February was the worst month on record for ransomware attacks – and one threat group had a field day
Security experts warn the volume of ransomware attacks could surge higher


February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
Analysis from the security company shows the number of ransomware attacks reached 962 last month, marking a significant increase on the year prior in which 425 attacks were recorded.
Of those, 335 were claimed by the Ransomware as a Service (RaaS) group Clop - three times as many as the previous month.
Rather than focusing on specific companies or industries, some ransomware groups, such as Clop, are taking an opportunistic approach by targeting newly discovered software vulnerabilities in edge network devices.
In particular, these groups are capitalizing on vulnerabilities that have high-risk Common Vulnerability Scoring System (CVSS) scores that allow attackers to take control of a system through Remote Code Execution (RCE).
They're also after flaws that affect internet-facing systems and software, along with instances where proof of concept of the exploitation has already been published by a developer or malicious actor.
"In less than 24 hours of the vulnerability’s public disclosure, threat actors launch automated scanners that scan the internet and establish remote access to vulnerable systems," researchers said.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"After this initial access blitz comes the second stage of the attack – the manual hacking of the victims. This second stage takes time. Attackers need to figure out which systems are worth their effort, and then they have to manually hack their way deeper, typically using living off the land techniques to evade detection."
This delay means the actual ransomware attack or data theft is likely to take place weeks or even months later.
Ransomware attacks aren't subsiding
Over the last five years, Clop has targeted vulnerabilities in the Accellion File Transfer Appliance (FTA), hitting government agencies and universities.
Two years ago, it exploited a flaw in HelpSystems' GoAnywhere Managed File Transfer (MFT) software, breaching healthcare, financial, and manufacturing organizations.
In January this year the group claimed to have hit nearly 60 companies via vulnerabilities in Cleo enterprise file transfer software.
"In Clop's case, our analysis points to their exploitation of two recent vulnerabilities in Cleo file transfer software, CVE-2024-50623 and CVE-2024-55956. These vulnerabilities, rated 9.8 out of 10 in severity, allowed attackers to run commands on vulnerable systems," said the Bitdefender researchers.
RELATED WHITEPAPER
"Even though these vulnerabilities were revealed in October and December 2024, the manual part of the attack is what takes time, which can explain why we are seeing these victims now."
To protect themselves, Bitdefender said organizations should prioritize patches for actively exploited vulnerabilities and keep themselves informed about known exploits via the CISA KEV catalog. A flexible patching strategy is key to rapid response.
They should proactively search their network for hidden threats, aiming to discover backdoors before attackers launch their main attack.
Naturally, cybersecurity tools play a key role in helping mitigate potential threats posed by ransomware groups. The firm noted that advanced detection systems such as Endpoint Detection and Response (EDR) or Extended Detection and Response (XDR) services are vital.
MORE FROM ITPRO
- The new ransomware groups worrying security researchers in 2025
- Warning issued over prolific 'Ghost' ransomware group
- CISA issued alert over Medusa ransomware exploits
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Jensen Huang says AI will make us busier – so what’s the point?
Opinion So much for efficiency gains and focusing on the more “rewarding” aspects of your job
-
This DeepSeek-powered pen testing tool could be a Cobalt Strike successor
News ‘Villager’, a tool developed by a China-based red team project known as Cyberspike, is being used to automate attacks under the guise of penetration testing.
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.
-
Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model
News Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API.
-
Data I/O shuts down systems in wake of ransomware attack
News Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos