Ransomware Surges in Mexico: Cybersecurity Week
By Diego Valverde | Journalist & Industry Analyst -
Thu, 03/27/2025 - 13:25
Cyberthreats are escalating globally and in Mexico, with ransomware attacks on the rise due to weak infrastructure and slow system updates. Internationally, state-backed hackers are exploiting long-standing vulnerabilities in Windows, while Russia’s Operation Zero is offering multi-million-dollar bounties for Telegram exploits. Experts emphasize that effective incident detection relies on data intelligence rather than just technology, and managed cybersecurity services are becoming essential for strategic business growth.
Ready? This is your Cybersecurity Weekly Roundup!
Mexico
Malware, Ransomware Cyberattacks on Rise in Mexico
Mexico is among the countries most affected by cyberattacks, especially ransomware, which blocks access to data and demands users pay for its release, reports Karspersky. The lack of awareness within organizations, the low investment in technological infrastructure, and the slow updating of systems have facilitated the proliferation of these threats, affecting both public and private institutions.
International
Hackers Exploit Windows Flaw for Cyberespionage
Nearly a dozen state-sponsored advanced threat groups (APTs) from China, Russia, Iran and North Korea have exploited a vulnerability in Microsoft Windows, known as ZDI-CAN-25373, to steal information and spy on critical infrastructure organizations around the world, according to Security Boulevard. The vulnerability, active since at least 2017 according to the Zero Day Initiative, has allowed attackers to execute malicious commands through LNK (.lnk) files, which are disguised as harmless shortcuts.
Operation Zero Offers up to US$4 Million for Telegram Exploits
Operation Zero, a Russian exploit broker specializing in zero-day vulnerabilities, has announced on its X account a bounty of up to US$4 million for exploits targeting the Telegram messaging app. The company, which sells exclusively to the Russian government and local entities, is looking for click and non-click remote code execution (RCE) exploits, as well as full-chain vulnerabilities that could give access to a target's entire device.
MBN Experts
The Key to Incident Detection Is Information, Not Technology
The true strength of security solutions lies in their ability to harness and correlate data from diverse sources across the network — including assets, applications, systems, and databases — to effectively detect security incidents, says Carlos Lozano, CEO, Rent a Hacker. Many of these solutions leverage AI to enhance their capabilities.
Cybersecurity, Managed Services Necessary For Strategic Growth
If managers do not fully understand the risk matrix associated with digitization, they can see investments in cybersecurity as expenses, rather than the strategic necessities they are, says Rodrigo Izarrarás, Director, CIRTEC. He explains that while large corporations have integrated this vision, many smaller companies have not yet assimilated that a vulnerability in their digital infrastructure can exclude them from critical supply chains.






