India Tops Asia-Pacific Ransomware Attacks, 65% of Firms Paid Ransom in 2025

India has become the Asia-Pacific epicenter for ransomware, with a report showing 65% of affected manufacturing organizations paid ransoms in 2025, averaging $1.35 million. Globally, attacks on manufacturers surged by 56%, with India recording 201 incidents, reflecting its industrial growth and digitalization. Attack methods are diversifying beyond encryption to include data theft and operational disruption, exploiting legacy systems and complex supply chains. The threat is expected to intensify in 2026 with AI-enabled automation and more sophisticated cybercriminal groups targeting the sector.

Key Points: India Asia-Pacific Ransomware Hotspot, 65% Firms Paid in 2025

  • 65% of affected Indian orgs paid ransom
  • Global attacks rose 56% in 2025
  • Avg. ransom payout was $1.35M
  • AI-powered phishing is a growing threat
3 min read

India emerges as Asia-Pacific hotspot for ransomware attacks, 65% manufacturing firms paid ransom in 2025: Report

Report reveals India as Asia-Pacific ransomware epicenter. 65% of affected manufacturing firms paid ransoms, averaging $1.35M, amid a 56% global attack surge.

"India has emerged as the Asia-Pacific epicentre of ransomware activity - Manufacturing Threat Landscape 2025 Report"

New Delhi, April 14

India has emerged as the Asia-Pacific epicentre of ransomware activity, with manufacturing organisations witnessing a sharp rise in both the frequency and impact of cyberattacks, according to the 'Manufacturing Threat Landscape 2025' report.

The report highlighted that globally, attacks on manufacturers increased significantly by 56 per cent, rising from 937 incidents in 2024 to 1,466 in 2025, as threat actors increasingly focus on disrupting operations and exploiting supply chains rather than just stealing data.

The report quoted that "India has emerged as the Asia-Pacific epicentre of ransomware activity, with manufacturing organisations witnessing a marked rise in both frequency and impact. According to the Exposure Management Research report, for the full year of 2025, 65 per cent of affected Indian organisations paid ransoms, with average payouts reaching USD 1.35 million."

It also shared that India recorded 201 ransomware incidents, making it one of the most targeted regions, reflecting its growing industrial scale and rapid digitalisation.

While the United States reported the highest number of incidents at 713, similar trends were observed across Europe and the UK, where attacks have disrupted sectors such as automotive, aerospace, and logistics.

It further highlighted the intensity of cyber threats, noting that industrial manufacturing organisations in India faced up to 2,786 cyberattacks per week over the past six months.

Ransomware remained the primary attack vector, accounting for 890 incidents in the manufacturing sector. However, attack methods are becoming more sophisticated and diverse.

Exploited vulnerabilities accounted for 32 per cent of attacks, particularly targeting legacy systems and internet-facing applications. Phishing campaigns made up 23 per cent, with increasing use of AI to create highly personalised attacks.

Other entry points included compromised credentials traded on the dark web, as well as supply chain and remote access vulnerabilities that allow attackers to move across IT and operational technology environments.

The report noted that cyberattacks are evolving beyond traditional encryption-based ransomware to include data exfiltration, extortion-only models, and direct disruption of operations.

It also highlighted that the manufacturing remains particularly vulnerable due to several structural challenges. These include legacy operational technology infrastructure such as PLCs (Programmable Logic Controllers), SCADA (Supervisory Control and Data Acquisition), and IoT (Internet of Things), which were not designed with modern cybersecurity measures.

Expanding supply chains have also created additional entry points for attackers, while the rise of ransomware-as-a-service models has enabled cybercriminals to scale their operations rapidly.

The sector is now being targeted by both financially motivated ransomware groups and geopolitically aligned actors.

Groups such as Akira, Qilin, and Play ransomware have been actively targeting manufacturing networks, while hacktivist and state-linked groups, including NoName057(16) and China-linked actors, are engaging in denial-of-service attacks and operational disruption.

Looking ahead, the report warned that cyber threats targeting manufacturing are expected to intensify in 2026, driven by AI-enabled attack automation, faster execution cycles, and a growing focus on data extortion.

- ANI

Share this article:

Reader Comments

P
Priyanka N
My husband works in an auto parts plant. They still use Windows XP on some machines! Management says upgrading is too expensive, but a $1.35 million ransom is okay? The math doesn't add up. Legacy systems are a ticking time bomb.
A
Aman W
Digital India needs Secure India first. We are pushing for Industry 4.0 and IoT, but the basic security hygiene is missing. The government should make cybersecurity audits mandatory for all MSMEs getting any subsidy or support.
S
Sarah B
Working for a multinational here, the difference in security culture is stark. In India, the focus is always on production uptime, not security. Until CEOs see cybersecurity as critical to operations, not just an IT cost, this will continue. Respectfully, the report is spot on.
K
Karthik V
State-linked actors mentioned... this is concerning. It's not just about money, it's about disrupting our economic growth. We need to develop our own indigenous security solutions and reduce dependence. Make in India should also mean Secure in India.
N
Nisha Z
Phishing with AI? Scary! My dad's small engineering unit got a very convincing fake invoice last month. They almost paid. Training for all employees, from manager to machine operator, is so important. Awareness is the first firewall.

We welcome thoughtful discussions from our readers. Please keep comments respectful and on-topic.

Leave a Comment

Minimum 50 characters 0/50