Ransomware makes up half of malware breaches in APAC

Verizon Business’ new report highlights a sharp rise in system intrusions and ransomware attacks within the APAC region

internet, touch screen, cybersecurity, network, business, businessman, technology, computer, data, security, cybersecurity, cybersecurity, cybersecurity, cybersecurity, cybersecurity, data, data, data, security
Photo: Geralt via Pixabay
Share this article

In the present day and age, it is no news that cybersecurity is a huge concern for businesses. Last week, Verizon Business—the enterprise division of telecommunication company Verizon Communications—released its 2025 Data Breach Investigations Report. This report analysed more than 22,000 security incidents across 139 countries, including 12,195 confirmed data breaches. 

What these attacks are

On the whole, the Asia-Pacific (APAC) region is most susceptible to system intrusion cyberattacks — where hackers break into company systems using stolen credentials, malware, or phishing. Four out of five (83%) of cybersecurity incidents in the region are from such attacks, a significant jump from 2024, where system intrusions only accounted for two out of five (38%) of cybersecurity attacks.

To access company systems, hackers typically rely on a blend of automation, such as bots to test stolen credentials across many websites, and customised attacks where social engineering methods and custom malware may be used to bypass company defences and remain in the system.

Statistics from the Verizon 2025 Data Breach Investigations Report (Photo: Verizon)

How attacks happen

In APAC, system intrusions often begin with stolen credentials or exploited vulnerabilities, then use malware later in the attack to lock or extract data. This year, 83% of breaches involved malware, and more than half of those (51%) were ransomware attacks. That’s higher than the global ransomware average of 44%, indicating that the APAC region is a more suspect to such breaches.

Ransomware involves locking or encrypting a victim’s data and demanding payment to restore access. Just recently, UK chain Marks and Spencers has been implemented in such an attack. This type of attack disproportionately harms small and medium enterprises (SMEs), which often lack the resources to absorb the damage and pay the median ransom demand of US$115,000 (approximately SG$150,300). In Singapore’s context, where SMEs make up 99% of all companies and employ 70% of the workforce, this represents a particularly acute risk. 

Fortunately, the number of victim organisations globally that avoid paying ransoms has increased from 50% two years ago to 64% today.

“Considerable work lies ahead in our journey to secure our digital future. The adoption of cybersecurity practices among both the general public and organizations in Singapore could be better,” said David Koh, Commissioner of Cybersecurity and Chief Executive of the Cyber Security Agency (CSA) of Singapore. “There also remains a shortage of skilled cybersecurity professionals—a challenge that mirrors global trends—despite our efforts to grow our cyber talent pipeline. Meanwhile, the threats we all face will only continue to grow in scale and sophistication.”

“There is no clear finish line (to cybersecurity) — it is an enduring mission that requires sustained effort from all stakeholders, to stay ahead of the ever-evolving cyberthreat landscape.”

What to do

However, amidst this worrying rise in ransomware and system intrusions, the report highlighted a positive: the decrease of social engineering cybersecurity incidents in APAC. Social engineering — where people are manipulated into sharing information, downloading malicious software, or visiting compromising websites — has decreased, accounting for only 20% of breaches in 2025, down from 69% in 2021. While this drop is partly due to the overwhelming surge in other types of breaches (i.e. system intrusion), the absolute number of social engineering breaches have been on the decline since 2021. 

This suggests that mitigation strategies, such as employee cybersecurity trainings and multi-factor authentication software, have shown results. These practices reduce the likelihood of human error, which has long been considered the weakest link in cybersecurity chains. 

At the same time, companies should still exhibit caution. Another trend that the report flags is the doubling of breaches involving third-parties — where a cyberattacker compromises a company through compromising a vendor, supplier, contractor, or partner organisation. As companies expand, supply chain risks should be factored into their cybersecurity strategies, such as setting cybersecurity requirements in vendor contracts, or conducting periodic audits.

“This year’s report reinforces the growing complexity and persistence of cyber threats facing organisations worldwide,” said Robert Le Busque, Regional Vice President, Asia Pacific for Verizon Business.

“In the Asia-Pacific region in particular, external actors are targeting critical infrastructure and exploiting third-party vulnerabilities. The rising incidence of breaches highlights the imperative for businesses to reassess their risk frameworks.”

There is no one-size-fits-all solution to cybersecurity. But the decline in social engineering incidents suggests that defensive measures—such as staff training, system hardening, and authentication protocols—can and do work. As cyber threats continue to evolve, so too must the strategies to counter them. Education, vigilance, and cross-sector collaboration will be key in preparing individuals and organisations alike for an increasingly complex digital future

Share this article