Rising Cyber Threats in 2025: Key Insights from KELA
In the rapidly evolving landscape of cyber threats, KELA has released its
2025 Midyear Threat Report, shedding light on the disturbing increase in ransomware incidents and infostealer infections. This comprehensive report highlights the critical nature of threats observed in the first half of
2025 and underscores the urgency for organizations to bolster their cybersecurity postures.
Alarming Statistics
The report reveals that
3,662 ransomware victims were documented globally in the first half of 2025. To put this into perspective, this figure represents a
54% increase compared to the same timeframe last year. The data indicates that the
United States accounted for more than half of these victims, hinting at a concentrated attack pattern that mirrors the rising adoption of digital practices across the nation.
Alongside the shocking figures of ransomware, KELA has reported an astonishing
2.67 million machines infected by infostealer malware. This type of malware has infiltrated networks worldwide, leading to the compromise of over
204 million credentials. Notably, the 2024 data stated approximately
4.3 million machines were affected, indicating a continuous upward trend that could escalate if left unchecked.
Evolving Tactics of Cybercriminals
The criminals behind these operations are increasingly employing
multi-extortion tactics, which combine methods such as data theft, credential resale, and even DDoS threats to maximize pressure on victims. The trend illustrates an alarming shift amongst ransomware groups as they become more sophisticated in their execution of attacks. With each passing year, these entities have adapted to exploit vulnerabilities more cleverly, an evolution driven by high-stakes business models found within the underground cybercrime economy.
KELA also emphasizes the growing trend of
hacktivism, a wave driven predominantly by political conflicts. The report notes how hackers are becoming more agile and decentralized, demonstrating opportunistic behaviors that could deepen the impact of their attacks.
The report highlights urgent vulnerabilities that have been exploited, such as
CVE-2025-0282 linked with Ivanti and
CVE-2025-0108 associated with Palo Alto. These vulnerabilities have caught the attention of security analysts, who warn about their increasing exploitation as cyber attackers seek any possible foothold within critical systems.
Recommendations for Organizations
Amidst these gripping statistics and evolving threats, KELA advocates for a proactive approach toward cybersecurity. They assert that organizations must not only increase their security measures but also aim for smarter, more actionable intelligence. Key recommendations from the report include:
- - Enhancing incident response plans to reduce the impact of potential breaches.
- - Strengthening DDoS protection mechanisms to fend off denial-of-service attacks.
- - Prioritizing vulnerability management to address and mitigate newly identified threats.
Proactive cybersecurity measures have transitioned from an optional strategy to a fundamental expectation from stakeholders within different sectors. As organizations navigate this tumultuous terrain of cyber threats, employing real-time, actionable insights can lead to better-prepared security teams, thus mitigating the likelihood of a cyberattack.
Conclusion
The statistics presented by KELA in the
2025 Midyear Threat Report serve as a wake-up call for businesses globally. The unprecedented rise in ransomware and infostealer infections underscores a pressing need for organizations to reassess and fortify their cybersecurity measures. Cybersecurity is no longer a matter of choice—it's pivotal for survival in today’s digital-first world.
For further details, the complete
2025 Midyear Threat Report is available for download on KELA's website, offering deep insights that can aid organizations in their fight against cybercriminals.
About KELA
KELA is known for its comprehensive cyber threat intelligence (CTI) and external attack surface management (EASM) solutions, providing organizations with the necessary tools to mitigate risks effectively. By leveraging vast amounts of intelligence, KELA empowers entities, ranging from global corporations to government agencies, in their quest to shield themselves from ever-evolving cyber threats.