India Cyber Threat Report 2025
Gain exclusive insights into the major cyber threats and enhance your understanding of India’s cyber threat landscape.
Download ReportExploring the State of Cybersecurity in India
369.01 Million
Malware Detections Expose 2024's Surge and 2025's Emerging Threats
The cybersecurity landscape in India has undergone a dramatic transformation in 2024, characterized by both escalating threats and significant advancements in detection capabilities.
The DSCI-Seqrite India Cyber Threat Report 2025 offers a comprehensive analysis of the evolving threat landscape. Drawing insights from the vast telemetry data collected from 8.4 million endpoints, over 369.01 million security incidents were detected, translating to an average of 702 potential security threats every minute. This report sheds light on the tactics, techniques, and procedures employed by cyber adversaries.
Key Findings of 2024
702
Detection per minute
369+ million
Detections across ~8.4 million endpoints
14.56%
Detections stemmed from behaviour-based analysis
68%
Attacks originated from Trojans and Infectors
62%
Detections Reported in Cloud Environments
~12
Attacks per month on personal end-user devices
The
Troublesome Trio
Trojan
140.48 million
(43.25%)
Infector
110.75 million
(34.10%)
Worm
27.38 million
(8.43%)
The Top Impacts
- Type of Threat: Trojans and Infectors
- State: Telangana
- City: Surat
- Industry: Healthcare
Major Cyber Threats of 2024
A Silent Threat: XZ-Utils Compromise
The seemingly innocuous XZ-Utils, a popular open-source compression tool, has been exploited in a stealthy supply chain attack. A critical vulnerability (CVE-2024-3094) lurks within its code, allowing malicious actors to infiltrate systems and execute remote commands. This insidious attack leverages the trust placed in open-source software to compromise the integrity of systems worldwide.
Protect your systems with Seqrite ZTNAAsukaStealer: A Silent Threat
A new, insidious malware dubbed AsukaStealer has emerged on the dark web, posing a significant threat to global cybersecurity. This affordable yet potent tool, available for a mere $80 per month, is designed to extract sensitive data from a wide range of applications, including popular web browsers, cryptocurrency wallets, and messaging platforms. By silently infiltrating systems and siphoning off valuable information, AsukaStealer empowers cybercriminals to launch targeted attacks and financial fraud.
Prevent Malware Attacks with Seqrite MDRCyberstorm 2025
Predicting the Next Wave of Threats
Al & Advanced Threats
- Al-Powered Adaptive Malware
- Deepfake-Enabled Attacks
- Enhanced Social Engineering
- Data Poisoning Attacks
Infrastructure Threats
- Critical Infrastructure Attacks
- Cloud & API Vulnerabilities
- Supply Chain Compromises
- loT & Edge Device Exploitation
Financial & Identity Threats
- Fake Government Apps
- Investment Platform Fraud
- Cryptojacking Attacks
- Identity Theft Campaigns
Ransomware Evolution
- Double-Extortion Tactics
- Physical Infrastructure Targeting
- OT/loT System Exploitation
- Supply Chain Ransomware
Mobile & Device Threats
- Advanced Mobile Malware
- Cloud-Controlled Android Threats
- Biometric Data Explaitation
- AR System Attacks
Emerging Tech Vulnerabilities
- Zero-Day Exploits
- Quantum Computing Threats
- Advanced Al System Attacks
- AR/VR Platform Vulnerabilities
Cyber Threats are Evolving. Are You Prepared?
Download the India Cyber Threat Report 2025 to protect your organization.
Download Report