

Technical Analysis

While the report focuses on trends rather than specific TTPs, the activities of the top groups provide insight into common attack methods:

Impact Assessment

The 34% surge in attacks on critical infrastructure has profound implications for national security and economic stability. A successful ransomware attack on a manufacturing plant can halt production, causing supply chain disruptions. An attack on a hospital can lead to canceled surgeries and risk to patient lives. An attack on an energy provider could cause power outages. The financial costs are immense, including ransom payments, recovery expenses, and regulatory fines. The report's finding that five groups are responsible for 25% of attacks suggests that focused threat intelligence and law enforcement action against these key players could have a significant impact on reducing the overall threat.

Cyber Observables for Detection

General observables for ransomware activity include:

Type Value Description
file_name *.[ext] Monitor for mass file renaming with a new, unknown extension (e.g., .akira, .qilin).
file_name *readme.txt Monitor for the creation of ransom notes in multiple directories across a file system.
command_line_pattern vssadmin.exe delete shadows /all /quiet Command used to delete volume shadow copies to prevent easy recovery.
process_name PsExec.exe, wmic.exe Tools commonly used by ransomware groups for lateral movement and remote execution.

Detection & Response

  1. Behavioral Analysis: Deploy EDR solutions that use behavioral analysis to detect ransomware activities. This includes monitoring for rapid file encryption, deletion of shadow copies, and attempts to disable security tools. This is a core function of D3-PA: Process Analysis.
  2. Decoy Files: Place decoy files (honeypots) on file shares and endpoints. Use file integrity monitoring to create a high-priority alert if these files are modified or encrypted, as no legitimate process should ever touch them. This is a form of D3-DO: Decoy Object.
  3. Network Segmentation: Monitor traffic between network segments. A sudden increase in SMB/RPC traffic from a workstation to multiple servers can be an indicator of a ransomware worm spreading. This falls under D3-NTA: Network Traffic Analysis.

Mitigation

  • Data Backup and Recovery: The most critical defense is a robust backup strategy. Maintain offline and immutable backups of critical data so that you can recover without paying a ransom. Regularly test your restoration process. This is the primary goal of D3-FR: File Restoration.
  • Patch Management: Proactively patch vulnerabilities, especially on internet-facing systems, to prevent the initial access methods used by groups like Clop (M1051 - Update Software).
  • Multi-Factor Authentication (MFA): Enforce MFA on all remote access points, such as VPNs and RDP, to defend against stolen credential attacks (M1032 - Multi-factor Authentication).
  • Network Segmentation: Segment networks to contain the spread of ransomware. Prevent workstations from communicating directly with each other and restrict server-to-server communication to only what is necessary (M1030 - Network Segmentation).

Timeline of Events

1
January 1, 2025
Start of the nine-month period analyzed by KELA for its ransomware report.
2
September 30, 2025
End of the nine-month period analyzed by KELA for its ransomware report.
3
October 21, 2025
This article was published

Article Updates

October 25, 2025

Severity increased

Ransomware attacks surged to 50% increase with over 5,000 incidents; Qilin group now leads, and PowerShell is a dominant attack tool.

New data from Cyble indicates a 50% year-over-year increase in ransomware attacks in 2025, with over 5,000 incidents recorded by late October. This is an escalation from the previously reported 34% increase. The Qilin group has solidified its position as the market leader, responsible for a significant portion of recent attacks. A key development in attacker tactics is the widespread adoption of PowerShell, used in nearly 78% of observed campaigns for payload execution. Other prevalent tools include PsExec for lateral movement and SoftPerfect Network Scanner for reconnaissance, indicating a strong 'Living off the Land' approach by threat actors.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

AkiraClopCriticalInfrastructureCyberattackKELAQilinRansomware

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading