Blog | ThreatBook

Hong Kong's Cyber Threat Landscape: Inside the 2025 Data

Written by ThreatBook Research Team | 15 March 2026, 04:03 PM

 

The Threat Landscape

A City Built on Commerce — and Cross-Border Risk

Hong Kong's cyberattack landscape reflects the city's unique position. Unlike other financial centers, data held by Hong Kong enterprises carries inherent cross-border value — a single customer list may span high-net-worth clients across Asia, Europe, and North America.

In 2025, the dominant attack types were data theft, phishing, APT infiltration, and ransomware. Each exploits a specific structural vulnerability of Hong Kong's business environment: its multilingual culture, its web of international regulatory obligations, its role as Asia-Pacific headquarters for global multinationals, and its time-zone position bridging East and West.

"Successful APT attacks on Hong Kong multinational headquarters typically grant access to branches across 8–12 Asia-Pacific countries."

 

 

Why Hong Kong Ransomware Payments Are So High

At 43%, Hong Kong's ransomware payment rate dramatically exceeds the global 28% average. This is not accidental. Attackers have mapped Hong Kong's vulnerabilities with surgical precision: 60% of ransomware attacks are deliberately timed to fall one week before quarterly financial report deadlines, when any system disruption risks regulatory inquiry, stock price volatility, and investor confidence collapse.

Hong Kong's highly interconnected business ecosystem amplifies each attack. A single targeted company triggers a chain reaction — on average affecting 3–5 associated businesses. The city's multi-jurisdictional compliance burden (Hong Kong Monetary Authority, U.S. SEC, UK FCA) means that a credible data leak threat carries costs that far exceed the ransom itself.

 

APT Groups

The Three Primary Threat Sources

In 2025, APT attacks in Hong Kong maintained an average dwell time of 8.7 months — twice the global average — underscoring how deeply threat actors recognize the city's strategic value.

Lazarus

Stole $1.5B from a crypto exchange via a supply chain attack on Safe Wallet's AWS S3 bucket — the largest single cryptocurrency theft ever. Leverages social engineering across LinkedIn and WhatsApp to recruit insiders at target firms.

Finance . Crypto

Earth Bluecrow

Deploys the BPFDoor backdoor — operating at the Linux kernel level, triggered by "magic packet" sequences invisible to firewalls and port scans. Maintains dwell times of months or years. Intensified telecoms targeting in 2024–2025.

Telecoms . Infrastructure

LotusBlossom

Active since 2012 and continuously evolving its toolchain. Targets Hong Kong's commercial intelligence layer — trade flows, investment strategies, and regulatory communications — typically residing in networks for 8–12 months.

Government . Commerce

 

Ransomware Groups

Most Influential Groups Targeting Hong Kong

Three ransomware groups dominated Hong Kong's threat landscape in 2025, each demonstrating strong localized adaptation — with 94% of ransom notes written in Traditional Chinese and 67% accepting Hong Kong dollar payments.