• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Halcyon reveals the 4 tactical shifts defining ransomware in Q2 2025

by CXO Staff
August 26, 2025
in Future, News, Tech

Recent industry research shows that the average ransom demand has surged to $3.5 million, while nearly half of victims pay up under pressure despite negotiations

Halcyon reveals the 4 tactical shifts defining ransomware in Q2 2025

Ransomware is tightening its grip on global enterprises, with the Middle East emerging as one of the most vulnerable regions. Recent industry research shows that the average ransom demand has surged to $3.5 million, while nearly half of victims pay up under pressure despite negotiations. In the Gulf, recent campaigns against critical sectors – including energy, government, and finance – highlight the region’s rising exposure to these evolving attacks.

These shifts highlight a stark reality: ransomware operators are finding ways around traditional Endpoint Detection & Response (EDR) tools, fueling debate over whether EDR alone can still protect organisations in today’s threat landscape.

Ray Kafity, VP, India, Middle East, Turkey & Africa, Halcyon
Ray Kafity, VP, India, Middle East, Turkey & Africa, Halcyon

According to the Halcyon Ransomware Malicious Quartile Q2-2025, ransomware operators are evolving faster than defenders, with four tactical shifts defining the Q2 landscape:

1. BYOVD Security Bypass: Crippling Kernel Defences

Attackers are turning old, vulnerable drivers into secret keys that unlock even the most secure doors. Using the “Bring Your Own Vulnerable Driver” (BYOVD) tactic, groups like DragonForce can bypass kernel-level defences — the deepest layer of the operating system — and shut down endpoint security tools. Once those protections are disabled, ransomware can spread unchecked.

2. VMware ESXi Under Siege: Knocking Out Virtual Offices

Hackers are hitting the servers that run many companies’ virtual offices, causing outages that ripple across entire organisations. Groups such as Qilin and Medusa are deploying custom payloads built for VMware ESXi environments, effectively taking down whole data centres and cloud systems in one strike.

3. Remote “Living-off-the-Land” Abuse: Hiding in Plain Sight

Criminals are hiding in plain sight by weaponising the same remote management tools IT teams use every day. Sarcoma and others abuse Remote Monitoring and Management (RMM) software to move around networks stealthily. Because this traffic looks legitimate, attackers can linger for weeks, quietly mapping systems until they’re ready to deploy ransomware.

4. Credential Harvesting at Scale: Passwords as Master Keys

Thieves are scooping up saved passwords by the thousands and using them like master keys across entire businesses. Groups including Akira, Qilin, and DevMan harvest browser-stored credentials in bulk, making it easier to move laterally inside networks, maintain persistence, and maximise the damage of their attacks.

“The findings make one thing clear: ransomware has evolved into a systemic risk,” said Ray Kafity, VP, India, Middle East, Turkey & Africa, Halcyon. “Adversaries are moving faster and smarter, and no organisation can rely solely on traditional Cyber defence tools. From Europe to Asia to the Middle East, the pattern is the same — attackers are bypassing current endpoint protection platforms and targeting infrastructure at scale. Resilience, not prevention alone, is now the defining factor for survival.”

Tags: Halcyonransomeware
ShareTweet

Related Posts

OPSWAT appoints Hussam Sidani as Vice President MENA
Business

OPSWAT appoints Hussam Sidani as Vice President MENA

December 10, 2025

OPSWAT has announced the appointment of cybersecurity industry veteran, Hussam Sidani, as Vice President for the Middle East and North...

Cloudflare’s Q3 2025 DDoS threat report includes Aisuru, the apex of botnets
Future

Cloudflare’s Q3 2025 DDoS threat report includes Aisuru, the apex of botnets

December 9, 2025

Cloudflare has announced its 2025 Q3 DDoS report. This report includes insights and trends about the DDoS threat landscape —...

Discussion about this post

Latest Issue

OPSWAT appoints Hussam Sidani as Vice President MENA

OPSWAT appoints Hussam Sidani as Vice President MENA

December 10, 2025
Cloudflare’s Q3 2025 DDoS threat report includes Aisuru, the apex of botnets

Cloudflare’s Q3 2025 DDoS threat report includes Aisuru, the apex of botnets

December 9, 2025
Vertiv completes acquisition of PurgeRite

Vertiv completes acquisition of PurgeRite

December 9, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy
© 2025 – CXO Insight Middle East. All Rights Reserved.
Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2025 - CXO Insight Middle East. All Rights Reserved.