Ransomware in BFSI: A CISO’s guide to risk, detection, and resilience

Author Hiranmayi Krishnan Cybersecurity Specialist, ManageEngine  

On this page

 
  • Key takeaways for CISOs
  • 2025 ransomware trends: Global overview and BFSI impact
  • Why BFSI remains a prime ransomware target
  • How ransomware tactics have evolved in the financial sector
  • Notable BFSI ransomware attacks in 2025
  • Ransomware prevention strategies for BFSI
  • How SIEM and IAM strengthen ransomware defense in BFSI
  • Frequently asked questions
  • Related solutions
 

Ransomware remained one of the most disruptive cybersecurity threats faced by the BFSI sector in 2025. Escalating in frequency, sophistication, and severity, the sector witnessed a surge of attacks that evolved beyond encryption into multi-layered attack strategies. Attackers combined data exfiltration, operational disruption, and extortion to maximize their impact on financial institutions.

As digital banking ecosystems expanded over the past few years and third-party integrations became more deeply embedded, the BFSI attack surface grew significantly. This complexity, coupled with the sector’s reliance on real-time transactions and strict regulatory requirements, made it particularly vulnerable to ransomware campaigns that exploited both technical and operational gaps. What's even more concerning is that 67% of financial organizations paid the ransom, according to a 2025 survey by Sophos. This is the first time in four years that so many organizations have resorted to paying the ransom instead of recovering their data using backups.

As the ransomware as a service (RaaS) ecosystem expands, no financial institution is immune, regardless of its size or geography. With ransomware attacks centered on data exfiltration and extortion, and the average cost of a financial sector data breach reaching $5.56 million, CISOs must rethink their ransomware resilience strategies in an era defined by multi-extortion, AI-augmented attacks, and deeply interconnected supply chains.

Key takeaways for CISOs

  • The ransomware threat in BFSI continues to escalate: Median ransom demands in financial services reached $3 million in 2025, a 50% increase from 2024.
  • Exploited vulnerabilities and identity attacks dominate initial access: Vulnerability exploitation remains the primary entry point, followed by phishing and credential abuse, highlighting persistent gaps in patching, visibility, and identity security.
  • Double and triple extortion have become the norm: Threat actors now combine encryption with data theft and public exposure threats, making backup-only recovery strategies insufficient.
  • Encryptionless ransomware is growing: Groups like RansomHub and Qilin are increasingly skipping file encryption altogether, focusing on quiet data exfiltration and extortion, a tactic that evades traditional ransomware defenses.
  • Third-party risk is a major attack amplifier: Interconnected vendor ecosystems expand the attack surface, enabling attackers to compromise smaller partners and pivot into larger financial institutions.
  • AI is accelerating attack precision: Advanced phishing, deepfake impersonation, and automated attack workflows are making ransomware campaigns more targeted, scalable, and difficult to detect.

2025 ransomware trends: Global overview and BFSI impact

According to Check Point, 52% of global ransomware incidents were attributed to the United States, while Europe and the United Kingdom together accounted for 18%. The Canadian Centre for Cyber Security reported a 26% average year-over-year increase in ransomware incidents in Canada. Ransomware activity in 2025 remained heavily concentrated in advanced digital economies, where high-value assets, interconnected systems, and complex financial infrastructures create attractive targets. This aligns with findings from the World Economic Forum, which highlights ransomware as one of the most persistent and economically damaging cyberthreats, particularly for sectors managing sensitive data and critical services.

As ransomware activity escalates globally, the BFSI sector stands out as a primary target with heightened exposure. According to Sophos, 59% of ransomware attacks in the financial services sector resulted in data encryption, while 31% of those incidents also involved data exfiltration. The median ransom demand also reached $3 million, the highest figure across all industries surveyed and a 50% increase from 2024. According to SOCRadar, 96.6% of Indian BFSI organizations experienced ransomware attacks, and that the leading ransomware groups targeting them were KillSec (15.83% of observed incidents), FunkSec (10.42%), and RansomHub (7.08%).

As financial ecosystems become more interconnected, the impact of a single ransomware incident can extend beyond the organization to customers, partners, and even affect national financial stability.

Why BFSI remains a prime ransomware target

The BFSI sector presents a unique combination of high-value assets and operational dependencies, making it an attractive target for ransomware groups.

High-value, immediately monetizable data

Banks, insurers, and financial services firms hold customer PII, financial account credentials, loan records, transaction histories, and identity documents. This data can be exploited for identity theft, account takeovers, and financial fraud, or monetized through sale on dark web marketplaces, making it highly valuable to threat actors. This is evidenced by the SOCRadar report referenced earlier, which found that 77% of dark web threats in Indian BFSI organizations involve stolen or leaked databases, reflecting the importance of data as the attacker's target.

Operational intolerance for downtime

Financial institutions are expected to have an infrastructure that's always operational because even a few minutes of downtime translate directly into financial loss, regulatory exposure, and customer displeasure. This urgency makes it more likely for BFSI organizations to pay the ransom, and this disposition is exploited by attackers.

Interconnected third-party ecosystems

Supply chain vulnerabilities are one of the leading cybersecurity risk for organizations, with 54% of large enterprises citing them as their biggest obstacle to cyber resilience. In its report cited above, the Canadian Centre for Cyber Security similarly notes that MSPs and third-party service providers are increasingly targeted because of their expansive client networks and privileged access to sensitive information.

The detection gap

The Sophos survey cited above found that the main vectors for ransomware in the BFSI industry were exploited vulnerabilities (40%), malicious emails (22%), and credential-based attacks (17%). Notably, 44% of organizations cited a lack of protection measures and unknown security gaps as key contributing factors.

Identity-based attack exposure

According to this report, attacks leveraging valid account (MITRE ATT&CK T1078) achieved a 98% success rate in BFSI simulations, with password cracking succeeding in 46% of cases, indicating widespread gaps in identity security controls. This shows that once valid credentials are compromised, many BFSI environments offer limited resistance to lateral movement.

How ransomware tactics have evolved in the financial sector

From encryption to exfiltration

Ransomware attacks in the financial sector are moving beyond traditional file encryption to data theft and extortion. In its Ransomware Threat Outlook 2025 to 2027 report, the Canadian Centre for Cyber Security cited Hunters International—which very likely rebranded to World Leaks—as an example of a RaaS group that had shifted entirely to exfiltration-only attacks, providing a custom-built exfiltration tool to its affiliates. By skipping encryption, attackers reduce operational noise, extend dwell time, and make backups irrelevant as the primary risk shifts to data exposure.

The RaaS industrialization model

The RaaS business model has lowered technical barriers for threat actors, allowing for the proliferation of advanced TTPs that are leveraged against organizations globally. Criminal developers license sophisticated malware payloads, negotiation infrastructure, and dedicated leak site services to affiliates, widening the impact of ransomware.

AI-powered social engineering

In the BFSI sector, AI-generated voice clones in vishing attacks, deepfake video calls impersonating executives, and context-aware phishing emails are increasingly being used to target financial institutions. Apart from these threats, experts in the above-mentioned Canadian Centre for Cyber Security report also identify that LLMs are being leveraged in different stages of the ransomware pipeline, such as conducting vulnerability research, developing malware, implementing social engineering strategies, and automating negotiations with victims.

Multi-extortion and supply chain as attack multipliers

Multi-extortion strategies now include DDoS attacks, contacting third-party entities associated with the victim—including suppliers, partners, or customers—for ransom, and revictimizing organizations using previously stolen data. Simultaneously, supply chain attacks allow threat actors to breach a smaller, less-defended vendor and pivot into the networks of major financial institutions, maximizing impact per breach without the operational cost of directly attacking hardened targets.

Notable BFSI ransomware attacks in 2025

  • The Crypto24 ransomware group attacked an Uruguay-based bank, demanding an undisclosed ransom. After the bank failed to comply within the ten-day deadline, attackers released over 700GB of stolen data, including personal details, financial records, legal agreements, property documents, and credit risk assessments.
  • An India-based life insurance provider fell victim to the Medusa ransomware group, which demanded $500,000 to download stolen data and an additional $500,000 for its deletion. The company conducted an internal investigation, confirmed unauthorized system access, and has appointed a forensic auditor to run a complete investigation.
  • A ransomware attack on a US-based software vendor disrupted over 700 banks and credit unions. The company reportedly paid the ransom, but the breach has impacted 1.64 million individuals as of Feb. 2, 2026.
  • The Chaos ransomware group claimed the theft of 512GB of data from a global online trading broker, including HR information, customer dispute details, trading data, legal advice, and KYC records including customer passport scans.
  • Qilin claimed responsibility for the attack on a Switzerland-based bank, alleging the theft of over 2.5TB of data and nearly 2 million files. The stolen data includes customer passport numbers, account balances, transaction histories, and internal banking tool source code.

Ransomware prevention strategies for BFSI

1. Treat identity as the primary attack surface

Why it matters

Most ransomware attacks originate from compromised credentials, making identity the most exploited entry point.

What to implement

  • Enforce phishing-resistant MFA across all users, systems, and access points, including VPNs and administrative interfaces.
  • Implement privileged access management (PAM) with just-in-time (JIT) access and approval-based workflows for critical actions.
  • Continuously monitor authentication activity for anomalies such as impossible travel, credential stuffing, and brute-force attempts using an UEBA-integrated SIEM solution.
  • Incorporate dark web monitoring to detect exposed credentials early and trigger proactive remediation.
  • Conduct regular red team exercises specifically focused on credential compromise and lateral movement scenarios to validate detection and response capabilities.

2. Shift from backup-centric to data-exfiltration-centric resilience

Why it matters

Modern ransomware prioritizes data theft and extortion, making backup-only strategies insufficient.

What to implement

  • Deploy a DLP solution and integrate it with your SIEM solution to monitor and control outbound data movement.
  • Use UEBA to generate baselines for normal data access and detect anomalies such as bulk downloads or anomalous data transfers.
  • Maintain immutable, segmented, and offline backups, with regular testing to ensure recoverability.
  • Update incident response plans to explicitly address data exfiltration scenarios, including legal, regulatory, and communication workflows.

3. Strengthen third-party and supply chain risk management

Why it matters

Attackers increasingly exploit vendor access to infiltrate financial systems indirectly.

What to implement

  • Maintain a real-time inventory of third-party vendors, categorized by data sensitivity and system access.
  • Enforce strict security requirements for vendors handling financial data—including MFA, credential rotation, network segmentation, and a SIEM solution—for real time monitoring.
  • Establish contractual obligations for rapid breach notification and audit rights.
  • Conduct ransomware-focused tabletop exercises simulating vendor compromise scenarios.

4. Build a ransomware-specific regulatory response framework

Why it matters

Regulatory pressure and reporting obligations significantly influence ransomware response decisions.

What to implement

  • Develop a formal, board-approved ransomware response policy covering ransom payment decisions, legal engagement, and public communications.
  • Predefine regulatory notification workflows across jurisdictions, aligned with reporting timelines.
  • Establish legal and compliance checks, including sanctions screening, before engaging in ransom negotiations.
  • Ensure executive leadership is actively involved in incident decision-making processes through regular drills and reviews.

5. Counter AI-enabled social engineering with layered defenses

Why it matters

AI-driven phishing and impersonation attacks are increasing in precision and effectiveness.

What to implement

  • Conduct advanced simulation exercises, including vishing and AI-driven social engineering scenarios commonly employed against employees of financial institutions.
  • Enforce multi-step verification for high-risk transactions, password resets, and privileged access requests.
  • Define governance policies for the use of AI tools, restricting sensitive data exposure.
  • Deploy CASB solutions to monitor and control unsanctioned AI application usage.
  • Train employees to identify modern phishing tactics, including HTTPS-based deception.

6. Prioritize vulnerability management and patching

Why it matters

Exploited vulnerabilities remain one of the most common ransomware entry points.

What to implement

  • Establish a risk-based patching program prioritizing known exploited vulnerabilities.
  • Perform continuous vulnerability scanning across on-premises, cloud, and vendor-managed environments.
  • Enable automatic updates for critical systems, especially edge devices, VPNs, and remote access infrastructure.
  • Include third-party vendor patch compliance as a contractual requirement and verify it through periodic assessments.

How SIEM and IAM strengthen ransomware defense in BFSI

A SIEM solution with integrated UEBA, DLP, CASB, and dark web monitoring capabilities is central to a ransomware-resilient BFSI security architecture. It provides the real-time contextual intelligence needed to detect what signature-based tools miss: anomalous credential usage, quiet data exfiltration, lateral movement, abnormal file changes, and early indicators of ransomware. By correlating logs and telemetry across on-premises, cloud, and hybrid environments, SIEM solutions transform raw security data into actionable, risk-prioritized alerts.

An IAM solution reinforces this posture by enforcing phishing-resistant MFA, implementing the principles of least privilege, and providing centralized visibility over identity and access activities. Together, SIEM and IAM create the layered defense architecture required to detect, contain, and recover from ransomware attacks before they become a full-blown crisis.

Frequently asked questions

Ransomware in financial services reached a multi-year high in 2025, with various reports showing sustained ransomware activity impacting banking infrastructure, payment systems, and financial platforms.

The most common causes include exploited vulnerabilities in internet-facing systems, phishing and malicious email campaigns, credential theft and abuse, and compromised third-party vendors. These vectors are often amplified by gaps in visibility, delayed patching, and weak identity controls.

Ransom payments in the financial services sector vary widely depending on the scale and impact of the attack, but the median ransom demanded reached $3 million in 2025.

Encryptionless ransomware refers to attacks where threat actors focus on data exfiltration and extortion rather than encrypting systems. For BFSI organizations, this is particularly critical because exposure of financial records, customer data, and internal communications can lead to regulatory penalties, fraud risks, and long-term reputational damage.

Improving ransomware resilience requires a shift to integrated, intelligence-driven security. Organizations should strengthen identity security with MFA, prioritize vulnerability management and patching, monitor for behavioral anomalies, and maintain tested backup and recovery strategies—all supported by continuous monitoring and robust incident response.

Related solutions

ManageEngine AD360 is a unified IAM solution that provides SSO, adaptive MFA, UBA-driven analytics, and RBAC. Manage employees' digital identities and implement the principle of least privilege with AD360.

To learn more,

Sign up for a personalized demo  

ManageEngine Log360 is a unified SIEM solution with UEBA, DLP, CASB, and dark web monitoring capabilities. Detect compromised credentials, reduce breach impacts, and lower compliance risk exposure with Log360.

To learn more,

Sign up for a personalized demo