Latin America has emerged as the world's most critical cyberattack battleground, overtaking all other regions in both attack frequency and vulnerability exposure. Organizations across the region faced an average of 3,065 cyberattacks per week in December 2025—a 26 percent year-over-year surge that represents the sharpest increase globally.
This acceleration continues a trajectory established earlier in the year, with mid-2025 data showing 2,716 attacks per week, or 39 percent above the global average of 1,955 incidents. The scale of exposure reflects not merely rising attack volumes but a confluence of aggressive threat actor campaigns, widespread infrastructure vulnerabilities, and a persistent skills-and-resources deficit that leaves the region ill-equipped to defend itself.
Brazil anchors the region's threat landscape, accounting for 30 to 31 percent of dark web activity, 30 percent of ransomware attacks, and over 51 percent of phishing incidents. Mexico follows as the second-most targeted nation, with 27.5 percent of ransomware attacks and persistent exposure to financially motivated threat actors.
Colombia, Peru, and Panama round out the prioritized targets, each presenting unique combinations of digital infrastructure development, regulatory maturity gaps, and financial incentives that attract cybercriminals seeking either data theft, extortion, or state-sponsored espionage objectives.
The economic toll reflects the severity of the crisis. Data breaches in Latin America now average $3.86 million USD per incident, representing a 32 percent increase from 2022 figures. Brazil's cost per breach reached R$7.19 million (approximately $1.43 million USD) in 2025, with healthcare, finance, and professional services sectors recording the highest remediation expenses.
Across the broader region, cumulative cybercrime losses have exceeded $2.5 billion in recent years, and analysts project annual costs could surpass $90 million by the close of this decade. These figures exclude cascading effects such as reputational damage, business interruption, and erosion of consumer confidence—costs that frequently exceed direct remediation expenses.
Threat Evolution: From Encryption to Data Extortion
The composition of cyberattacks has shifted fundamentally across Latin America over the past 18 months. Ransomware campaigns have evolved from purely encryption-based tactics toward data-leak extortion models, where threat actors exfiltrate sensitive information before encryption and threaten disclosure on the dark web unless demands are met.
In December 2025 alone, 945 ransomware attacks were publicly disclosed globally, representing a 60 percent increase from the prior year, with North America accounting for 52 percent of reports and Latin America experiencing elevated targeting across multiple sectors.
The Qilin ransomware-as-a-service (RaaS) operation emerged as the most prolific group in the region, responsible for 18 percent of published attacks in December 2025. Qilin has significantly expanded its affiliate recruitment network since early 2025, demonstrating a strategic shift toward distributed attack infrastructure that lowers technical barriers for subsidiary operators.
LockBit5 and Akira follow in operational frequency, with these groups demonstrating particular sophistication in targeting manufacturing, technology, and business services sectors where data exfiltration yields high leverage for extortion.
Phishing and social engineering remain the primary infection vectors, with 62 percent of malware in Latin America delivered through email campaigns in 2025. Information disclosure vulnerabilities—primarily weak access controls, misconfigurations, and exposed credentials—impact 75 percent of organizations across the region and frequently serve as the initial foothold for multi-stage attacks.
Infostealer malware surged 58 percent year-over-year, targeting BYOD (bring-your-own-device) environments where employees access enterprise systems through personal devices with limited security controls. Stolen credentials, VPN tokens, and session cookies harvested through infostealers provide attackers rapid lateral movement pathways into critical systems.
Generative AI: An Emerging Risk Multiplier
The rapid enterprise adoption of generative AI tools has introduced a previously underestimated attack surface. Check Point data from December 2025 revealed that one in every 27 generative AI prompts submitted from enterprise networks posed high risk of sensitive data leakage.
Ninety-one percent of organizations using GenAI tools experienced high-risk prompt activity, and an additional 25 percent of prompts contained potentially sensitive information including personally identifiable data, internal network configurations, and proprietary source code.
The challenge escalates when considering organizational scale: average enterprise users generate 56 GenAI prompts monthly across an average of 11 different AI platforms, often without centralized visibility or governance controls.
An IBM report documented that shadow AI—unauthorized use of generative AI tools—increased breach costs by an average of $591,400 per incident in Brazil and contributed to compromised personally identifiable information in 65 percent of affected cases, substantially above the global average of 53 percent. This shadow AI activity reflects the organizational reality that employees adopt productivity tools without formal security authorization, bypassing established controls designed to prevent data exfiltration.
Sectoral Concentration and Institutional Vulnerability
The educational sector remains the primary attack target globally, with Latin American education organizations recording 4,349 cyberattacks per organization per week in December 2025, a 12 percent year-over-year increase.
Government institutions and military facilities follow closely, experiencing 3,800 to 4,200 weekly attacks per organization. Healthcare systems, telecommunications providers, and financial institutions round out the most-targeted sectors, reflecting both the criticality of these systems and the sensitivity of data they maintain.
Healthcare sector breaches in Brazil averaged $7.42 million USD in remediation costs, with detection and containment timelines extending to 279 days—more than five weeks above the global average. Manufacturing emerged as the hardest-hit sector globally in 2025, with attackers targeting production system access to disrupt operations and maximize leverage for ransom demands.
Government institutions across Latin America have experienced high-profile ransomware campaigns: in January 2025, attackers breached Argentina's Airport Security Police, exposing payroll systems and sensitive personnel records; in December 2024, Costa Rica's RECOPE (state-owned fuel distributor) was forced to manual operations following a ransomware attack; and in November 2024, RansomHub exfiltrated 313 gigabytes of classified government data from Mexico's Gob.mx portal.
Infrastructure Vulnerabilities and Institutional Gaps
Latin America operates within a systemic cybersecurity deficit that extends far beyond individual organizations. The region allocates less than one percent of GDP to cybersecurity infrastructure, substantially below the investment levels observed in North America and Western Europe.
Only 7 of 32 countries in the region have national plans to protect critical infrastructure, and merely 20 countries maintain operational Computer Security Incident Response Teams (CSIRTs). The scarcity of skilled cybersecurity professionals compounds these challenges; specialized talent remains concentrated in major metropolitan areas and large multinational organizations, leaving smaller enterprises and government agencies chronically understaffed.
Technical vulnerabilities reflect decades of infrastructure development prioritized for speed over security. Weak network segmentation between critical systems remains endemic, allowing attackers lateral movement once initial access is achieved. Insufficient internal access controls mean that compromised credentials grant attackers broad system privileges.
Inadequate incident-response protocols mean that breaches often remain undetected for weeks or months after initial compromise, substantially increasing data exfiltration volume and remediation costs. Over-reliance on legacy systems—many running unsupported operating systems and outdated software—leaves organizations unable to patch known vulnerabilities.
Cloud infrastructure misconfigurations represent a particular vulnerability category. Seventy-five percent of cloud security breaches in 2025 involved misconfigured storage buckets or authentication failures, with organizations failing to implement encryption or access controls on sensitive data repositories.
These misconfigurations frequently result from automation errors, inadequate configuration management processes, and insufficient architectural review before systems move to production. The Bankingly SaaS platform breach illustrated this risk: misconfigured cloud buckets compromised seven Latin American banks simultaneously, exposing customer financial data due to missing authentication controls.
Threat Actor Sophistication and Geopolitical Dimensions
Advanced Persistent Threat (APT) groups have intensified operations across Latin America, reflecting both financially motivated cybercrime and state-sponsored espionage objectives. BlindEagle (APT-C-36), a sophisticated threat actor believed based in the region, has maintained persistent campaigns since at least 2018 targeting Colombian government entities, financial institutions, and military infrastructure.
The group demonstrated tactical evolution in 2024, introducing Portuguese-language artifacts and Brazilian image hosting infrastructure—suggesting possible collaboration with Brazilian-based threat actors or outsourcing arrangements designed to complicate attribution.
Chinese-aligned APT groups have escalated Latin American targeting in 2025, with FamousSparrow conducting a systematic campaign against governmental entities across the region in what analysts characterize as a response to renewed geopolitical strategic interest in the hemisphere by the Trump administration.
These state-aligned operations carry substantially different operational profiles than financially motivated ransomware actors: they target classified information, military capabilities, and strategic infrastructure rather than financial data, with longer dwell times and greater sophistication in evading detection systems.
Regulatory Evolution and Institutional Response
Recognition of the cybersecurity crisis has triggered regulatory responses across major regional economies. Brazil advanced Bill 4752/2025 through parliamentary committees in late 2025, establishing the nation's first comprehensive cybersecurity legal framework and creating a National Cybersecurity Authority responsible for setting minimum security standards and defining incident notification requirements for both public and private sectors.
The legislation mandates cybersecurity compliance for government procurement and establishes shared responsibility for security incidents across supply chains—a structural change reflecting the reality that corporate networks often extend through dozens of supplier and third-party relationships.
Mexico released its National Cybersecurity Plan 2025–2030, positioning cybersecurity as central to broader digital transformation objectives.
The plan establishes six lines of action: creating a unified federal cybersecurity framework; establishing centralized operational bodies including a National Cybersecurity Operations Center and National Incident Response Center; building an inventory of critical digital infrastructure; implementing continuous risk assessment protocols; expanding public-sector training and institutional capabilities; and advancing a General Cybersecurity Law to harmonize security standards nationwide. These initiatives represent a transition from fragmented, reactive responses toward coordinated, proactive security postures.
Ecuador, El Salvador, and Peru have similarly strengthened data protection regulations and security obligation frameworks. Ecuador introduced detailed guidance on risk management and impact assessments for personal data processing.
El Salvador mandated security policies across both public and private sectors, requiring organizational, technical, and physical security measures including encryption, access controls, and 72-hour breach notification timelines. Mexico introduced reforms in 2025 to reinforce prior consent requirements, restrict commercial data use, and strengthen corporate accountability for data protection failures.
Institutional capacity-building efforts have accelerated through regional forums. The Organization of American States (OAS) operates CSIRTAmericas, a hemispheric network connecting national, government sector, military, and legislative incident response teams to facilitate operational coordination and information sharing.
Brazil's CERT.br serves as a national CSIRT of last resort, providing incident management services and conducting proactive trend analysis across Brazilian internet infrastructure. The FIRST Regional Symposium for Latin America and the Caribbean, co-hosted with LACNIC in 2025, brought together incident response teams across the region to share vulnerability intelligence, incident handling techniques, and best practices.
The Inter-American Development Bank and Organization of American States released a comprehensive 2025 assessment of cybersecurity maturity across 30 Latin American and Caribbean nations, measuring progress against the Cybersecurity Capacity Maturity Model for Nations across five dimensions: national policy and strategy, public awareness, training and skills development, legal frameworks, and technical standards.
The assessment documented steady improvement since 2020 baseline measurements, with average scores rising across all dimensions and gaps between countries narrowing. However, critical weaknesses persist in software quality standards, critical infrastructure protection, and development of the regional cybersecurity marketplace. The report emphasized that AI-driven threats require urgent updates to governance frameworks, technical standards, and workforce development programs.
Risk Trajectory and Forward Outlook
The convergence of rising attack volumes, evolving threat actor tactics, generative AI-enabled attack sophistication, and persistent institutional capacity gaps positions Latin America for continued escalation in both attack frequency and impact severity.
Organizations that detected breaches internally reported $1.4 million USD savings compared to those notified by attackers, incentivizing investment in detection and monitoring capabilities that remain underdeveloped across the region. Companies refusing ransom demands increased from 59 to 63 percent year-over-year, but ransom amounts continue escalating in absolute terms, with legal sector ransom demands increasing 60 percent from $383,000 to $611,000 average in 2025.
The skills shortage represents perhaps the most intractable challenge. Even as regional governments establish formal cybersecurity training programs, corporate and government organizations cannot fill open positions fast enough to keep pace with threat evolution.
This talent gap creates a vicious cycle: organizations fail to implement security controls due to insufficient staffing, attackers exploit these gaps, and incidents consume organizational resources that might otherwise support training and capability development.
Latin America's status as the world's riskiest region for cyberattacks reflects not inevitable technological determinism but rather the collision of rapid digitalization without proportionate security investment, institutional capacity deficits spanning regulatory frameworks through workforce development, and concentrated targeting by sophisticated threat actors motivated by both financial gain and geopolitical objectives.
Reversing this trajectory requires sustained commitment from regional governments to cybersecurity as critical infrastructure, private sector investment in security controls and talent development, and cross-border coordination mechanisms that enable threat intelligence sharing and coordinated incident response. Without these interventions, Latin America will likely remain the preferred hunting ground for global threat actors seeking maximum financial return and minimal operational friction.

