Palo Alto Networks has released its Unit 42 Extortion and Ransomware Trends report for January to March 2025, highlighting the evolution of threat actors’ tactics. The report reveals that cybercriminals are increasingly using aggressive methods, including collaboration with state-backed groups, to pressure victims into higher payouts. This trend underscores the urgent need for organisations to adopt a defence-in-depth strategy to counter these sophisticated attacks.
In Singapore, ransomware threats are evolving rapidly, with attackers employing increasingly deceptive tactics. Steven Scheurmann, Regional Vice President for ASEAN at Palo Alto Networks, emphasised the importance of a robust defence strategy, stating, “To stay ahead of these sophisticated threats, organisations must employ a defence-in-depth strategy and be prepared to encounter additional forms of pressure from these ransomware actors.”
The report identifies manufacturing as the primary target for ransomware attacks, followed by wholesale and retail, and professional and legal services. Notably, RansomHub has emerged as the leading ransomware variant, marking a significant rise since its first appearance in mid-2024. Additionally, the report highlights the rise of AI-generated insider threat extortion, with North Korean operatives using AI-generated identities to pose as remote IT workers, stealing proprietary code and threatening public leaks.
Philippa Cogswell, Vice President and Managing Partner of Unit 42, Asia-Pacific & Japan, stated, “We’re seeing a clear shift in how ransomware and extortion actors operate globally and across the Asia-Pacific and Japan region. Attackers are shifting from traditional encryption tactics to more aggressive and manipulative methods.”
The report also notes that attackers are increasingly targeting cloud systems and using “EDR killers” to disable endpoint security sensors. As cyber threats continue to escalate, organisations are urged to enhance their cybersecurity measures to protect against these evolving risks.
“`