CYFIRMA reported 662 ransomware incidents in March – lower than February but still substantial. Manufacturing and IT companies were affected the most, and the U.S. companies accounted for nearly half of all victims.
New groups such as Arkana, CrazyHunter, and NightSpire arose, while established actors upgraded tools. Black Basta RaaS tooling BRUTED, an automated brute-force framework for targeting VPNs and firewalls, and new backdoors like Betruger – likely to be developed specifically for use in ransomware attacks – supported stealthier intrusions. Attackers increasingly exploit edge devices and IoT hardware, bypassing traditional security layers.
Key Takeaways
Looking Ahead
Organizations should reinforce identity security, accelerate patch cycles, and bolster monitoring across cloud, IoT, and remote-access systems. March 2025 makes one thing clear: the threat landscape is broadening, and defenses must evolve with it.
This entry is published as part of the SOCshare project (No. 101145843), which we are running together with Vilnius City Municipality. It is partly funded by the European Union. The views and opinions expressed are those of the authors alone and do not necessarily reflect those of the European Union or the European Cyber Security Centre of Excellence. Neither the European Union nor the European Cyber Security Centre of Excellence can be held responsible for them.