Akira and Play: Why manufacturing is taking the hardest hit from ransomware in 2025

Akira and Play: Why manufacturing is taking the hardest hit from ransomware in 2025

Manufacturing Sector Hit Hardest by Ransomware Surge in 2025

In 2025, the manufacturing sector became the primary target of global ransomware attacks, with 1,466 incidents reported a 56% increase from 2024. Overall, ransomware activity across all industries rose 32%, reaching 7,419 cases, as cybercriminals increasingly exploit vulnerabilities in industrial environments.

Key Drivers of the Surge

  1. Legacy Operational Technology (OT): Many manufacturers rely on outdated OT systems, with 80% of European factories operating critical infrastructure containing known vulnerabilities. These systems, designed before modern cyber threats, lack built-in security, making them prime targets.
  2. Supply Chain Exploits: Attackers now breach smaller suppliers, managed service providers, or software vendors to infiltrate larger industrial networks. Supply chain-based incidents nearly doubled in 2025, rising from 154 to 297 cases.
  3. Ransomware-as-a-Service (RaaS): Criminal groups like Qilin and Play lease attack tools to affiliates, lowering the barrier for entry and enabling targeted strikes by region, language, and industry.

Notable Ransomware Groups

  • Akira amassed $244 million by late 2025, exploiting unsecured VPNs and phishing.
  • Qilin, a Russia-based RaaS network, specializes in manufacturing and logistics attacks.
  • Play remains dominant in the U.S., with the FBI documenting 900 affected entities.
  • Hacktivist and state-aligned groups, including NoName057(16) and Chinese-linked actors, disrupt operations through DDoS and defacement attacks.

Attack Vectors & Financial Impact

  • 32% of incidents stemmed from exploited vulnerabilities in outdated OT systems.
  • 23% involved phishing, often using AI-generated lures.
  • Stolen credentials sold on the dark web for $4,000–$70,000 provide direct network access.
  • Ransom demands surged, with European manufacturers facing $1.16 million on average double 2024’s figures.
  • In the U.S., median attack costs reached $500,000 per incident, while 65% of Indian victims paid ransoms averaging $1.35 million.

Regional Disparities

  • Europe saw manufacturing account for 72% of industrial ransomware incidents in Q3 2025, driven by legacy infrastructure.
  • The U.S. remained the most targeted country, with manufacturing bearing nearly half of all industrial breaches.
  • India’s rapid digitization increased exposure, with high ransom payments reflecting systemic vulnerabilities.

Security Recommendations

Manufacturers are urged to adopt layered defenses, including:

  • Rapid patching (within hours of disclosure).
  • Network segmentation and offline backups.
  • AI-driven monitoring for real-time threat detection.
  • Strict access controls and third-party risk governance.

The report underscores that cybersecurity is no longer an IT issue but a core business risk, requiring board-level attention to ensure operational continuity.

Source: https://www.okoone.com/spark/industry-insights/why-manufacturing-is-taking-the-hardest-hit-from-ransomware-in-2025/

PlayDisplay cybersecurity rating report: https://www.rankiteo.com/company/playdisplay

AKIRA GLOBAL INC. cybersecurity rating report: https://www.rankiteo.com/company/akira-global-inc

"id": "PLAAKI1777681491",
"linkid": "playdisplay, akira-global-inc",
"type": "Ransomware",
"date": "4/2026",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Manufacturing',
                        'location': ['Europe', 'United States', 'India'],
                        'type': 'Manufacturing companies'},
                       {'industry': 'Supply chain',
                        'type': 'Suppliers, managed service providers, '
                                'software vendors'}],
 'attack_vector': ['Exploited vulnerabilities in OT systems',
                   'Phishing',
                   'Stolen credentials',
                   'Supply chain exploits'],
 'data_breach': {'data_encryption': 'Yes (ransomware)'},
 'date_publicly_disclosed': '2025',
 'description': 'In 2025, the manufacturing sector became the primary target '
                'of global ransomware attacks, with 1,466 incidents reported '
                '(a 56% increase from 2024). Overall, ransomware activity '
                'across all industries rose 32%, reaching 7,419 cases, as '
                'cybercriminals increasingly exploit vulnerabilities in '
                'industrial environments.',
 'impact': {'financial_loss': {'average_ransom_demand_europe': '$1.16 million',
                               'average_ransom_paid_india': '$1.35 million',
                               'median_attack_cost_us': '$500,000'},
            'operational_impact': 'Disruption of manufacturing operations',
            'systems_affected': 'Manufacturing and industrial networks'},
 'initial_access_broker': {'data_sold_on_dark_web': 'Stolen credentials sold '
                                                    'for $4,000–$70,000',
                           'entry_point': ['Unsecured VPNs', 'Phishing']},
 'lessons_learned': 'Cybersecurity is a core business risk requiring '
                    'board-level attention to ensure operational continuity. '
                    'Legacy OT systems and supply chain vulnerabilities are '
                    'major attack vectors.',
 'motivation': ['Financial gain', 'Disruption of operations', 'Hacktivism'],
 'post_incident_analysis': {'corrective_actions': ['Adopt layered defenses',
                                                   'Implement rapid patching',
                                                   'Enforce network '
                                                   'segmentation',
                                                   'Deploy AI-driven '
                                                   'monitoring'],
                            'root_causes': ['Legacy OT systems with known '
                                            'vulnerabilities',
                                            'Supply chain exploits',
                                            'Ransomware-as-a-Service (RaaS) '
                                            'proliferation',
                                            'Phishing and stolen credentials']},
 'ransomware': {'data_encryption': 'Yes',
                'ransom_demanded': ['$1.16 million (Europe average)',
                                    '$1.35 million (India average)'],
                'ransom_paid': ['65% of Indian victims paid ransoms'],
                'ransomware_strain': ['Akira', 'Qilin', 'Play']},
 'recommendations': ['Rapid patching (within hours of disclosure)',
                     'Network segmentation and offline backups',
                     'AI-driven monitoring for real-time threat detection',
                     'Strict access controls and third-party risk governance'],
 'references': [{'source': 'Report on Manufacturing Sector Ransomware Surge '
                           '2025'}],
 'response': {'enhanced_monitoring': 'Recommended (AI-driven monitoring)',
              'network_segmentation': 'Recommended'},
 'threat_actor': ['Akira',
                  'Qilin',
                  'Play',
                  'NoName057(16)',
                  'Chinese-linked actors'],
 'title': 'Manufacturing Sector Hit Hardest by Ransomware Surge in 2025',
 'type': 'Ransomware',
 'vulnerability_exploited': 'Legacy Operational Technology (OT) systems with '
                            'known vulnerabilities'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.