Sophos, a global leader of innovative security solutions for defeating cyberattacks, today announced new findings from the Sophos State…Sophos, a global leader of innovative security solutions for defeating cyberattacks, today announced new findings from the Sophos State…

Manufacturing industry shows stronger early detection of ransomware, blocks more attempts- Sophos report

2025/12/06 14:30

Sophos, a global leader of innovative security solutions for defeating cyberattacks, today announced new findings from the Sophos State of Ransomware in Manufacturing and Production 2025 report. 

The study reveals that manufacturers are stopping more ransomware attacks before data can be encrypted; however, adversaries are increasingly stealing data and using extortion-only tactics to maintain pressure. 

As a result, more than half of manufacturing organizations impacted by encryption paid the ransom despite progress in defensive measures. The report is based on an independent survey of 332 manufacturing organizations that were hit by ransomware in the last year. 

Sophos Report finds education sector strengthening against ransomware, but IT teams pay personal priceSophos logo

The Sophos State of Ransomware in Manufacturing and Production report found: 

●      Encryption rates are falling, but adversaries are shifting tactics: 40% of attacks on manufacturers resulted in data encryption, the lowest level in five years and down from 74% last year. However, extortion only attacks surged to 10% from just 3% in 2024 as attackers increase reliance on data theft for leverage.

●      Data theft remains a significant concern: 39% of manufacturers that experienced encryption also had data stolen, one of the highest rates across all surveyed sectors.

●      More organizations are stopping attacks before encryption: 50% of manufacturing organizations stopped the attack before data could be encrypted, more than double last year’s 24%.

●      Expertise shortfalls and inadequate protection fuel attacks: Lack of expertise was cited by 42.5% of organizations. Unknown security gaps were cited by 41.6%, and a lack of protection by 41%. Respondents identified an average of three internal factors that contributed to the attack.

●      More than half of manufacturers with encrypted data paid the ransom: 51% of affected organizations paid the ransom. The median ransom paid was $1 million dollars, compared to a median demand of $1.2 million dollars.

●      Recovery costs and timelines are improving: The average cost to recover from a ransomware attack, excluding ransom payment, declined by 24% to $1.3 million dollars. 58% of manufacturers fully recovered within one week, up from 44% last year.

●      Ransomware incidents affect IT and security teams: 47% of manufacturers reported increased team stress after experiencing data encryption. 44% said pressure from senior leaders increased, and 27% reported leadership change as a result of the attack.

“Manufacturing depends on interconnected systems where even brief downtime can stop production and ripple across supply chains,” said Alexandra Rose, Director of Threat Research, Sophos Counter Threat Unit. “Attackers exploit this pressure: despite encryption rates falling to 40%, the median ransom paid still reached $1 million. While half of manufacturers stopped attacks before encryption, recovery costs average $1.3 million and leadership stress remains high. Layered defenses, continuous visibility, and well-rehearsed response plans are essential to reduce both operational impact and financial risk.”

What Sophos is Seeing in Manufacturing

Over the past twelve months, Sophos X-Ops has observed ransomware activity across leak sites and found that 99 distinct threat groups targeted manufacturing organizations. 

The most prominent groups targeting manufacturing organizations based on leak site observations are GOLD SAHARA (Akira), GOLD FEATHER (Qilin) and GOLD ENCORE (PLAY).  Reflecting the trends revealed in the report, in over half of the ransomware incidents that 

Sophos Emergency Incident Response was brought in to remediate, attackers both stole and encrypted data, highlighting the use of double extortion tactics where data is held for ransom and threatened with release on a leak site. 

Strengthening Defences for the Long Term

Based on its experience protecting manufacturing organizations worldwide, Sophos recommends the following best practices to help businesses stay ahead of ransomware and other cyberthreats:

●      Eliminate Root Causes: Take proactive steps to address common technical and operational weaknesses—such as exploited vulnerabilities—that adversaries frequently target. Solutions like Sophos Managed Risk can help organizations assess their exposure and reduce risk across their environments.

●      Defend Every Endpoint: Ensure all endpoints, including servers, are protected with dedicated anti-ransomware defenses to prevent attacks from gaining a foothold.

●      Plan and Prepare: Establish and routinely test a comprehensive incident response plan. Maintain reliable backups and practice data restoration regularly to minimize downtime in the event of an attack.

●      Monitor Around the Clock: Continuous visibility is essential. Organizations without in-house resources can strengthen their resilience by partnering with a trusted Managed Detection and Response (MDR) provider for 24/7 threat monitoring and expert response.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist

Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist

Major breakthrough in $243M crypto heist as suspect arrested! $18.58M in crypto seized, linked to suspected hacker’s wallet. Dubai villa raid leads to possible arrest of crypto thief. A major breakthrough in the investigation into the $243 million crypto theft has emerged, as blockchain investigator ZachXBT claims that a British hacker, suspected of orchestrating one of the largest individual thefts in crypto history, may have been arrested. On December 5, ZachXBT revealed in a Telegram post that Danny (also known as Meech or Danish Zulfiqar Khan), the primary suspect behind the attack, was likely apprehended by law enforcement. ZachXBT pointed to a significant find: approximately $18.58 million worth of crypto currently sitting in an Ethereum wallet linked to the suspect. The investigator claimed that several addresses connected to Zulfiqar had consolidated funds to this address, mirroring patterns previously seen in law enforcement seizures. This discovery has raised suspicions that authorities may have closed in on the hacker. Moreover, ZachXBT mentioned that Zulfiqar was last known to be in Dubai, where it is alleged that a villa was raided, and multiple individuals associated with the hacker were arrested. He also noted that several contacts of Zulfiqar had gone silent in recent days, adding to the growing belief that law enforcement had made a major move against the hacker. However, no official statements from Dubai Police or UAE regulators have confirmed the arrest, and local media reports remain silent on the matter. Also Read: Song Chi-hyung: The Visionary Behind Upbit and the Future of Blockchain Innovation The $243 Million Genesis Creditor Heist: How the Attack Unfolded The arrest of Zulfiqar may be linked to one of the largest known individual crypto heists. In September 2024, ZachXBT uncovered that three attackers were involved in stealing 4,064 BTC (valued at $243 million at the time) from a Genesis creditor. The attack was carried out using sophisticated social engineering tactics. The hackers impersonated Google support to trick the victim into resetting two-factor authentication on their Gemini account, giving them access to the victim’s private keys. From there, they drained the wallet, moving the stolen BTC through a complex network of exchanges and swap services. ZachXBT previously identified the suspects by their online handles, “Greavys,” “Wiz,” and “Box,” later tying them to individuals Malone Lam, Veer Chetal, and Jeandiel Serrano. The U.S. Department of Justice later charged two of the suspects with orchestrating a $230 million crypto scam involving the theft. Further court documents revealed that the criminals had used a mix of SIM swaps, social engineering, and even physical burglaries to carry out the theft, spending millions on luxury items like cars and travel. ZachXBT’s tracking work has played a key role in uncovering several related thefts, including a $2 million scam in which Chetal was involved while out on bond. The news of Zulfiqar’s potential arrest could mark a significant turning point in the investigation, although full details are yet to emerge. Also Read: Kevin O’Leary Warns: Only Bitcoin and Ethereum Will Survive Crypto’s Reality Check! The post Suspected $243M Crypto Hacker Arrested After Major Breakthrough in Global Heist appeared first on 36Crypto.
Share
Coinstats2025/12/06 18:27
Breaking: CME Group Unveils Solana and XRP Options

Breaking: CME Group Unveils Solana and XRP Options

CME Group launches Solana and XRP options, expanding crypto offerings. SEC delays Solana and XRP ETF approvals, market awaits clarity. Strong institutional demand drives CME’s launch of crypto options contracts. In a bold move to broaden its cryptocurrency offerings, CME Group has officially launched options on Solana (SOL) and XRP futures. Available since October 13, 2025, these options will allow traders to hedge and manage exposure to two of the most widely traded digital assets in the market. The new contracts come in both full-size and micro-size formats, with expiration options available daily, monthly, and quarterly, providing flexibility for a diverse range of market participants. This expansion aligns with the rising demand for innovative products in the crypto space. Giovanni Vicioso, CME Group’s Global Head of Cryptocurrency Products, noted that the new options offer increased flexibility for traders, from institutions to active individual investors. The growing liquidity in Solana and XRP futures has made the introduction of these options a timely move to meet the needs of an expanding market. Also Read: Vitalik Buterin Reveals Ethereum’s Bold Plan to Stay Quantum-Secure and Simple! Rapid Growth in Solana and XRP Futures Trading CME Group’s decision to roll out options on Solana and XRP futures follows the substantial growth in these futures products. Since the launch of Solana futures in March 2025, more than 540,000 contracts, totaling $22.3 billion in notional value, have been traded. In August 2025, Solana futures set new records, with an average daily volume (ADV) of 9,000 contracts valued at $437.4 million. The average daily open interest (ADOI) hit 12,500 contracts, worth $895 million. Similarly, XRP futures, which launched in May 2025, have seen significant adoption, with over 370,000 contracts traded, totaling $16.2 billion. XRP futures also set records in August 2025, with an ADV of 6,600 contracts valued at $385 million and a record ADOI of 9,300 contracts, worth $942 million. Institutional Demand for Advanced Hedging Tools CME Group’s expansion into options is a direct response to growing institutional interest in sophisticated cryptocurrency products. Roman Makarov from Cumberland Options Trading at DRW highlighted the market demand for more varied crypto products, enabling more advanced risk management strategies. Joshua Lim from FalconX also noted that the new options products meet the increasing need for institutional hedging tools for assets like Solana and XRP, further cementing their role in the digital asset space. The launch of options on Solana and XRP futures marks another step toward the maturation of the cryptocurrency market, providing a broader range of tools for managing digital asset exposure. SEC’s Delay on Solana and XRP ETF Approvals While CME Group expands its offerings, the broader market is also watching the progress of Solana and XRP exchange-traded funds (ETFs). The U.S. Securities and Exchange Commission (SEC) has delayed its decisions on multiple crypto-related ETF filings, including those for Solana and XRP. Despite the delay, analysts anticipate approval may be on the horizon. This week, REX Shares and Osprey Funds are expected to launch an XRP ETF that will hold XRP directly and allocate at least 40% of its assets to other XRP-related ETFs. Despite the delays, some analysts believe that approval could come soon, fueling further interest in these assets. The delay by the SEC has left many crypto investors awaiting clarity, but approval of these ETFs could fuel further momentum in the Solana and XRP futures markets. Also Read: Tether CEO Breaks Silence on $117,000 Bitcoin Price – Market Reacts! The post Breaking: CME Group Unveils Solana and XRP Options appeared first on 36Crypto.
Share
Coinstats2025/09/18 02:35