More targeted, more complex, more sophisticated - almost 65,000 reports to BACS in 2025
The BACS received around 65,000 reports of cyber incidents in 2025. The increase was significantly lower than in previous years. Although threatening calls in the name of the police continued to dominate, these declined in the second half of the year in particular and were partially replaced by reports of online investment fraud. Despite the smaller increase, the qualitative development is remarkable.

With a total of just under 65,000 reports, the number of reports received increased slightly compared to the previous year. With a share of 26 %, ’calls in the name of fake authorities« are still the most frequently reported phenomenon. This is followed by phishing with 19 % and »advertising for online investment fraud« with 9 %.
The ratio of reports from the general public (90 %) to those from companies, associations and authorities (10 %) remains stable. Among the most frequently reported fraud offenses by companies, CEO fraud has also increased this year (2025: 970 / 2024: 719). In contrast, there was only a slight increase in reports of invoice manipulation fraud (2025: 132 / 2024: 114).
After a significant drop in reports of ransomware last year (2024: 92), the number of reports rose slightly again this year to 104, but is still below the level of 2023 (109). However, the number of cases says nothing about the extent of the damage. Attackers are increasingly focusing on lucrative targets, meaning that the damage per case is likely to increase in the future. It should also be noted that ransomware attacks are now almost always accompanied by a data outflow, which further increases the extent of the damage. Reports of DDoS attacks are on the decline. While 48 reports were received last year, there were 35 this year.
More targeted, more complex, more sophisticated
This becomes clear in phishing attacks in connection with classified ads, which increased in the first half of 2025 in particular. Fraudsters pose as prospective buyers and pretend to go to a special page during the payment process in order to receive the money. Depending on which bank you are with, various access data for e-banking is then requested. In this case, however, the fraudsters are not directly targeting e-banking. The fraudsters are targeting the victim's TWINT account. In many cases, this is linked to the bank account. In contrast to the bank account, payments are executed immediately. The amount of the transactions is only limited by the limit set by the victim. In addition, criminals use hacked TWINT accounts to launder money and conceal the origin of the payments.
New dimension: Sophisticated phishing attacks with SMS blasters
Attackers also target «inconspicuous» data
Company names are being misused more and more
The role of artificial intelligence in cybercrime
Mandatory reporting of cyber attacks on critical infrastructure
Source: BACS

