Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ghost Identities, Poisoned Accounts, & AI Agent Havoc

November 6, 2025

“I Paid Twice” Phishing Campaign Targets Booking.com

November 6, 2025

Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics

November 6, 2025
Facebook X (Twitter) Instagram
Friday, November 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Leak Site Ransomware Victims Spike 13% in a Year
News

Leak Site Ransomware Victims Spike 13% in a Year

Team-CWDBy Team-CWDNovember 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


European organizations suffered a 13% increase in ransomware over the past year, with UK entities most affected, according to a new CrowdStrike report.

The security vendor’s 2025 European Threat Landscape Report is compiled from analysis of its threat intelligence and threat hunting data.

A review of data leak sites over the period September 2024-August 2025 revealed a double-digit annual increase in European victims, to 1380. After the UK, Germany, Italy, France and Spain were the most targeted nations.

The most targeted sectors were manufacturing, professional services, technology, industrials and engineering, and retail.

Since January 2024, over 2100 victims across Europe were named on extortion leak sites, with 92% involving file encryption and data theft. The region is the second-most targeted globally after North America, with around a fifth (22%) of victims.

Read more on ransomware: Ransomware Payouts Surge to $3.6m Amid Evolving Tactics

CrowdStrike claimed Akira (167) and LockBit (162) were the most successful ransomware groups over the period, followed by RansomHub (141) and INC, Lynx and Sinobi (133).

The report explained that “big-game hunting” (BGH) attacks, where threat actors deliberately target larger companies, are a persistent menace in the region.

That’s partly down to the fact that Europe contains many valuable enterprises, and partly down to geopolitics, as Russian groups are usually the aggressors, it said. They know that European firms are bound by GDPR mandates which can be used as leverage to force them into paying ransoms.

CrowdStrike observed 260 initial access brokers advertising access to over 1400 hacked European organizations.

Across the BGH groups CrowdStrike studied, the following tactics, techniques and procedures (TTPs) were highlighted as most common:

  • Dumping credentials from backup/restore configuration databases
  • Remotely encrypting files, executing ransomware – often from an unmanaged system – and running file encryption outside the targeted system
  • Using access to unmanaged systems to steal data and deploy ransomware
  • Deploying Linux ransomware on VMware ESXi infrastructure

The report also highlighted the growing threat from vishing, popularized by the notorious Scattered Spider outfit which targeted M&S and the Co-op Group, with native speakers used to improve success rates.

CAPTCHA lures, known as “ClickFix” attacks, are also on the rise, typically using phishing emails, malicious advertising (malvertising) and search engine optimization (SEO) poisoning to deliver malware.

Violence on the Rise

Violence-as-a-Service was highlighted in the report as a growing threat, with groups connected to “The Com” and Russia-based Renaissance Spider coordinating physical attacks, arson, kidnappings and extortion using Telegram-based networks.

Often these attacks are tied to theft of cryptocurrency. There have been 17 such attacks since January 2024, including those targeting individuals working in the crypto sector like Bitcoin traders. Most (13) were located in France, including the January 2025 kidnapping of the co-founder of Ledger, a crypto-wallet vendor.

The problems associated with violence-as-a-service groups have increased to the point where Europol was earlier this year forced to create a new taskforce to tackle the threat.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAPT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
Next Article Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation
Team-CWD
  • Website

Related Posts

News

Ghost Identities, Poisoned Accounts, & AI Agent Havoc

November 6, 2025
News

“I Paid Twice” Phishing Campaign Targets Booking.com

November 6, 2025
News

Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics

November 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

Look out for phony verification pages spreading malware

September 14, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.