
April 2025 has seen a surge in ransomware activity, with new victims including a major Dutch food distribution company and a Singapore-based construction firm. The ASEC Blog’s latest report highlights these incidents as part of a broader trend of increasing ransomware attacks across multiple sectors1. The Dutch company was listed as a victim of the INC Ransom group, while the Singapore firm was targeted by the DevMan ransomware operation. These attacks follow a pattern of high-impact incidents observed since early 2024, including the Qilin ransomware’s strikes against Galvatech and SK Group2.
Recent Ransomware Incidents
The attack on the Dutch food distributor marks the third major incident in the European food supply chain this year. Previous targets included cold storage providers in Germany and a dairy cooperative in France. INC Ransom, the group claiming responsibility, has been active since late 2024 and specializes in double extortion tactics3. The Singapore construction company attack by DevMan follows a similar pattern seen in March 2025 when the group compromised an Australian healthcare provider4.
These incidents occur against a backdrop of increasing ransomware sophistication. The first quarter of 2025 saw a 22% increase in ransomware attacks compared to Q4 2024, with average ransom demands reaching $5.2 million5. Healthcare and manufacturing remain prime targets, accounting for 46% of all attacks this year.
Technical Analysis of Current Threats
The INC Ransom group employs a modified version of the Babuk ransomware code, with added capabilities for lateral movement through compromised networks. Their attacks typically begin with phishing emails containing malicious OneNote attachments6. Once executed, the malware disables endpoint protection solutions before encrypting files and exfiltrating data.
DevMan’s approach differs, focusing on exploiting vulnerable internet-facing systems. Recent incidents show their preference for targeting unpatched Fortinet and Citrix devices7. Their ransomware payload includes a unique feature that attempts to identify and encrypt backup repositories before moving on to primary systems.
Group | Victim | Sector | Date |
---|---|---|---|
Qilin | Galvatech | Manufacturing | April 2025 |
Qilin | SK Group | Manufacturing | April 2025 |
INC Ransom | Dutch Food Distributor | Food Supply | April 2025 |
DevMan | Singapore Construction Co. | Construction | April 2025 |
Defensive Recommendations
Organizations should prioritize patching known vulnerabilities in internet-facing systems, particularly those affecting remote access solutions. The following measures can help mitigate ransomware risks:
- Implement application allowlisting to prevent unauthorized executables
- Maintain offline, immutable backups of critical systems
- Enable multi-factor authentication for all remote access points
- Conduct regular phishing awareness training
- Monitor for suspicious network traffic patterns
Recent data shows organizations with comprehensive backup strategies experience 78% faster recovery times following ransomware incidents8. Network segmentation remains one of the most effective controls, limiting lateral movement for attackers who breach perimeter defenses.
Conclusion
The April 2025 ransomware attacks demonstrate the continued evolution of these threats. Groups like INC Ransom and DevMan are refining their tactics to maximize impact and financial gain. While law enforcement efforts have disrupted some operations, the ransomware ecosystem remains robust, with new groups emerging to fill any voids. Organizations must maintain vigilance and implement layered defenses to protect against these persistent threats.
References
- “Ransom & Dark Web Issues Week 4, April 2025,” ASEC Blog, 2025. [Online]. Available: https://asec.ahnlab.com
- “Exclusive: Aussie steel industry provider Galvatech listed by Qilin ransomware,” CyberDaily, Apr. 2025. [Online]. Available: https://www.cyberdaily.au/security/11978-exclusive-aussie-steel-industry-provider-galvatech-listed-by-qilin-ransomware
- “SK Group ransomware attack: Qilin gang claims stolen data,” CyberNews, Apr. 2025. [Online]. Available: https://cybernews.com/news/sk-group-ransomware-attack-qilin-gang-claims-stolen-data/
- “Exclusive: RansomHub lists WA-based Southern Region Medical Group as victim,” CyberDaily, Mar. 2025. [Online]. Available: https://www.cyberdaily.au/security/11819-exclusive-ransomhub-lists-wa-based-southern-region-medical-group-as-victim
- “2024 X-Force Threat Intelligence Index,” Security Intelligence, 2024. [Online]. Available: https://securityintelligence.com/x-force/2024-x-force-threat-intelligence-index/
- “The CDK Global outage: Explaining how it happened,” TechTarget, Jun. 2024. [Online]. Available: https://www.techtarget.com/whatis/feature/The-CDK-Global-outage-Explaining-how-it-happened
- “London hospital cyber attack causing significant impact to services,” Reuters, Jun. 2024. [Online]. Available: https://www.reuters.com/technology/cybersecurity/london-hospital-cyber-attack-causing-significant-impact-services-2024-06-04/
- “Ransomware: True Cost 2024,” Cybereason, 2024. [Online]. Available: https://www.cybereason.com/hubfs/dam/collateral/ebooks/Ransomware-True-Cost-2024-eBook.pdf