Lessons Learned from Top 10 Ransomware Incidents in 2025

To no surprise, ransomware continued to disrupt organizations across every sector in 2025.

Although each incident looked different, most shared the same root causes: weak access controls, overly trusted internal networks, and limited protection around sensitive data systems.

Listed below ten of the year's most significant ransomware incidents, followed by the patterns behind them and the security gaps they exposed — and how Mamori.io helps organizations strengthen resilience where it matters most.

TABLE OF CONTENTS

Top 10 Ransomware Incidents of 2025

Similarities & Patterns Across These Attacks

Security Gaps Exposed — and How Mamori.io Helps Close Them


No Cost, Big Protection.

Download Mamori Freemium and begin securing your network, users, and databases with zero-trust.

Get Mamori Freemium

Top 10 Ransomware Incidents of 2025

1. Jaguar Land Rover (UK)

When: Early September 2025

Impact: Severe Operational Impact and Economic Damage

A cyberattack caused weeks-long shutdowns across multiple UK manufacturing plants. Analysts estimate over $2.5 billion in economic damage, making it one of the UK’s most expensive cyber events ever. A stark reminder of how operational technology (OT) can be crippled by ransomware-related breaches.

2. Marks & Spencer (UK)

When: Infiltrated in February, Ransomware in April 2025

Impact: Major Business Disruption

Attackers infiltrated M&S as early as February, stole Active Directory password data, cracked credentials, and shut down online ordering. The attack caused hundreds of millions in losses and a significant drop in market value — all starting from a help-desk social-engineering exploit.

3. Asahi Group (Japan)

When: Late September 2025

Impact: High Data Exposure Risk

A ransomware attack affected ordering, distribution, and customer support across Japan. Over 1.5 million customer records may have been exposed, with operational recovery expected to extend into 2026.

4. CodeRED (United States)

When: November 2025

Impact: Critical Public Safety Outage

The emergency-alert platform used by thousands of local governments was compromised by ransomware, leading to nationwide disruptions. Even worse: backups were over six months old, forcing permanent data loss. The incident highlighted ransomware’s ability to threaten public safety infrastructure.

5. Nevada State Government (United States)

When: August 2025

Impact: Statewide Service Interruption

A state employee inadvertently downloaded a spoofed administrative tool infected with malware — triggering a statewide ransomware incident. DMV systems, background checks, and other services were offline for nearly a month. Recovery cost ~$1.5M and required 28 days despite the state choosing not to pay ransom.

6. Collins Aerospace / European Airports (EU)

When: September 2025

Impact: International Travel Disruption

Ransomware at Collins Aerospace disrupted the MUSE operations platform used by multiple European airports. Check-in systems went offline, manual processing caused travel chaos, and the incident revealed how deeply ransomware can spread through supply-chain software.

7. Kettering Health (United States)

When: May 2025

Impact: Healthcare Service Outage + Data Theft

A ransomware attack on Kettering Health in Ohio forced hospitals into emergency routing mode, cancelled elective procedures, and later confirmed that sensitive patient data had been stolen. The incident demonstrated again why healthcare remains one of ransomware’s most targeted industries.

8. DaVita Dialysis (United States)

When: April 2025

Impact: Large-Scale Data Breach

The Interlock ransomware group stole 1.5 TB of data from DaVita’s systems, affecting more than 900,000 patients. Even without visible encryption or downtime, the massive data-theft operation underscores ransomware’s shift to “extortion-first” business models.

9. Dairy Farmers of America (United States)

When: June 2025

Impact: Food Supply Chain Disruption

The Play ransomware group targeted North America’s largest dairy cooperative. Manufacturing operations were disrupted, and personal data from thousands of employees and members was leaked. The attack showed how food supply chains remain a prime and vulnerable target.

10. Union County, Ohio (United States)

When: September 2025

Impact: Significant Local Government Data Exposure

A ransomware attack exposed personal and financial records for roughly 45,000 residents and employees. As with many local governments, limited resources made response and recovery more difficult.

Similarities & Patterns Across These Attacks

When analyzing the top ransomware events of 2025, we can see several clear patterns. They reflect systemic weaknesses in how organizations manage identity, data, and third-party access.

1. Attackers used simple entry points

Attackers rarely rely on advanced exploits. They relied on human error and weak credentials such as:

  • Phishing

  • Social engineering of IT help desks

  • Stolen or cracked credentials

  • Exposed ports or misconfigured services

2. Privileged access was the key target

Attackers focused heavily on administrative accounts. Once they obtained privileged access, they could move unhindered across internal systems. They targeted:

  • Active Directory (AD)

  • Password vaults

  • Database credentials

In several attacks, once AD was compromised, the attackers effectively owned the entire environment.

3. Data theft and extortion is part of nearly every attack

Ransomware is no longer just about encrypting systems. They almost always:

  • Steal and encrypt data

  • Encrypt and lock systems

  • Threaten public leaks

  • Sometimes add DDoS for pressure

Healthcare and local government victims suffered particularly severe exposure and compliance risks.

4. Supply-chain, critical infrastructure, and governments are becoming prime targets

Ransomware increasingly targeting entities where disruption can impact thousands of customers or residents. In other words, they are targeting sectors where disruption is most costly:

  • Downtime affects public safety

  • Legacy systems are common

  • Operational recovery is slow

  • Organizations feel pressure to respond quickly

Because downtime in these sectors is extremely costly, organizations face greater pressure to pay the ransom in order to restore operations quickly.

5. Backups often failed in practice

Several organizations had backups that failed. As a result, recovery took weeks — and in some cases, critical data was lost. The average recovery ranged from weeks to months — even among large global brands. The biggest failures came from:

  • Outdated backups

  • Backups stored on reachable networks

  • Lack of tested RTO/RPO

  • Inability to assess what needed restoring

The CodeRED incident is the clearest case: losing six months of data permanently.

6. Internal networks were too open

Once attackers gained entry, they had few obstacles preventing movement to other systems. Most internal environments still assume that anything inside the perimeter is trustworthy.

  • They faced few barriers to move laterally

  • They could reach critical systems directly

  • Database servers were often accessible from broad internal ranges

  • Monitoring of internal movement was limited or nonexistent

A trusted internal network creates the perfect conditions for ransomware to spread.

Security Gaps Exposed — and How Mamori.io Helps Close Them

These incidents make one thing clear: organizations need stronger controls around identity, access, and data — especially at the database layer. Traditional perimeter security is not enough. Attackers are already finding ways around it.

Mamori.io focuses on areas most often exploited during ransomware events: privileged access, database access, and lateral movement into sensitive systems.

Below are the key gaps and how Mamori.io addresses them.

1. Trusted internal network models

Most networks environments still treat internal networks as inherently safe, which makes lateral movement easy.

How Mamori.io helps:

2. Uncontrolled privileged access

Forgotten, unused admin credentials create unnecessary risk. If attackers obtain them, they gain full access to critical systems without you even knowing.

Mamori.io provides:

  • On-demand (just-in-time) privileged access with time-bounded permissions

  • MFA-protected database sessions

  • Automatic termination of AD account based on policy

  • Access controls based on SQL commands, executable, tables, rows and columns

  • Dynamic data masking that controls what data can be seen

3. Direct database access from internal networks or VPNs

Corporate VPNs are insecure. Many attackers can circumnavigate the system to reach sensitive databases.

Mamori.io blocks this by:

  • Enforcing zero-trust data access

  • Enforcing SSO & 2FA for direct database access

  • Securing remote database connections using web browsers instead of VPNs

  • Forcing all DB access through privilege policy checks

  • Microsegmentation of networks to prevent lateral movements and reduce attack surface

4. Limited visibility into what users do inside the database

Organizations often struggle to determine what data was accessed or exfiltrated.

With Mamori.io, organizations get:

  • Full session recording for every privileged DB session

  • Full audit logs for every session by user, device, and activity

  • Real-time blocking and alerts on unusual access patterns

  • Real-time monitoring of sensitive queries and data access patterns

  • Anomaly detection to stop unusual data access patterns or behavior

This makes investigations faster and prevents data exfiltration from going unnoticed.

5. Vendor access with broad permissions

Vendors often have far more access than needed, and organizations rarely monitor their activity closely.

Mamori.io introduces:

  • Microsegment network for 3rd party vendors to prevent attacker’s lateral movement

  • Controlled vendor access by privilege, time, and policies using zero-trust

  • On-demand (just-in-time) privileged access granted by request

  • Recording of every vendor session by network and database

Closing Thoughts

The most significant ransomware incidents of 2025 reveal a consistent theme: attackers entered through simple mistakes, escalated privileges, and moved directly toward sensitive data.

Implementing zero trust data access while strengthening defenses at the database and privileged-access layers is one of the most effective ways to reduce risk. Mamori.io brings zero trust principles directly to your data, limiting what attackers can reach and giving you full visibility into every high-risk action.

About Mamori.io

Mamori.io is an all-in-one solution that provides zero-trust security on multiple layers – from the network, servers, all the way down to the database. The same system can also help organizations comply with privacy regulations, reduce cyber insurance premiums, and automate ISO 27001.

For small businesses, Mamori.io has all the features to completely secure their data. For large businesses, Mamori.io covers security gaps, secures external vendor access, and provides access controls to the database.

Schedule a demo with Mamori.io or request your free trial. If you’re a small business with $10 million USD in gross revenue or less, you can use 20 free Mamori.io licenses.

Victor Cheung

Victor has worked in the data protection and B2B SaaS industry for over 16 years. His passion is to help startups grow, and he was formerly involved in projects funded by Toba Capital and Frost Ventures.

Next
Next

From Firewalls to Zero Trust: 10 Best Practices for Next-Gen Business Data Security