June 2025 Threat Trend Report on Ransomware
The June 2025 threat analysis reveals an increase in new ransomware samples compared to May. The data is based on detection names from AhnLab and information collected from Dedicated Leak Sites (DLS) of ransomware groups. Statistics cover the past six months, showing the total number of ransomware samples collected. The analysis includes a breakdown of companies affected by ransomware attacks, as posted on DLS. While some data collection may be incomplete or delayed for certain ransomware groups, the report provides insights into the current ransomware landscape. A list of affected companies publicly disclosed by various ransomware groups is also included, along with MD5 hashes of notable samples.
AI Analysis
Technical Summary
The June 2025 Threat Trend Report on Ransomware highlights a notable increase in new ransomware samples detected compared to the previous month, May 2025. This analysis is based on detection data from AhnLab and intelligence gathered from Dedicated Leak Sites (DLS) operated by ransomware groups. The report covers a six-month period, providing statistics on the total number of ransomware samples collected and a breakdown of companies affected by ransomware attacks as publicly disclosed on these leak sites. Although some data may be incomplete or delayed due to the nature of data collection from multiple ransomware groups, the report offers valuable insights into the evolving ransomware landscape. The report includes MD5 hashes of notable ransomware samples, which can be used for detection and blocking. The ransomware tactics, techniques, and procedures (TTPs) referenced include MITRE ATT&CK techniques such as T1489 (Service Stop), T1567 (Exfiltration Over Web Service), T1566 (Phishing), T1486 (Data Encrypted for Impact), and T1490 (Inhibit System Recovery), indicating that these ransomware campaigns employ a combination of initial access via phishing, data exfiltration, service disruption, encryption of data, and prevention of recovery mechanisms. The report does not specify particular ransomware families or threat actors but emphasizes the rise in ransomware-as-a-service (RaaS) operations and the use of Dedicated Leak Sites to pressure victims. No known exploits in the wild or CVEs are associated with this report, and no specific affected software versions are identified. The severity is assessed as medium, reflecting the ongoing threat posed by ransomware but without indication of novel or critical vulnerabilities exploited.
Potential Impact
For European organizations, the increase in ransomware samples and attacks poses a significant risk to operational continuity, data confidentiality, and integrity. Ransomware attacks can lead to substantial financial losses due to ransom payments, downtime, regulatory fines (especially under GDPR for data breaches), and reputational damage. The use of Dedicated Leak Sites to publicly disclose victim companies increases pressure on organizations to pay ransoms, potentially exposing sensitive corporate and customer data. The referenced TTPs suggest attackers are not only encrypting data but also exfiltrating it, which raises the risk of data breaches and compliance violations. European entities in critical infrastructure sectors, healthcare, manufacturing, and finance are particularly vulnerable due to their strategic importance and potential impact on public safety and economic stability. The medium severity rating indicates that while the threat is serious, it does not currently involve zero-day exploits or widespread automated exploitation, allowing organizations some time to implement mitigations. However, the trend of increasing ransomware samples and leak site activity signals a persistent and evolving threat landscape that requires proactive defense measures.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the ransomware threat landscape described. Specific recommendations include: 1) Enhance email security to detect and block phishing attempts (T1566), including advanced sandboxing, URL rewriting, and user training focused on spear-phishing awareness. 2) Deploy endpoint detection and response (EDR) solutions capable of identifying ransomware behaviors such as service stoppage (T1489), encryption activities (T1486), and system recovery inhibition (T1490). 3) Implement robust data backup strategies with offline or immutable backups to ensure recovery without paying ransom. 4) Monitor network traffic for signs of data exfiltration over web services (T1567) using network detection tools and anomaly detection. 5) Restrict administrative privileges and segment networks to limit lateral movement and impact scope. 6) Regularly update and patch systems to reduce attack surface, even though no specific CVEs are noted, as ransomware often exploits known vulnerabilities. 7) Establish incident response plans that include ransomware-specific scenarios and coordinate with law enforcement and cybersecurity authorities. 8) Leverage threat intelligence feeds, including MD5 hashes from the report, to update detection signatures and block known ransomware samples. 9) Conduct regular tabletop exercises and penetration testing to assess readiness against ransomware campaigns. These measures, combined with continuous monitoring and user education, will help mitigate the medium-level ransomware threat effectively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium
Indicators of Compromise
- hash: 081f2eeaefe9b51a6f2d2b59eef01b06
- hash: 0c955e9620b7b6147e56096d17161dda
- hash: 1c65d2a20ccf6c6eccdec1cb4a97935c
- hash: 1dc7e57a2c1fb81d7061743847f42881
- hash: 2fa6fdc5de5fadfa693df0e05fe558cd
June 2025 Threat Trend Report on Ransomware
Description
The June 2025 threat analysis reveals an increase in new ransomware samples compared to May. The data is based on detection names from AhnLab and information collected from Dedicated Leak Sites (DLS) of ransomware groups. Statistics cover the past six months, showing the total number of ransomware samples collected. The analysis includes a breakdown of companies affected by ransomware attacks, as posted on DLS. While some data collection may be incomplete or delayed for certain ransomware groups, the report provides insights into the current ransomware landscape. A list of affected companies publicly disclosed by various ransomware groups is also included, along with MD5 hashes of notable samples.
AI-Powered Analysis
Technical Analysis
The June 2025 Threat Trend Report on Ransomware highlights a notable increase in new ransomware samples detected compared to the previous month, May 2025. This analysis is based on detection data from AhnLab and intelligence gathered from Dedicated Leak Sites (DLS) operated by ransomware groups. The report covers a six-month period, providing statistics on the total number of ransomware samples collected and a breakdown of companies affected by ransomware attacks as publicly disclosed on these leak sites. Although some data may be incomplete or delayed due to the nature of data collection from multiple ransomware groups, the report offers valuable insights into the evolving ransomware landscape. The report includes MD5 hashes of notable ransomware samples, which can be used for detection and blocking. The ransomware tactics, techniques, and procedures (TTPs) referenced include MITRE ATT&CK techniques such as T1489 (Service Stop), T1567 (Exfiltration Over Web Service), T1566 (Phishing), T1486 (Data Encrypted for Impact), and T1490 (Inhibit System Recovery), indicating that these ransomware campaigns employ a combination of initial access via phishing, data exfiltration, service disruption, encryption of data, and prevention of recovery mechanisms. The report does not specify particular ransomware families or threat actors but emphasizes the rise in ransomware-as-a-service (RaaS) operations and the use of Dedicated Leak Sites to pressure victims. No known exploits in the wild or CVEs are associated with this report, and no specific affected software versions are identified. The severity is assessed as medium, reflecting the ongoing threat posed by ransomware but without indication of novel or critical vulnerabilities exploited.
Potential Impact
For European organizations, the increase in ransomware samples and attacks poses a significant risk to operational continuity, data confidentiality, and integrity. Ransomware attacks can lead to substantial financial losses due to ransom payments, downtime, regulatory fines (especially under GDPR for data breaches), and reputational damage. The use of Dedicated Leak Sites to publicly disclose victim companies increases pressure on organizations to pay ransoms, potentially exposing sensitive corporate and customer data. The referenced TTPs suggest attackers are not only encrypting data but also exfiltrating it, which raises the risk of data breaches and compliance violations. European entities in critical infrastructure sectors, healthcare, manufacturing, and finance are particularly vulnerable due to their strategic importance and potential impact on public safety and economic stability. The medium severity rating indicates that while the threat is serious, it does not currently involve zero-day exploits or widespread automated exploitation, allowing organizations some time to implement mitigations. However, the trend of increasing ransomware samples and leak site activity signals a persistent and evolving threat landscape that requires proactive defense measures.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the ransomware threat landscape described. Specific recommendations include: 1) Enhance email security to detect and block phishing attempts (T1566), including advanced sandboxing, URL rewriting, and user training focused on spear-phishing awareness. 2) Deploy endpoint detection and response (EDR) solutions capable of identifying ransomware behaviors such as service stoppage (T1489), encryption activities (T1486), and system recovery inhibition (T1490). 3) Implement robust data backup strategies with offline or immutable backups to ensure recovery without paying ransom. 4) Monitor network traffic for signs of data exfiltration over web services (T1567) using network detection tools and anomaly detection. 5) Restrict administrative privileges and segment networks to limit lateral movement and impact scope. 6) Regularly update and patch systems to reduce attack surface, even though no specific CVEs are noted, as ransomware often exploits known vulnerabilities. 7) Establish incident response plans that include ransomware-specific scenarios and coordinate with law enforcement and cybersecurity authorities. 8) Leverage threat intelligence feeds, including MD5 hashes from the report, to update detection signatures and block known ransomware samples. 9) Conduct regular tabletop exercises and penetration testing to assess readiness against ransomware campaigns. These measures, combined with continuous monitoring and user education, will help mitigate the medium-level ransomware threat effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/89032"]
- Adversary
- null
- Pulse Id
- 6877ceeb36b9db9367d14e3b
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash081f2eeaefe9b51a6f2d2b59eef01b06 | — | |
hash0c955e9620b7b6147e56096d17161dda | — | |
hash1c65d2a20ccf6c6eccdec1cb4a97935c | — | |
hash1dc7e57a2c1fb81d7061743847f42881 | — | |
hash2fa6fdc5de5fadfa693df0e05fe558cd | — |
Threat ID: 68780518a83201eaacde16a8
Added to database: 7/16/2025, 8:01:28 PM
Last enriched: 7/16/2025, 8:16:55 PM
Last updated: 7/17/2025, 1:04:10 AM
Views: 4
Related Threats
Infrastructure of Interest: Suspicious Domains
MediumJune 2025 APT Attack Trends Report (South Korea)
MediumJune 2025 Security Issues in Korean & Global Financial Sector
MediumJune 2025 Infostealer Trend Report
MediumThe Solidity Language open-source package was used in a $500,000 crypto heist
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.