Global and Regional Insights for International Anti-Ransomware Day | #ransomware | #cybercrime


Anti-Ransomware Day was established on May 12 in 2020 by INTERPOL in collaboration with Kaspersky to commemorate the anniversary of the infamous WannaCry ransomware attack that occurred on May 12, 2017. The purpose of Anti-Ransomware Day is to raise global awareness about the threats posed by ransomware and to promote best practices for prevention and response.

With International Anti-Ransomware Day
approaching on May 12, Kaspersky presents its annual report
on the evolving global and regional ransomware cyberthreat landscape.

According to Kaspersky Security Network data,
the Middle East, APAC and African regions are leading by the share of users
attacked by ransomware, with Latin America, CIS (Commonwealth of Independent
States) and Europe trailing behind. Globally from 2023 to 2024 the share of
users affected by ransomware attacks increased to 0.44% by 0.02 p.p. The seemingly small percentage is typical for
ransomware and is explained by the fact that attackers often don’t distribute
this type of malware on a mass scale, but prioritize high-value targets, which
reduces the overall number of incidents.

Share
of users whose computers were attacked by crypto-ransomware, by region
Data from Kaspersky Security Network

In the Middle
East
and Asia-Pacific regions,
ransomware affected a higher share of users due to rapid digital
transformation, expanding attack surfaces and varying levels of cybersecurity
maturity. Enterprises in APAC were heavily targeted, driven by attacks on
infrastructure and operational technology, especially in countries with growing
economies and new data privacy laws.

Ransomware is less prevalent in Africa due to lower levels of
digitization and economic constraints, which reduce the number of high-value
targets. However, as countries like South Africa and Nigeria expand their
digital economies, ransomware attacks are on the rise, particularly in the manufacturing,
financial and government sectors. Limited cybersecurity awareness and resources
leave many organizations vulnerable, though the smaller attack surface means
the region remains behind global hotspots.

Latin
America
also experiences ransomware attacks,
particularly in Brazil, Argentina, Chile and Mexico. Manufacturing, government,
and agriculture, as well as critical
sectors such as energy and retail are targeted, but economic constraints and
smaller ransoms deter some attackers. Despite this, the region’s growing
digital adoption is increasing exposure.

The Commonwealth of Independent States sees a smaller share of users
encountering ransomware attacks. However, hacktivist groups such as Head Mare,
Twelve
and others active in the region often use ransomware such as LockBit 3.0 to
inflict damage on target organizations. Manufacturing, government and retail sectors
are the most targeted, with varying levels of cybersecurity maturity across the
region affecting security




.

Europe
is consistently targeted with ransomware but benefits from robust cybersecurity
frameworks and regulations that deter some attackers. Sectors such as manufacturing,
agriculture, and education are often targeted, but mature incident response and
awareness limit the scale of attacks. The region’s diversified economies and
strong defenses make it less of a focal point for ransomware groups than
regions with rapid, less secure digital growth.

Current and emerging ransomware trends

AI tools were increasingly used in
ransomware development
, as demonstrated by FunkSec,
a ransomware group that emerged in late 2024 and quickly gained notoriety by
surpassing established groups like Cl0p and RansomHub with multiple victims
claimed in December alone. Operating under a Ransomware-as-a-Service (RaaS)
model, FunkSec employs double extortion tactics — combining data encryption
with exfiltration — targeting sectors such as government, technology, finance,
and education in Europe and Asia. The group’s heavy reliance on AI-assisted
tools sets it apart, with its ransomware featuring AI-generated code, complete
with flawless comments, likely produced by Large Language Models (LLMs) to
enhance development and evade detection. Unlike typical ransomware groups
demanding millions, FunkSec adopts a high-volume, low-cost approach with unusually
low ransom demands, further highlighting its innovative use of AI to streamline
operations.

The RaaS (Ransomware-as-a-Service) model
remains the predominant framework for ransomware attacks
,
fueling their proliferation by lowering the technical barrier for
cybercriminals. In 2024, RaaS platforms like RansomHub thrived by offering
malware, technical support and affiliate programs that split the ransom. This
model enables less-skilled actors to execute sophisticated attacks,
contributing to the emergence of multiple new ransomware groups in 2024 alone.

In 2025,
ransomware is expected to evolve by exploiting unconventional vulnerabilities
,
as demonstrated by the Akira gang’s use of a webcam
to bypass endpoint detection and response systems and infiltrate internal
networks. Attackers are likely to increasingly target overlooked entry points
like IoT devices, smart appliances or misconfigured hardware in the workplace,
capitalizing on the expanding attack surface created by interconnected systems.
As organizations strengthen traditional defenses, cybercriminals will refine
their tactics, focusing on stealthy reconnaissance and lateral movement within
networks to deploy ransomware with greater precision, making it harder for
defenders to detect and respond in time.

The
proliferation of LLMs tailored for cybercrime will further amplify ransomware’s
reach and impact
. LLMs marketed on the dark web lower the
technical barrier to creating malicious code, phishing campaigns and social
engineering attacks, allowing even less skilled actors to craft highly
convincing lures or automate ransomware deployment. As more innovative concepts
such as RPA (Robotic Process
Automation
) and LowCode,
which provide an intuitive, visual, AI-assisted drag-and-drop interface for
rapid software development, are quickly adopted by software developers, we can
expect ransomware developers to use these tools to automate their attacks as
well as new code development, making the threat of ransomware even more
prevalent.

Ransomware is one of the most pressing
cybersecurity threats facing organizations today, with attackers targeting
businesses of all sizes and across every region. In our report we highlight
that there is a concerning shift toward exploiting overlooked entry points —
including IoT devices, smart appliances, and misconfigured or outdated
workplace hardware. These weak spots often go unmonitored, making them prime
targets for cybercriminals. To stay secure, organizations need a layered
defense: up-to-date systems, network segmentation, real-time monitoring, robust
backups, and continuous user education. Building cyber awareness at every level
is just as important as investing in the right technology
,” comments Dmitry
Galov, Head of Research Center for Russia and CIS
at Kaspersky’s GReAT.

Read the report on Securelist.com for
the more information about ransomware trends in 2025.

On Anti-Ransomware Day and beyond,
Kaspersky encourages organizations to follow these best practices to safeguard from
ransomware:

  • Enable
    ransomware protection for all endpoints. There is a free Kaspersky Anti-Ransomware Tool for Business that shields computers and servers from ransomware and other
    types of malware, prevents exploits and is compatible with already installed
    security solutions.
  • Always
    keep software updated on all the devices you use to prevent attackers from
    exploiting vulnerabilities and infiltrating your network.
  • Focus
    your defense strategy on detecting lateral movements and data exfiltration to
    the internet. Pay special attention to outgoing traffic to detect
    cybercriminals’ connections to your network. Set up offline backups that
    intruders cannot tamper with. Make sure you can access them quickly when needed
    or in an emergency.
  • Install
    anti-APT and EDR solutions, enabling capabilities for advanced threat discovery
    and detection, investigation and timely remediation of incidents. Provide your
    SOC team with access to the latest threat intelligence and regularly upskill
    them with professional training. All of the above is available within Kaspersky Expert Security framework.
  • Use
    the latest Threat Intelligence information to stay aware of the actual Tactics, Techniques,
    and Procedures (TTPs) used by threat actors.
  • To
    protect the company against a wide range of threats, use solutions from Kaspersky Next product line that provide
    real-time protection, threat visibility, investigation and response
    capabilities of EDR and XDR for organizations of any size and industry.
    Depending on your current needs and available resources, you can choose the
    most relevant product tier and easily migrate to another one if your cybersecurity
    requirements are changing.



Source link

.........................