India Cyber Threat Report 2025

Gain exclusive insights into the major cyber threats and enhance your understanding of India’s cyber threat landscape.

Download Report

Exploring the State of Cybersecurity in India

369.01 Million

Malware Detections Expose 2024's Surge and 2025's Emerging Threats

The cybersecurity landscape in India has undergone a dramatic transformation in 2024, characterized by both escalating threats and significant advancements in detection capabilities.

The DSCI-Seqrite India Cyber Threat Report 2025 offers a comprehensive analysis of the evolving threat landscape. Drawing insights from the vast telemetry data collected from 8.4 million endpoints, over 369.01 million security incidents were detected, translating to an average of 702 potential security threats every minute. This report sheds light on the tactics, techniques, and procedures employed by cyber adversaries.

Key Findings of 2024

702

Detection per minute

369+ million

Detections across ~8.4 million endpoints

14.56%

Detections stemmed from behaviour-based analysis

68%

Attacks originated from Trojans and Infectors

62%

Detections Reported in Cloud Environments

~12

Attacks per month on personal end-user devices

The
Troublesome Trio

Trojan

140.48 million
(43.25%)

Infector

110.75 million
(34.10%)

Worm

27.38 million
(8.43%)

The Top Impacts

  • Type of Threat: Trojans and Infectors
  • State: Telangana
  • City: Surat
  • Industry: Healthcare

Major Cyber Threats of 2024

A Silent Threat: XZ-Utils Compromise

The seemingly innocuous XZ-Utils, a popular open-source compression tool, has been exploited in a stealthy supply chain attack. A critical vulnerability (CVE-2024-3094) lurks within its code, allowing malicious actors to infiltrate systems and execute remote commands. This insidious attack leverages the trust placed in open-source software to compromise the integrity of systems worldwide.

Protect your systems with Seqrite ZTNA

AsukaStealer: A Silent Threat

A new, insidious malware dubbed AsukaStealer has emerged on the dark web, posing a significant threat to global cybersecurity. This affordable yet potent tool, available for a mere $80 per month, is designed to extract sensitive data from a wide range of applications, including popular web browsers, cryptocurrency wallets, and messaging platforms. By silently infiltrating systems and siphoning off valuable information, AsukaStealer empowers cybercriminals to launch targeted attacks and financial fraud.

Prevent Malware Attacks with Seqrite MDR

Cyberstorm 2025
Predicting the Next Wave of Threats

Al & Advanced Threats

  • Al-Powered Adaptive Malware
  • Deepfake-Enabled Attacks
  • Enhanced Social Engineering
  • Data Poisoning Attacks

Infrastructure Threats

  • Critical Infrastructure Attacks
  • Cloud & API Vulnerabilities
  • Supply Chain Compromises
  • loT & Edge Device Exploitation

Financial & Identity Threats

  • Fake Government Apps
  • Investment Platform Fraud
  • Cryptojacking Attacks
  • Identity Theft Campaigns

Ransomware Evolution

  • Double-Extortion Tactics
  • Physical Infrastructure Targeting
  • OT/loT System Exploitation
  • Supply Chain Ransomware

Mobile & Device Threats

  • Advanced Mobile Malware
  • Cloud-Controlled Android Threats
  • Biometric Data Explaitation
  • AR System Attacks

Emerging Tech Vulnerabilities

  • Zero-Day Exploits
  • Quantum Computing Threats
  • Advanced Al System Attacks
  • AR/VR Platform Vulnerabilities

Cyber Threats are Evolving. Are You Prepared?

Download the India Cyber Threat Report 2025 to protect your organization.

Download Report