Summary
Week 51 of 2025 saw continued escalation in ransomware attacks globally, with Clop ransomware dominating headlines through its exploitation of Oracle E-Business Suite and Gladinet CentreStack vulnerabilities. The United States experienced multiple municipal government attacks, while Europe dealt with healthcare sector breaches. Critical infrastructure remains under threat from pro-Russia hacktivists targeting OT/ICS systems. The automotive sector faces increasing cyber risks with a 39% rise in incidents, and medical device security continues to be a concern with FDA recalls and new regulatory guidance.
Key Statistics: - Global: 4,701 confirmed ransomware incidents (Jan-Sept 2025), 34-50% YoY increase - US: Multiple municipal governments attacked this week (Kaufman County TX, La Vergne TN) - Europe: 288 attacks in Q3 2025; Qilin most active group with 65 victims - Automotive: 409 incidents in 2024 (39% increase); 148 incidents in Q1 2025 alone - Medical Devices: 53% of networked devices have known critical vulnerabilities
1. RANSOMWARE INCIDENTS
1.1 United States
Active Incidents This Week
Clop - Oracle E-Business Suite Campaign (Ongoing) - Over 100 organizations breached via CVE-2025-61882 zero-day - LKQ Corporation: 9,000+ individuals’ data stolen (SSNs, EINs exposed) - Other confirmed victims: Harvard University, University of Pennsylvania, The Washington Post, Logitech, Schneider Electric, Emerson, GlobalLogic, Envoy Air - $10 million US bounty for information linking Clop to nation-state - Source: SecurityWeek
Clop - Gladinet CentreStack Campaign (December 2025) - 200+ potential targets identified via port scans - 9 organizations impacted by Dec 10, 2 new incidents on Dec 15 - CVE-2025-14611 added to CISA KEV on December 15 - Healthcare and technology sectors affected - Source: Bleeping Computer
React2Shell Vulnerability Exploitation (December 2025) - CVE-2025-55182 (CVSS 10.0) actively exploited since Dec 3 - Weaxor ransomware deployed - Attack confirmed on Dec 5 with encryption in under 1 minute - Source: SC Media
Municipal Government Attacks
Kaufman County, Texas (December 16, 2025) - Attack discovered Monday, multiple county systems down - 200,000 residents affected - Sheriff’s Office and emergency services unaffected - Source: The Record
La Vergne, Tennessee (December 2025) - City offices closed since attack discovery - Water bill and property tax systems offline - 40,000+ residents forced to pay by check/money order - Source: The Record
Village of Golf Manor, Ohio (December 2025) - Council authorized $2,000 ransom payment - Source: DataBreaches.net
Trends
- Ransom payment rates at historic low: 23-25%
- Average healthcare ransom dropped 91% to $343,000
- 52% of attacks occur on weekends/holidays
- 70%+ of encryption events occur before 8 AM or after 6 PM
1.2 Europe
Major Incidents
Ireland HSE - Second Attack Disclosed (December 10, 2025) - Second ransomware attack targeting third-party processor (occurred February 2025) - Following 2021 attack that cost €102 million - Source: DataBreaches.net
Collins Aerospace Attack (September 2025 - Ongoing Impact) - HardBit ransomware variant encrypted Domain Controllers - Airports affected: London Heathrow, Brussels, Berlin, Dublin - MUSE check-in platform compromised - One arrest made; ENISA classified as ransomware - 600% increase in aviation cyber-attacks 2024-2025 - Source: Security Affairs
Regional Statistics
- 288 ransomware attacks in Q3 2025
- 92% of cases involved both file encryption and data theft
- Attack deployment speed increased 48% (average: 24 hours)
- 22% of global ransomware victims are European organizations
Most Active Groups in Europe: 1. Qilin (65 victims in Q3 2025) 2. SafePay (rapidly ascending) 3. Akira 4. LockBit 5. RansomHub
Source: Cyble Europe Q3 2025 Report
1.3 Asia
Major Incidents
Asahi Group (Japan) (Ongoing since September 2025) - Qilin ransomware claimed 27GB stolen - 1.9 million individuals’ data potentially exposed - Attack still unresolved; fiscal results delayed - Source: Security Brief Asia
Askul (Japan) (Disclosed December 14, 2025) - Ransomhouse group responsible - 740,000 data sets breached (customers, corporate clients, employees) - Attack discovered October 2025 - Source: DataBreaches.net
Coupang (South Korea) (June-November 2025) - 33 million customers’ data stolen - CEO resigned following breach - Often called “Asia’s Amazon” - Source: TechCrunch
Regional Statistics
- South Korea: 56 attacks through Oct 2025 (highest in 5 years)
- Asia-Pacific: 57,000+ ransomware attacks in H1 2024, pace continued into 2025
- Taiwan: Daily cyberattack attempts in millions
- Source: ASEC Report
1.4 Other Regions
Latin America
- 108% YoY increase in cyber attacks Q1 2025
- Brazil: 549,000 ransomware attempts
- Mexico: 237,000 ransomware attempts
- Average breach cost: $3.81 million (277 days to contain)
- Source: CrowdStrike LATAM Report
Global Major Incidents
Ingram Micro (2025) - SafePay ransomware - 3.5TB data stolen - $136 million daily revenue loss - Global IT distributor
Jaguar Land Rover (UK) (September 2025) - Production stalled for months - £1.5 billion UK government bailout - Most economically devastating automotive cyber incident in British history - Source: Breached Company
2. CYBER-PHYSICAL SYSTEMS (CPS) & INDUSTRIAL CONTROL SYSTEMS (ICS/SCADA)
2.1 United States
CISA Joint Advisory (December 9, 2025)
Pro-Russia Hacktivists Targeting Critical Infrastructure - Joint advisory from CISA, FBI, NSA, DOE, EPA, and international partners - Groups: Cyber Army of Russia Reborn, Z-Pentest, NoName057(16), Sector16 - Exploiting unsecured internet-facing VNC connections to OT systems - Targeted sectors: Energy, Food and Agriculture, Water and Wastewater - Source: CISA Alert
Recommended Mitigations: 1. Reduce internet exposure of OT assets 2. Implement mature asset management with data flow mapping 3. Enforce robust authentication on all OT assets 4. Segment OT from IT networks 5. Establish continuous network monitoring
Water Infrastructure Concerns
- American Water (14 million customers) attacked October 2024
- Municipal Water Authority of Aliquippa (Pittsburgh) - Iran-backed “Cyber Av3ngers” compromised booster station
- Unitronics PLCs targeted, HMI defaced
- Source: CISA
2.2 Europe
Incidents
Netherlands Critical Infrastructure (August 2025) - Hackers exploited flaws in application delivery and remote access systems - Thousands of systems potentially affected globally
Spain/Portugal Power Grid (April 2025) - Millions without power - Investigation ongoing: cyberattack vs technical failure
Spain Bioenergy Plant - RansomHub targeted ICS - SCADA exploitation attempted - Source: The Cyber Express
3. AUTOMOTIVE CYBERSECURITY
3.1 Threat Landscape Overview
2025 Statistics: - 409 documented incidents in 2024 (39% increase from 295 in 2023) - 148 publicly disclosed incidents in Q1 2025 alone - Incidents affecting millions of vehicles tripled: 5% (2023) to 19% (2024) - 85,000+ vulnerable devices exposed worldwide - Source: Upstream 2025 Global Automotive Cybersecurity Report
3.2 Major Incidents
Jaguar Land Rover (September 2025)
- Attack began August 31, 2025
- IT systems shutdown halted assembly lines (~1,000 vehicles/day)
- Dealerships and garages also affected
- Most economically devastating automotive cyber incident in British history
- £1.5 billion UK government bailout required
- Source: Breached Company Analysis
Hyundai AutoEver America (February-March 2025)
- 2.7 million vehicle owners potentially affected
- Unauthorized access Feb 22 - March 2, 2025
- Stolen: names, SSNs, driver’s license information
- Source: SOCRadar
Hertz Data Breach (October-December 2024)
- Clop ransomware via Cleo software vulnerabilities
- 3,400+ Maine residents confirmed affected
- Disclosed February 2025
Volkswagen Group Exposure
- Chaos Computer Club disclosed misconfiguration
- External access to vehicle movement data
- Hundreds of thousands of vehicles affected
- Source: VicOne Report
3.3 EV Charging Infrastructure
Tesla Wall Connector Hack (Pwn2Own Automotive 2025)
- Demonstrated at Pwn2Own Automotive, January 2025
- CVE-2025-8321 - Full remote code execution via charging port
- Attack chain: diagnostic access → firmware downgrade → buffer overflow
- Completed in 18 minutes
- Entry point: Single-Wire Controller Area Network (SWCAN)
- Implications: Access to internal networks, lateral movement potential
- Tesla response: Anti-downgrade measures in newer firmware
- Source: Synacktiv Research
Broader EV Charging Risks
- Sandia National Laboratories research identified multiple attack vectors
- Common impacts: disabling/intercepting vehicle-to-charger communication
- System reconfiguration via compromised Wi-Fi or USB ports
- Potential to jump from charging station to entire charger network via cloud
- Source: VicOne Analysis
3.4 Autonomous Vehicle Threats
2025 AV Security Breaches: - Three sophisticated cyberattacks compromised AV security systems in 2025 - Attack vectors: LiDAR spoofing, firmware weaknesses, network segmentation failures - Unauthorized control of self-driving vehicles demonstrated - Source: CyberPath
4. MEDICAL DEVICE CYBERSECURITY
4.1 Current Threat Landscape
Key Statistics: - 99% of hospitals manage IoMT devices with known exploited vulnerabilities - 53% of networked medical devices have at least one critical vulnerability (FBI) - 1 in 5 connected medical devices run on unsupported operating systems - 1.2 million internet-connected healthcare devices publicly accessible (August 2025) - 93% of organizations experienced at least one cyberattack (avg 43 attacks/org) - 75% increased security budgets, but only 17% feel confident in detection/containment - Source: C2A Security Statistics
4.2 Recent FDA Actions
Heart Pump Controller Recall (October 1, 2025)
- Johnson & Johnson’s Abiomed device recalled
- Concerns device could be hacked
- Users advised to disconnect from network until security fix available
- Source: Healthcare Brew
Historic Device Recalls
St. Jude Medical Pacemakers (Abbott Laboratories) - First FDA cybersecurity-related medical device recall - ~465,000 devices affected in US - Firmware update required via physician visit - Source: Cisco Healthcare Blog
Medtronic MiniMed Insulin Pumps - Class I medical device recall - MiniMed 508 and Paradigm series affected - ~4,000 US patients using affected pumps - Vulnerability in wireless communication between pumps and glucose monitors - Source: FDA Recall
Medtronic Carelink Programmers - Cardiac implantable device programmers affected - Vulnerability in internet connection for software updates - Source: FDA Brief
4.3 FDA 2025 Cybersecurity Guidance
June 2025 Final Guidance: - Title: “Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions” - Requirements since March 2023: - Evidence of cybersecurity in new device submissions - Software Bill of Materials (SBOM) required - Post-market vulnerability monitoring plan - NIST FIPS 140-3 cryptography guidelines recommended - All communication interfaces must be disclosed - Source: C2A Security Analysis
4.4 Healthcare Ransomware Impact
2025 Healthcare Ransomware Statistics: - 293 attacks on hospitals/clinics/direct care providers (Jan-Sept 2025) - 130 attacks on healthcare businesses (30% increase) - Data encryption dropped to 34% (lowest in 5 years, down from 74% in 2024) - Extortion-only attacks tripled to 12% - 58% recovered within a week (up from 21%) - 36% paid ransom (down from 61% in 2022)
Most Active Groups Targeting Healthcare: 1. INC (39 attacks) 2. Qilin (34 attacks) 3. SafePay (21 attacks) 4. RansomHub (13 attacks) 5. Medusa (13 attacks)
Source: Sophos State of Ransomware in Healthcare 2025
5. KEY TAKEAWAYS
For Security Teams
- Clop Remains Dominant: Oracle E-Business Suite and Gladinet CentreStack exploitation ongoing - patch immediately
- Municipal Governments Under Fire: Multiple US cities attacked this week - local government IT teams need support
- Weekend/Holiday Vigilance: 52% of attacks occur during off-hours
- Medical Device Risk: 53% of networked devices have critical vulnerabilities - segment networks
For Strategic Planning
- Automotive Sector Alert: 39% increase in incidents, EV charging infrastructure emerging as target
- Supply Chain Focus: Collins Aerospace and Oracle attacks show third-party risk
- Payment Rates Declining: 23-25% payment rate forcing attackers to new tactics
- OT/ICS Under Threat: Pro-Russia hacktivists actively targeting US critical infrastructure
For Threat Intelligence
- Emerging Groups: NightSpire emerged early 2025 as formidable RaaS player
- Geographic Shifts: Asia-Pacific attacks accelerating, Latin America +108% YoY
- Automotive Zero-Days: 85,000+ vulnerable devices exposed worldwide
- Healthcare Shift: Encryption down to 34%, extortion-only attacks tripling