2025 Cyber Security Report - Final
2025 Cyber Security Report - Final
Annual
Edition
THE STATE OF
CYBER SECURITY 2025
Top threats, emerging trends, and CISO recommendations
TABLE OF CONTENTS
01
INTRODUCTION
02
2024 CYBER
03
CYBER SECURITY
04
GLOBAL ANALYSIS
SECURITY EVENTS TRENDS
05
HIGH PROFILE GLOBAL
06
INCIDENT RESPONSE
07
2025 INDUSTRY
08
CISO
VULNERABILITIES PERSPECTIVE PREDICTIONS RECOMMENDATIONS
0
1 INTRODUCTION
THE STATE OF CYBER SECURITY 2025
INTRODUCTION
01 INTRODUCTION
I’m happy to introduce the 13th annual edition of Check Point's State of Cyber Security. 2024’s advancements like AI and cloud
02 2024 CYBER SECURITY EVENTS infrastructure improved our daily lives but also benefited cyber criminals. This report highlights the real-world impact of these
changes, offering 2025 insights and recommendations from and for CISOs.
03 CYBER SECURITY TRENDS With over a decade of analysis, Check Point Research insights come from unparalleled data sources that no other company combines.
We gather attack telemetry from networks, cloud, email, endpoints, and mobile devices across enterprise and SMB customers. By
incorporating incident response, dark web, and open-source findings, we achieve visibility in over 170 countries to reveal global and
Cyber Wars - 2024 Edition regional trends.
04 GLOBAL ANALYSIS • Hardware and Software supply chains saw the highest attack surge attacks
05 HIGH PROFILE VULNERABILITIES I want to emphasize Check Point’s commitment to customer security. In 2024, edge devices were exploited to access enterprise
networks through leaked credentials and vulnerabilities. One of the many disclosed zero-day vulnerabilities was in a Check Point
product: the VPN Information Disclosure vulnerability (CVE-2024-24919). We promptly disclosed it, released a patch within a day,
06 INCIDENT RESPONSE PERSPECTIVE and proactively supported the few potentially affected customers with incident response and mitigation. Our dedication to protecting
customers is in our DNA.
07 2025 INDUSTRY PREDICTIONS While Check Point aims to protect our customers with our research, we hope this report serves the needs of the broader industry
as well, as we combine forces and share knowledge. On behalf of the Check Point family, I hope this report is useful to both security
08 CISO RECOMMENDATIONS practitioners as well as C-level executives.
JAN
After disclosing two zero-day vulnerabilities, Ivanti's Connect
Secure VPNs faced mass exploitation. Thousands of VPN devices
were compromised, impacting victims like the U.S. Cyber
FEB
Exploiting a Fortinet vulnerability, Chinese state-backed
hackers targeted an unclassified military research network
in a cyber espionage operation against the Dutch Defense
MAR
Q1
The ALPHV ransomware gang attacked UnitedHealth Group’s
subsidiary, stealing six terabytes of data. U.S. military clinics
and hospitals worldwide were disrupted, necessitating manual
security and Infrastructure Security Agency (CISA). Ministry, marking the Netherlands’ first public attribution of a prescription processes.
cyber attack to China.
The Ransomware Ecosystem
Check Point Research uncovered an NFT scam targeting
holders of over 100 popular projects. Scammers send seemingly A high-severity vulnerability in Google Chrome’s V8 JavaScript Check Point Harmony Endpoint and Threat Emulation
The Rise of Infostealers legitimate airdrops that link to fraudulent websites. Victims are engine, CVE-2024-0517, was identified. The flaw could allow a protect against this threat (Ransomware.Wins.BlackCat.
tricked into connecting their wallets, granting attackers access to remote attacker to exploit heap corruption via a crafted HTML ta.*; Ransomware.Win.BlackCat)
Cloud Complexities their funds. page. Google has since patched the vulnerability.
Cutout.Pro, an AI-powered photo and video editing service,
Edge Devices and ORBs Microsoft reported an attack by the Russian group Midnight
Check Point Harmony IPS protects against this threat
experienced a data breach that exposed the personal data of 20
Blizzard (Nobelium), which used a password spray attack to million users, including email addresses, hashed passwords,
compromise corporate email accounts, including those of senior (Google Chrome Out of Bounds Write (CVE-2024-0517))
and IP addresses.
leadership, cyber security, and legal staff.
04 GLOBAL ANALYSIS Check Point Research discovered a critical Remote Code Chinese APT group Earth, Krahang, targeted 70 government
Execution (RCE) vulnerability in Microsoft Outlook, dubbed entities worldwide in a cyber espionage campaign, active since
Check Point Harmony Endpoint and Threat Emulation
#MonikerLink (CVE-2024-21413). #MonikerLink allows remote early 2022, utilizing vulnerabilities in internet-facing servers and
protect against this threat
05 HIGH PROFILE VULNERABILITIES (APT.Win.APT29; APT.Wins.Nobelium)
attackers to deploy a link that bypasses the Protected View
Protocol, potentially leading to credentials leakage and RCE
spear-phishing tactics.
APR
Check Point researchers detected a typosquatting campaign
comprised of over 500 malicious packages deployed on PyPI
(Python Package Index), posing risks of PII theft malware
MAY
Check Point Research uncovered a cyber espionage campaign
targeting African and Caribbean governmental organizations.
Attributed to Chinese threat actor Sharp Dragon, the campaign
JUNE
Q2
Data from Ticketmaster and Santander Bank has been put up for
sale on a cyber crime forum by ShinyHunters, a notorious cyber
gang. The breach potentially exposes the personal information
installation. adopts Cobalt Strike Beacon as the payload, enabling backdoor of millions of customers. Reports indicate that the threat actor
functionalities like C2 communication and command execution gained access to Ticketmaster and Santander by using the stolen
The Ransomware Ecosystem while minimizing the exposure of their custom tools. This credentials of one employee from Snowflake, a large cloud
Check Point CloudGuard Code Security protects approach suggests a deeper understanding of their targets. storage company.
The Rise of Infostealers against this threat.
The Czech Republic, Germany, and NATO revealed an espionage Japanese crypto exchange DMM Bitcoin confirmed a data breach
Cloud Complexities Russian-speaking hacktivist group RGB-TEAM breached the
campaign targeting Czech institutions through a Microsoft that resulted in losing $308 million in BTC, one of the largest
Outlook vulnerability attributed to the Russian state-affiliated crypto heists.
website of Russia’s prosecutor general and leaked 100,000 group, APT28, which has been conducting a long-term espionage
Edge Devices and ORBs criminal records from 1993 to 2022 on Telegram. Data included effort across Europe.
details on crimes such as theft and drug trafficking. China-linked Water Sigbin 8220 Gang exploited vulnerabilities in
Oracle WebLogic (CVE-2017-3506 and CVE-2023-21839) to deploy
A Dell data breach affected 49 million customers after their cryptocurrency mining malware using PowerShell scripts with
An AT&T data breach exposed the personal information of
04 GLOBAL ANALYSIS approximately 51M former and current clients, potentially
database was listed on a hacking forum. The exposed data
includes full names, home addresses, and order details.
hexadecimal URL encoding and fileless execution techniques.
including full names, home addresses, email addresses,
phone numbers, social security numbers, AT&T account
Check Point IPS protects against this threat (Oracle
05 HIGH PROFILE VULNERABILITIES numbers, and AT&T passcodes. A data breach exposed 500 GB of biometric data from India,
affecting police, military personnel, and public workers WebLogic WLS Security Component Remote Code
during elections. The leak involved unsecured databases from Execution (CVE-2017-10271), Oracle WebLogic Server
Check Point Research reports a wave of scam attacks in ThoughtGreen Technologies and Timing Technologies, including Improper Access Control (CVE-2023-21839))
06 INCIDENT RESPONSE PERSPECTIVE which attackers use various methods, including malicious QR
codes and phishing emails, to gain US taxpayers’ credentials
fingerprints and facial scans. The information could be leveraged
to manipulate biometric systems in Indian elections.
to steal IRS refunds. Check Point Research analyzed Rafel RAT, an open-source
07 2025 INDUSTRY PREDICTIONS remote administration tool for espionage and ransomware
attacks on Android devices. The malware targeted high-profile
The US and UK announced a criminal indictment and
organizations, especially in the military sector, with victims
sanctions against APT31, a group of Chinese hackers, for
mainly from the U.S., China, and Indonesia. It enables data
08 CISO RECOMMENDATIONS their role in alleged attacks against US and UK governmental
officials. Check Point Research explored the group’s use of
exfiltration, surveillance, and complete device control, resulting
in severe privacy and security breaches.
zero-day vulnerabilities.
JULY
Check Point Research identified the Stargazers Ghost Network,
consisting of 3,000 GitHub repositories that distribute malware
and malicious links through phishing schemes using a
AUG
Check Point Research found that over 20K Ubiquiti cameras
and routers are vulnerable (CVE-2017-0938) to amplification
attacks and privacy risks due to exposed UDP ports 10001
SEPT
Q3
93GB of sensitive data was stolen from Planned Parenthood’s
Montanna branch by the ransomware group RansomHub,
primarily affecting the organization’s administrative IT systems.
Distribution as a Service (DaaS) model. The network has shared and 7004. These ports permit unauthorized access to device
various types of malware, such as Atlantida Stealer and RedLine, information, which could be exploited for technical and social
The Ransomware Ecosystem and has generated significant profits. engineering attacks. Check Point Threat Emulation and Harmony Endpoint
protect against this threat (Ransomware.Win.RansomHub;
The Rise of Infostealers Check Point Research noted a rise in Server-Side Template Ransomware.Wins.RansomHub.ta.*)
Check Point Harmony Endpoint and Threat Emulation Injection (SSTI) vulnerabilities that allow attackers to execute
protect against this threat (InfoStealer.Win.Atlantida.*,
Cloud Complexities Trojan.WIN32.AtlantidaStealer*, InfoStealer.Wins.
commands and access sensitive data. Notable cases involve
Check Point Research identified an Iranian cyber campaign
Atlassian Confluence and CrushFTP. These vulnerabilities pose
Lumma.ta*, InfoStealer.Win.Lumma*, Injector.Win. significant risks, such as data theft and reputation damage, targeting Iraqi governmental networks using malware Veaty and
Edge Devices and ORBs RunPE.C, Loader.Wins.GoBitLoader.A, Trojan.Wins. reflected in a rise in critical CVEs Spearal. Techniques include a passive IIS backdoor, DNS tunneling,
Imphash.taim.LV, InfoStealer.Wins.Redline.ta.BY) and C2 communication via compromised emails, indicative of ties to
the APT34 group. The campaign likely utilizes social engineering for
initial infection and has a sophisticated C2 infrastructure.
Check Point IPS protects against this threat (Python
04 GLOBAL ANALYSIS RockYou2024, a leak of nearly 10 billion plaintext passwords from
multiple data breaches, poses significant risks for credential
Server-Side Template Injection, Java Server-Side
Template Injection, PHP Server-Side Template Injection,
stuffing and brute-force attacks that could affect various online Check Point Threat Emulation and Harmony Endpoint
Ruby Server-Side Template Injection, Node.js Server-
accounts and services. protect against this threat (APT.Wins.Oilrig.ta.B/C/D/E,
05 HIGH PROFILE VULNERABILITIES Side Template Injection, Expression Language Server-
Side Template Injection) APT.Win.OilRig.F, APT.Win.OilRig.WA.G, APT.Win.OilRig.H)
45M records from Rite Aid were stolen in a ransomware attack,
allegedly including clients’ identifying information and Rite Aid
06 INCIDENT RESPONSE PERSPECTIVE rewards numbers. RansomHub ransomware group claimed Following the July Venezuelan presidential elections, Check Point The FBI, CISA, and NSA report that Russian GRU Unit 29155
responsibility and threatened to leak the stolen data. Research revealed that hacktivist groups Anonymous Venezuela has targeted Ukraine with website defacements, data theft, and
and Cyber Hunters launched DDoS attacks and hacking attempts WhisperGate malware, disrupting aid efforts. They also targeted
07 2025 INDUSTRY PREDICTIONS against the government, driven by allegations of election fraud sectors globally, including government, finance, transportation,
energy, and healthcare.
Check Point Threat Emulation and Harmony Endpoint linked to Nicolás Maduro's administration.
protect against this threat (Ransomware.Win.RansomHub;
08 CISO RECOMMENDATIONS Ransomware.Wins.RansomHub.ta.*)
Harmony Endpoint and Threat Emulation protect against Check Point Threat Emulation and Harmony Endpoint
this threat (InfoStealer.Wins.PhemedroneStealer.*) protect against this threat (Trojan.Win.WhisperGate; Trojan.
Location safety app Life360 and project management tool Trello Wins.WhisperGate.ta.*; Trojan.Wins.WhisperGate)
suffered data breaches due to API vulnerabilities. Personal
information of Life360’s 442,519 customers was exposed, while
21.1GB of Trello’s data was leaked. Threat actor 'emo' claimed A vulnerability in the ChatGPT macOS app allowed attackers to
responsibility and shared the stolen data on the dark web. implant persistent spyware, SpAIware, into the app’s memory
through indirect prompt injection, enabling continuous data
exfiltration of user inputs and future chat sessions. OpenAI has
since resolved the issue.
OCT
Check Point Research analyzed ‘Operation MiddleFloor,' a
disinformation campaign targeting Moldova's government
and education sectors before the October 2024 elections. The
NOV
The FBI, the US Department of Treasury, and the Israeli
National Cyber security Directorate (INCD) released a joint
Cyber security Advisory attributing a large-scale phishing
DEC
Q4
Check Point Research uncovered a novel exploit of Godot
Engine—a gaming development platform—to execute malicious
GDScript code. The technique enables attackers to deliver
Russian-aligned group Lying Pigeon uses spoofed emails campaign impersonating the INCD and targeting Israeli malware across platforms like Windows, macOS, Linux, Android,
to spread false information about EU membership while organizations to the Iranian cyber group Emennet Pasargad. and iOS, while evading detection by most antivirus solutions.
The Ransomware Ecosystem collecting data for potential malware attacks. Check Point Research analyzed the malware, tracking its Malicious loader, “GodLoader”, used this technique and already
evolution and learning. infected over 17,000 machines.
The Rise of Infostealers A new phishing-as-a-service platform called Mamba 2FA
targets adversary-in-the-middle phishing attacks. It mimics
Check Point Threat Emulation and Harmony Endpoint Check Point Harmony Endpoint and Threat Emulation
Cloud Complexities Microsoft 365 login pages and bypasses multi-factor
protect against this threat (Behavioral.Win.FakeChrome.B provide protection against this threat (Technique.win.
authentication, stealing credentials and cookies sent to
attackers via a Telegram bot. and Trojan.Wins.FakeUpdater.A) GDscript.*, Dropper.Win.Godot.*)
Edge Devices and ORBs
The FBI and CISA investigate breaches by the Chinese Check Point Research monitored a large-scale phishing Check Point Research analyzed Akira ransomware’s latest
government-affiliated group Salt Typhoon at U.S. campaign dubbed CopyRh(ight)adamantys, which uses the latest variant, written in Rust, that primarily targeted ESXi bare metal
04 GLOBAL ANALYSIS telecommunications companies, including AT&T, Verizon,
and Lumen Technologies. The attacks targeted wiretapping
version of the Rhadamanthys stealer (0.7). This campaign targets
regions like the U.S., Europe, East Asia, and South America,
hypervisor servers in early 2024. The report showed how Rust
idioms, boilerplate code, and compiler strategies were used to
systems and devices of President-elect Trump, former Vice using a copyright theme and impersonating various companies, create complex assembly.
President Harris, and other notable politicians. tailoring each email from different Gmail accounts.
05 HIGH PROFILE VULNERABILITIES
Check Point Harmony Endpoint and Threat Emulation
Check Point Threat Emulation and Harmony Endpoint provide protection against this threat (Ransomware_Linux_
06 INCIDENT RESPONSE PERSPECTIVE protect against this threat (InfoStealer.Wins. Akira_C/D, Ransomware.Wins.Akira.G/H)
Rhadamanthys.ta.V, InfoStealer.Wins.Rhadamanthys.*, and
InfoStealer.Wins.Rhadamanthys.*)
07 2025 INDUSTRY PREDICTIONS Ukrainian intelligence agency HUR confirmed a DDoS against
Russia’s Gazprombank, one of Russia’s largest banks, which
Check Point Research tracked the WIRTE threat actor, linked to aimed to disrupt financial operations related to Russia’s war
Hamas-affiliated Gaza Cybergang, conducting espionage against efforts in Ukraine.
08 CISO RECOMMENDATIONS entities in the Palestinian Authority, Jordan, Iraq, Egypt, and
Saudi Arabia, and has expanded to disruptive attacks connected
to SameCoin malware targeting Israeli entities in 2024.
03 CYBER SECURITY TRENDS Based on Check Point Research’s findings, AI was utilized in
at least one third of the elections that took place worldwide
between September 2023 and February 2024, either by
Cyber Wars- 2024 Edition candidates themselves or potentially by foreign actors. Recent
instances demonstrate this development, such as the Russian-
The Ransomware Ecosystem linked APT group CopyCop targeting the June 2024 USA primary
elections with fabricated news segments featuring deepfake
The Rise of Infostealers portrayals of political figures. Distributed through X (formerly
known as Twitter) and Facebook, this content exploited platform
Cloud Complexities algorithms to target specific voter demographics. AI-generated
bots further disseminated divisive narratives, posing as genuine
Edge Devices and ORBs opinion pieces to polarize the electorate.
01 INTRODUCTION won the first round, declassified intelligence revealed the extent
of foreign interference, prompting an unprecedented annulment
meddling as a threat, while Canada expanded the CSIS Act for
better intelligence sharing. The European Union imposed strict INITIAL HACKTIVISTS
ACCESS ENTITIES
of the election results and scheduling a new vote. In Moldova, rules on platforms like Meta to curb Russian disinformation.
02 2024 CYBER SECURITY EVENTS a campaign called "Operation MiddleFloor", attributed to a OpenAI and Microsoft are disturbing accounts associated with
Russian-aligned group, targeted government and education groups from China, Iran, Russia, and North Korea. DESTRUCTIVE
ACTIVITY
sectors using spoofed emails and documents to spread anti-EU
03 CYBER SECURITY TRENDS
DESTRUCTIVE AND DISRUPTIVE MALWARE
narratives and undermine trust in pro-European leadership.
Figure 1 – Iran’s typical warfare campaign tactics.
The Paris Olympics became another key focus for disinformation.
Cyber Wars- 2024 Edition Russian-linked Storm-1679 spread false narratives about Nation-states increasingly relied on destructive malware
corruption, biased officiating, and threats of violence. Automated as an important weapon in cyber warfare. These "loud" Similarly, the Hamas-linked group WIRTE showcased its
The Ransomware Ecosystem accounts and bots amplified these claims to discredit the event operations, characterized by wiper malware and other evolving cyber capabilities by using the SameCoin wiper variant
and disrupt Western unity. More aggressively, the Iranian group disruptive tools, targeted critical infrastructure, disrupting to target hospitals and municipalities in Israel, exacerbating the
The Rise of Infostealers Emennet Pasargad exploited vulnerabilities in the Olympics’ essential services and spreading chaos. psychological and logistical toll of the ongoing conflict.
display system provider to disrupt broadcasts and spread anti-
Cloud Complexities Israel propaganda and sent threats to Israeli athletes from a fake Amidst the heightened tensions in the Middle East, Iran and In Eastern Europe, Russian-linked groups continued to
persona imitating the French group GUD. other regional threat groups demonstrated the destructive weaponize destructive malware as part of its broader hybrid
potential of wiper malware. Void Manticore, an Iranian group warfare strategy in Ukraine. The notorious Russian-affiliated
Edge Devices and ORBs These attacks on democracies and Western political alliances linked to the Ministry of Intelligence and Security (MOIS), APT44 (also known as Sandworm) introduced AcidPour, an
such as NATO have become increasingly effective and dangerous deployed the No-Justice Wiper under the guise of hacktivist advanced wiper variant of the AcidRain malware. AcidPour was
as democratic countries face ever-growing challenges. personas like Karma and Homeland Justice. These campaigns deployed to disrupt Ukrainian critical infrastructure, telecom
04 GLOBAL ANALYSIS Online cultural wars, social media-fueled populism, and targeted critical Israeli infrastructure and private organizations, networks, and internet service providers. This malware was
politicized media platforms using advanced algorithms to tailor erasing data and disrupting services. designed not only to destroy systems but also to embed itself
favorable content created fertile ground for foreign actors to deeper into environments, exfiltrating sensitive military plans
05 HIGH PROFILE VULNERABILITIES undermine public trust. The dissemination of content that aligns and severing vital communication channels. These operations
underscored Russia’s intent to leverage cyber tools as a vital
support mechanism in its geopolitical conflicts.
06 INCIDENT RESPONSE PERSPECTIVE
03 CYBER SECURITY TRENDS North Korea’s "financial warfare" is a delicate balancing act: STRIKES TO CONTINUOUS BATTLES shifted beneath their feet. Cyber warfare is no longer confined
to digital infrastructure but has permeated the social fabric.
ransomware and cryptocurrency theft fund the regime's nuclear Battles over information and perception threaten to outlast the
In a broader view of this year, cyber warfare has fragmented
ambitions, missile programs, and other weapons development, physical systems they were once expected to target.
into smaller, continuous battles across multiple domains
Cyber Wars- 2024 Edition while espionage campaigns gather intelligence to enhance
instead of catastrophic strikes aimed at crippling nations at a
military and technological capabilities.
single blow. These conflicts rarely have clear winners or losers
The Ransomware Ecosystem but mostly succeed in eroding trust, weakening institutions, and
Lazarus Group, the prime example of North Korea’s cyber criminal
The Rise of Infostealers machine, spearheaded operations in 2024 with characteristic
sophistication. One operation disguised as a tank-themed
cryptocurrency game exploited a zero-day vulnerability in Google
Cloud Complexities Chrome to deploy the Manuscrypt backdoor. The goal wasn’t just
to steal cryptocurrency but also to add an element of espionage. A
Edge Devices and ORBs stolen wallet today might fund a stolen military blueprint tomorrow.
ELI SMADJA
Security Research
Group Manager
Other 6%
The fallout from ALPHV’s withholding an affiliate’s ransom share,
02 2024 CYBER SECURITY EVENTS combined with LockBit’s damaged reputation and the availability 42% KillSec3
of leaked ransomware code, fueled the rise of more autonomous
operators. An increasing number of smaller, independent groups
6%
03 CYBER SECURITY TRENDS emerged, unwilling to rely on established RaaS frameworks or
QiLin
share profits with centralized operators. By leveraging leaked
code, these actors customized their own ransomware strains and 5%
Cyber Wars - 2024 Edition infrastructures, reducing dependence on major RaaS providers SafePay
and fostering a more decentralized and competitive ecosystem.
The Ransomware Ecosystem
5%
Play
The Rise of Infostealers Inc Ransom Medusa 4%
Hunters
4% Lynx
4%
200 4% 4%
Cloud Complexities
180
Figure 7 - Data leak sites victims by actor, November 2024.
Edge Devices and ORBs 160
140
04 GLOBAL ANALYSIS
120
100
HEALTHCARE UNDER FIRE
80 The migration of ransomware groups to targeting healthcare
organizations underscores the gradual decline of previously
05 HIGH PROFILE VULNERABILITIES 60
established “ethical” guidelines. In the early months of the
40
COVID-19 pandemic, many RaaS operators publicly declared
hospitals and medical providers off-limits. However, over
06 INCIDENT RESPONSE PERSPECTIVE
20
0
time, these restrictions weakened. Some RaaS administrators
adopted a more nuanced approach. While they discouraged
outright service disruption, such as encrypting critical systems,
07 2025 INDUSTRY PREDICTIONS Nov
23
Dec
23
Jan
24
Feb Mar
24 24
Apr May June
24 24 24
Jul
24
Aug
24
Sep
24
Oct
24
Nov
24
they permitted the theft of sensitive medical data. Affiliates
LockBit victims RansomHub victims could then extort victims by threatening to leak patient
08 CISO RECOMMENDATIONS information and pressure healthcare entities to pay without
directly endangering patients.
Figure 6 - Data leak sites reported victims of LockBit vs. RansomHub.
in 2024 This approach deteriorated further after the law enforcement
operation against ALPHV. The group openly encouraged
affiliates to specifically target hospitals. By February 2024, the
As 2024 closed, RansomHub emerged as the new dominant healthcare and medical sectors became the most targeted
player, accounting for 16% of reported victims in November. sectors for ALPHV, making up approximately 30% of their
Over 40 other double-extortion ransomware groups remained reported victims.
active during the same period, each maintaining their own data
leak sites and targeting new victims.
08 CISO RECOMMENDATIONS
10%
OF RANSOMWARE VICTIMS
65%
OF HEALTHCARE-RELATED
ARE HEALTHCARE VICTIMS ARE BASED IN THE US
04 GLOBAL ANALYSIS Figure 10 - Bashe Operation Policy, from their data leak sites. Each year, the ransomware environment becomes progressively
complicated. While law enforcement successfully dismantled larger
05 HIGH PROFILE VULNERABILITIES Ransomware as a Service (RaaS) groups, new groups emerged this year.
This approach also created opportunities for false victim
claims. Without the visible disruption caused by encryption,
Additionally, the shift from encryption-based extortion to data extortion
06 INCIDENT RESPONSE PERSPECTIVE threat actors can more easily recycle previously leaked brings new challenges. However, one thing remains consistent: the need to
data and falsely claim credit for new attacks. This tactic adapt and enhance data protection, monitoring, and rapid threat detection.
complicates tracking ransomware campaigns and identifying
07 2025 INDUSTRY PREDICTIONS genuine perpetrators as multiple groups claim responsibility
for the same victim.
CRIME ECOSYSTEM
07 2025 INDUSTRY PREDICTIONS
As big botnets and banking malware decline, infostealers have emerged as the
new Big Bad, now distributed through large-scale campaigns. A quick search on
08 CISO RECOMMENDATIONS the Russian Market, one of the largest underground criminal marketplaces, reveals
that over 10 million infostealer logs are currently available for purchase. These logs
contain stolen user credentials, authentication tokens, and sensitive data. Cyber
criminals can use them as powerful tools to steal funds from individuals, identity
theft, or breach computer networks worldwide.
90%
websites mimicking legitimate platforms like cryptocurrency monetized. In many cases, IABs resell access to carefully
services, AI tools, and groupware applications. Affiliates selected targets on other forums, attracting ransomware OF BREACHED COMPANIES
may also exploit platforms like GitHub to host malicious affiliates keen to exploit these opportunities. These affiliates PREVIOUSLY HAD
repositories, as seen in campaigns using fraudulent accounts then deploy ransomware, often acquired from Ransomware-as- CORPORATE CREDENTIALS
to disseminate popular infostealers. Other tactics involve
LEAKED IN A STEALER LOG
01 INTRODUCTION phishing templates that target users seeking cracked
software, fake CAPTCHA pages designed to trick users into
downloading malware, and malicious Google ads that redirect
02 2024 CYBER SECURITY EVENTS to counterfeit download sites. Unlike developers, who focus
on creating and updating the malware, the affiliates entirely
determine the distribution, resulting in a wide range of exploitation of stolen data.
03 CYBER SECURITY TRENDS innovative infection campaigns.
Credentials and session cookies stolen from employee home
computers can be used to breach corporate networks. One
Cyber Wars - 2024 Edition MONETIZATION AND THE CYBER Figure 14 - Ad offering access to corporate networks.
study revealed that 90% of breached companies had corporate
credentials leaked in a stealer log before the breach. This
The Ransomware Ecosystem CRIMINAL ECOSYSTEM statistic underscores the critical role that infostealers play
in enabling more significant cyber attacks and emphasizes
The Rise of Infostealers the importance of addressing this threat within the broader
To understand the full impact of infostealers, we must
a-Service (RaaS) providers, to execute their attacks. context of cyber security.
examine their role within the broader cyber criminal
Cloud Complexities ecosystem. Many infostealer operators depend on clients Earlier this year, the Snowflake mega data breach exposed
and effective distribution channels to monetize the data they The funds generated from successful ransomware attacks fuel
this entire ecosystem. The stolen personal data offers other sensitive information from over 165 organizations, including
Edge Devices and ORBs steal. Underground markets and Telegram channels provide Advance Auto Parts, Ticketmaster, and Santander Bank,
immediate platforms where sellers can offer their stolen data, lucrative avenues for cyber criminals. Personally Identifiable
and buyers can efficiently search for specific logs that suit Information (PII), financial details, and credit card numbers
their objectives. can be used for identity theft, fraud, and unauthorized
04 GLOBAL ANALYSIS transactions resulting in Business Email Compromise
Initial Access Brokers (IABs) leverage this information to (BEC). All these activities rely on a mature and functioning
gain initial footholds in corporate networks. Access obtained criminal infrastructure that facilitates the exchange, sale, and
05 HIGH PROFILE VULNERABILITIES
08 CISO RECOMMENDATIONS
An analysis of logs offered for sale on platforms like the Further data analysis from Cyberint, a Check Point company,
02 2024 CYBER SECURITY EVENTS Russian Market reveals which infostealers are most prolific highlights the top URL credentials stolen from infected
in terms of harvested data. Lumma Stealer, first reported in machines. While many of these URLs belong to major
2022, is currently the most prominent infostealer, with the internet services and social media platforms, as expected,
03 CYBER SECURITY TRENDS highest number of logs available for sale. RisePro, Vidar, other frequently visited sites include Roblox, Discord, Twitch,
and StealC follow it. This data suggests that these malware Infostealers’ popularity has not gone unnoticed by international
families have been particularly effective in recent campaigns and EpicGames. This suggests that "gamers" may be more law enforcement coalitions. Two closely related infostealer
or have extensive distribution channels. susceptible to infostealer infections, likely due to less families, RedLine and Meta, were the focus of a major law
stringent internet hygiene practices in these communities. enforcement operation known as "Magnus." In October, this
Insights from the analysis of Check Point gateway data operation resulted in the seizure of multiple servers and
reveal a different perspective on infostealer activity. In these domains associated with these malware strains.
datasets, AgentTesla emerges as the most active infostealer,
04 GLOBAL ANALYSIS
Following the decline of the big botnets, infostealers have become a significant and wide-
05 HIGH PROFILE VULNERABILITIES scale threat. They offer cyber criminals efficient ways to steal credentials and session
tokens, contributing to financial fraud and identity theft and acting as an entry point to
06 INCIDENT RESPONSE PERSPECTIVE corporate networks. As companies increasingly adopt remote work and bring-your-own-
device (BYOD) policies, it is essential that they implement protective strategies.
07 2025 INDUSTRY PREDICTIONS
08 CISO RECOMMENDATIONS
SERGEY SHYKEVICH
Threat Intelligence
Group Manager
ATTACK SURFACE
exposed on a misconfigured S3 bucket. Microsoft’s S3 bucket
06 THE RISE OF INFOSTEALERS alternative, Azure Blob Storage containers, is also susceptible
to misconfigurations. A Fujitsu employee publicly exposed vast
amounts of sensitive data, including private client information,
07 2025 INDUSTRY PREDICTIONS Cloud infrastructure became integral to most organizations’ IT emails, AWS keys, and plaintext passwords. BMW likewise
frameworks in 2024. Companies of all sizes now harness the scalability suffered from an exposed storage container, leaking secret
and flexibility the cloud provides to support their operational requirements keys for accessing private buckets and credentials for other
08 CISO RECOMMENDATIONS like email services, development operations, data storage, and hosting cloud services.
production services. The cloud empowers organizations to swiftly deploy
In the realm of poor API security practices, the developers of
and scale their environments to match their needs. At the same time,
the Rabbit R1—an AI-driven personal assistant device—were
this widespread adoption has brought about a new array of security notified after hard-coded API keys for third-party services were
vulnerabilities that are increasingly exploited by threat actors. found in their codebase. These keys were overly permissive,
essentially granting the ability to read all chat responses from
every customer, potentially revealing sensitive information.
08 CISO RECOMMENDATIONS
MICHAEL ABRAMZON
Threat Intelligence
and Research Architect
03 CYBER SECURITY TRENDS A notable development is the rise of complex botnets used
as ORBs. One of the most sophisticated is the Raptor Train
botnet, orchestrated by the Chinese APT group Flax Typhoon,
Cyber Wars - 2024 Edition which assembled over 200,000 compromised devices,
including small office/home office (SOHO) routers, NAS
The Ransomware Ecosystem systems, and IP cameras. Organized into multi-tiered layers,
the botnet’s structure supports a command-and-control (C2)
The Rise of Infostealers system through the “Sparrow” platform, enabling remote
operations, DDoS attacks, and espionage. The attackers
Cloud Complexities leverage both zero-day and known vulnerabilities, creating a
scalable, persistent attack infrastructure with global reach.
Through these devices, Flax Typhoon maintains operational
Edge Devices and ORBs control, posing significant risks for both public and private
sector entities.
04 GLOBAL ANALYSIS Flax Typhoon is not the only Chinese-aligned actor operating
Anonymous environments. Such zero-day exploits in edge devices have Check Point’s SSLVPN appliance was also targeted through
02 2024 CYBER SECURITY EVENTS Traffic significant consequences as these devices are not easily the path traversal vulnerability identified as CVE-2024-24919.
patched, given their critical role in the main network flow. This exploit allowed attackers to access and read files on
Corporate Network
SOHO Routers Corporate Firewalls Patching edge devices can shut down network services SSLVPN devices, including sensitive password hashes and
Compromised Backdoor Access
03 CYBER SECURITY TRENDS Assets
for some time, which can lead to considerable operational configuration files. When these devices are configured with
Brute-Force consequences. weaker authentication methods, like username-and-password
Attacks access, they are prone to unauthorized data reads. This
Cyber Wars - 2024 Edition VPN Gateways IOT Devices Some actors have turned to exploiting edge devices as a attack demonstrates the evolving focus on edge devices by
DDoS Attacks methodology. Magnet Goblin, a financially motivated actor different threat actors, who can rapidly exploit any emerging
The Ransomware Ecosystem that first emerged in 2024, focuses on rapidly exploiting vulnerabilities.
newly disclosed vulnerabilities in widely used edge devices.
The Rise of Infostealers Their campaigns have targeted Ivanti Connect Secure While cyber criminals have improved their exploitation of
VPNs and popular software like Magento and Qlik Sense to edge devices, state-sponsored actors continue demonstrating
Figure 19 – ORB infrastructure overview. their technological superiority. They use zero-day exploits
Cloud Complexities
Edge Devices and ORBs
04 GLOBAL ANALYSIS
SIGNIFICANT EDGE DEVICE VULNERABILITIES DISCLOSED IN 2024
08 CISO RECOMMENDATIONS
58%
INCREASE OF
The Rise of Infostealers GLOBAL AMERICAS INFOSTEALER INFECTION
ATTEMPTS IN 2024
Cloud Complexities
39% 19% 6% 2% 32% 15% 4% 1%
Edge Devices and ORBs Multipurpose Malware Infostealer Mobile Crypto Miners Multipurpose Malware Infostealer Mobile Crypto Miners
01 INTRODUCTION
04 GLOBAL ANALYSIS
08 CISO RECOMMENDATIONS
Figure 2 - The map displays the cyber threat risk index globally, demonstrating the main risk areas around the world.
Edge Devices and ORBs Financial Services 1,510 +30% The technological supply chain sector, including software,
hardware, and semiconductor companies, also experienced
Biotech & Pharmaceuticals 1,486 a significant surge in cyberattacks. Notably, the hardware
and semiconductor industries saw the sharpest rise, with a
04 GLOBAL ANALYSIS Business Services 1,434 +71%
staggering 179% increase in average weekly attacks, with the
Real Estate, Rentals, & Leasing 1,422 total number now exceeding 1,400. This spike can be attributed
to the growing global demand for hardware and the heightened
05 HIGH PROFILE VULNERABILITIES Wholesale & Distribution focus on AI technologies. As critical components of modern
1,415 +33%
infrastructure and innovation, these industries have become
06 INCIDENT RESPONSE PERSPECTIVE Hardware & Semiconductors 1,410 +179% prime targets for cyber criminals seeking to exploit supply chain
Software 1,361 +109% GLOBAL vulnerabilities for financial gain, espionage, or disruption.
Figure 3 - Global average of weekly attacks per organization by industry in 2024 [% of change from 2023].
[*] Newly introduced sectors which were not part of the previous report.
pdf 8% exe 5% 7z 8%
02 2024 CYBER SECURITY EVENTS
jar 5% lnk 4% gz 6%
68% 61%
2021 2022 2023 2024
OF ATTACKS OF EMAIL-DELIVERED
06 INCIDENT RESPONSE PERSPECTIVE EMAIL 84% 86% 89% 68% ORIGINATE
FROM EMAIL
MALICIOUS FILES INCLUDE
HTML ATTACHMENTS
07 2025 INDUSTRY PREDICTIONS
WEB 16% 14% 11% 32%
08 CISO RECOMMENDATIONS Figure 7 - Delivery protocols—Email vs. Web attack vectors in 2021-2024.
has led to a shift in tactics: most malicious emails now contain embedding JavaScript code or embedded links within the
HTML files or PDF documents. Malicious uses of HTML files document, which can either trigger malware downloads or
include phishing and credential theft, often achieved by replicating redirect victims to malicious websites. In some cases, PDFs
Email-based attacks remain the dominant initial attack vector, legitimate login pages. Additional use cases include more advanced exploit vulnerabilities in outdated PDF reader software to
with 68% of attacks originating from email. This persists techniques like HTML smuggling, redirection to malicious websites, execute code on the victim’s machine.
despite a significant rise in web-delivered attacks (32%), which browser exploits, and other methods. Notably, 61% of email-
is primarily attributed to the dominance of infected-website- delivered malicious files include HTML attachments. Malicious archive files have also become a common attack vector
based malware distribution frameworks such as FakeUpdates. in cyber campaigns, leveraging formats like ZIP, RAR, 7z, and
Malicious PDF files is another prevalent attack vector that more. Among these, ZIP files are the most common, and account
The decline of malicious macro attacks within Office documents is found in 22% of malicious emails. These typically involve for 31% of malicious archives, followed by RAR files at 22% and
01 INTRODUCTION AgentTesla 12% AgentTesla 15% For each region below, we present the most prevalent malware in
2024, and the percentage of corporate networks impacted by each
Remcos 8% Androxgh0st 7%
malware family.
02 2024 CYBER SECURITY EVENTS Formbook 8% Remcos 6%
AsyncRAT
Qbot, one of the oldest and most versatile malware families,
AgentTesla 12% 10%
experienced a dramatic decline over the past year. Previously
06 INCIDENT RESPONSE PERSPECTIVE Remcos 10% Remcos 9% at second place in our rankings, Qbot's activity was significantly
disrupted in late 2023 following a multinational operation led by
CloudEyE 10% Androxgh0st 9%
07 2025 INDUSTRY PREDICTIONS the FBI which targeted and dismantled its infrastructure. Since
then, many threat actors who previously distributed Qbot shifted
Formbook 9% Formbook 8%
to other malware strains, including DarkGate.
08 CISO RECOMMENDATIONS AsyncRAT 8% AgentTesla 7%
AgentTesla, a regular presence in our most prevalent malware
Androxgh0st 7% Lumma 6% list since 2020, specializes in stealing sensitive information from
NJRAT 5%
infected systems. Check Point Research continues to monitor
Lumma 5%
this infostealer that is frequently deployed in global campaigns.
NJRAT 4% Ramnit 5% AgentTesla can extract a wide range of data from compromised
machines, including keystrokes, login credentials from web
Nanocore 4% Mirai 5% browsers, and credentials from email clients.
Figure 10 – Most prevalent malware in EMEA – 2024. Figure 11 - Most prevalent malware in APAC – 2024.
6%
The Rise of Infostealers Lumma 12% These categories remain critical for understanding the main
Lokibot
SnakeKeylogger
6%
5%
intent behind specific attacks and identifying overarching trends
within the cyber criminals ecosystem.
Cloud Complexities Other 30%
Figure 12 - Most prevalent multipurpose malware globally – 2024. Figure 13 - Most prevalent multipurpose malware in the Americas – 2024. Intensive law enforcement activity throughout the year has
Edge Devices and ORBs significantly reshaped the cyber threat landscape. In May
2024, a multinational coalition executed Operation Endgame,
targeting botnet infrastructure responsible for distributing
APAC
04 GLOBAL ANALYSIS EMEA APAC malware. This operation disrupted malware distribution
networks linked to groups such as IcedID, Smokeloader,
Pikabot, Bumblebee, SystemBC, and Trickbot. The operation
05 HIGH PROFILE VULNERABILITIES dismantled over 100 servers, seized more than 2,000 domains,
Other and led to the arrest of four individuals—one in Armenia and
FakeUpdates
06 INCIDENT RESPONSE PERSPECTIVE 24% Other 28%
three in Ukraine—while also freezing illegal assets.
Robin 7% and Emotet, which previously dominated the space, have been
replaced by FakeUpdates (40%), Androxgh0st (18%), Phorpiex
5% Glupteba (5%), Darkgate (5%) and Raspberry Robin malware families.
7% Mirai
9%
Figure 14 - Most prevalent multipurpose malware in EMEA – 2024. Figure 15 - Most prevalent multipurpose malware in APAC – 2024.
6% Amadey
license to $350 for a lifetime subscription.
6%
Figure 18 - Top infostealer malware in EMEA – 2024. Figure 19 - Top infostealer malware in APAC – 2024.
29%
08 CISO RECOMMENDATIONS
Kinsing
35%
Figure 22 - Top crypto mining malware in EMEA – 2024. Figure 23 - Top crypto mining malware in APAC – 2024.
34% 28% 27% Rafel RAT, an open-source Android Remote Access Trojan, is widely
02 2024 CYBER SECURITY EVENTS used for espionage purposes, as revealed by this Check Point
Research report. Our investigation found that it was deployed in
approximately 120 distinct malicious campaigns, many of which
03 CYBER SECURITY TRENDS Necro targeted high-profile organizations, including entities within
Hiddad
19% 7%
Joker the military sector. Rafel RAT enables threat actors to exfiltrate
Cyber Wars - 2024 Edition
AhMyth Anubis
Anubis 15% sensitive data, contact lists, and Two-Factor Authentication
AhMyth (2FA) messages, gain access to accounts, and bypass multi-
The Ransomware Ecosystem Hiddad
9% 12% 10% 12% factor authentication mechanisms. Notably, the espionage
4% group APT-C-35, also known as the DoNot Team, was observed
leveraging Rafel RAT in their operations, which highlights the
The Rise of Infostealers malware’s adaptability and effectiveness across a diverse range of
threat actor profiles and objectives.
Cloud Complexities
Figure 24 - Top mobile malware globally – 2024. Figure 25 - Top mobile malware in the Americas – 2024. The most prevalent mobile malware in 2024 (23%) was Joker, a
Edge Devices and ORBs notorious malware targeting Android devices since 2017. Joker’s
primary objective is to covertly subscribe users to premium
services by simulating user clicks and intercepting SMS messages
and notifications. A notable case involved a Joker variant embedded
04 GLOBAL ANALYSIS EMEA APAC in the app Beauty Camera in the Google Play Store, which garnered
over 100,000 downloads. While the app appeared legitimate, it
secretly downloaded additional resources from remote command
05 HIGH PROFILE VULNERABILITIES and control (C2) servers, enabling further malicious activities.
Joker Joker
06 INCIDENT RESPONSE PERSPECTIVE 24% Other 25% The rise of Necro (19%) in the top three mobile malware across
all regions is unsurprising. First identified in 2019, Necro is a
Other
38% 33% dropper malware designed to download and execute additional
07 2025 INDUSTRY PREDICTIONS payloads. Recently, Necro was distributed through two malicious
applications in the Google Play Store with a combined 11 million
Anubis
downloads. Beyond Google Play, Necro was also identified in
08 CISO RECOMMENDATIONS 13% Necro unofficial repositories, embedded into popular apps and games like
Necro AhMyth
22% WhatsApp, Minecraft, Stumble Guys, and others.
AhMyth Hiddad Anubis Two other prominent mobile threats, Anubis and AhMyth, are still
12% 7%
Hydra 8% 3% 10% widely used due to their publicly available source code. Anubis,
originally developed as a banking Trojan, evolved to include Remote
5% Access Trojan (RAT) functionality, keylogging, audio recording, and
even ransomware-like features. Its versatility makes it a preferred
tool for threat actors targeting financial institutions. AhMyth, initially
created as an educational project and made public on GitHub, has
Figure 26 - Top mobile malware in EMEA – 2024. Figure 27 - Top mobile malware in APAC – 2024. been integrated into malicious campaigns.
introducing an inherent bias. However, the information shared The decline of these two major criminal groups reshaped the
on these criminal DLS offers valuable perspectives on the
03 CYBER SECURITY TRENDS ransomware landscape. The data analyzed here covers the
ransomware landscape. There is greater fragmentation within
the ecosystem, as numerous smaller groups now account for a
period from January to December 2024. United States 7.5
larger share of the total annual victims. While the top 10 most
Cyber Wars - 2024 Edition active groups were responsible for over 66% of all posted victims
Canada 6.4
Switzerland
in 2023, their combined share dropped to just 51% in 2024. 4.4
The Ransomware Ecosystem RansomHub’s rise as the leading double-extortion group can be United Kingdom 4.1
The Rise of Infostealers and ALPHV affiliates who lack the capability or choose not to Belgium 4.1
Singapore
LockBit3 3.4
Other 6%
04 GLOBAL ANALYSIS 49% akira
Figure 30 - Ransomware corporate victims per 1M capita, per country.
5% Rest of World
05 HIGH PROFILE VULNERABILITIES hunters 23% In the RaaS (Ransomware as a Service) model, affiliates
4% Spain select their victims independently, leading to a geographical
medusa 2% United distribution of victims that reflects broader ecosystem trends
06 INCIDENT RESPONSE PERSPECTIVE 4% Australia States rather than the RaaS operator preferences. Operators can
inc
qilin
3%
2%
India 50% impose restrictions, such as prohibiting attacks on former
2% Soviet republics or non-profit organizations or those involved in
07 2025 INDUSTRY PREDICTIONS 8base
3%
ransom bianlian
3% 3%
France
2% healthcare. However, some groups demonstrate a more distinct
Brazil geographical focus. For instance, the ransomware group known
2%
Figure 28 - Ransomware double-extortion groups, by percentage of total as “RA Group” disproportionately targets Germany, where over
08 CISO RECOMMENDATIONS published victims in 2024.*
Italy
3% 20% of its published victims are located, while KillSec focuses
Germany heavily on India, with 30% of its victims located there.
3%
Canada
United An analysis of the global average of weekly attacks per
Two of the most dominant ransomware actors in 2023 have 5% Kingdom
organization by industry (Figure 3) shows that the education,
become inactive during 2024. LockBit, which accounted for 21% 6% government, and healthcare sectors are the most frequently
of victims in 2023, and ALPHV, responsible for 9%, either ceased targeted. However, looking specifically on ransomware
or significantly reduced their victim postings. LockBit's decline Figure 29 - Victims by country, as reported on data leak sites – 2024. extortion, according to DLS data, manufacturing emerges as
* Data from the DLS covers the period of January 1, 2024 to December 23, 2024.
Healthcare
The Rise of Infostealers & Medical
10%
Consumer Goods
Cloud Complexities & Services
9%
Business
Edge Devices and ORBs Services
7%
Financial
7%
Services
Education 5%
05 HIGH PROFILE VULNERABILITIES
Government 4%
BYPASS (CVE-2024-37085)
(IPS) sensor net and details some of the most prominent and all exploitation attempts. Recent vulnerabilities are increasingly
interesting attack techniques and exploits observed by Check severe, easier to exploit, and adopted by threat actors more
Point Research (CP<R>) in 2024. rapidly than in the past. However, threat actors continue to
In June 2024, a critical authentication bypass vulnerability was target older vulnerabilities, with over 57% of exploitation
disclosed in Broadcom VMware's ESXi hypervisor. This flaw
01 INTRODUCTION attempts focusing on CVEs published in 2020 or earlier.
PHP CGI ARGUMENT INJECTION affects the integration of ESXi with Active Directory (AD) for
user management. Specifically, when an ESXi host is joined
This underscores a persistent issue where systems remain
unpatched for years, even after patches are available.
02 2024 CYBER SECURITY EVENTS (CVE-2024-4577) to an AD domain, it automatically grants full administrative
privileges to members of a domain group named "ESX
CVE-2024-4577 is a critical command injection vulnerability in Admins." Notably, this group does not exist by default in AD,
03 CYBER SECURITY TRENDS PHP that specifically affects Windows systems running Apache and ESXi does not verify its existence upon domain integration.
with PHP-CGI, and was exploited within a day of its release. Therefore, any domain user with permissions to create
Notably, the vulnerability mainly affects Windows installations groups can establish and assign users to an "ESX Admins"
Cyber Wars - 2024 Edition using Chinese and Japanese language locales, although group, thereby obtaining full administrative access to the
other installations are also targeted. Disclosed as part of a ESXi host. This vulnerability was actively exploited by multiple
The Ransomware Ecosystem patch released in June 2024, the issue arises from Windows' ransomware operators, including Storm-0506, Storm-1175,
"Best-Fit" behavior during character encoding conversions, Octo Tempest, and Manatee Tempest. In some instances, the
The Rise of Infostealers which can cause the PHP CGI module to misinterpret certain observed post-compromise technique resulted in Akira and
characters as PHP options. This enables unauthenticated Black Basta ransomware deployments.
Cloud Complexities users to inject arguments into the PHP binary, leading to
remote code execution or the exposure of sensitive data.
Edge Devices and ORBs
Following its disclosure, the vulnerability was quickly
leveraged by multiple malicious actors, including for
2024 4%
ransomware deployment, and we observed it impacting more
04 GLOBAL ANALYSIS than 25% of corporation networks. The vulnerability was also 2023 15%
used to deploy malware such as the Msupedge backdoor,
Gh0st RAT, RedTail crypto miners, and XMRig. 2022 12%
05 HIGH PROFILE VULNERABILITIES 2021 12%
(CVE-2024-21887) 2019 6%
07 2025 INDUSTRY PREDICTIONS In early 2024, a critical command injection vulnerability, CVE-
2018 7%
Figure 1 - Most Common Triggers for contacting Incident Response. Figure 2 – Attack tactics in security alerts that trigger incident responses, ordered by MITRE ATT&CK Matrix.
07 2025 INDUSTRY PREDICTIONS Rapidly installing remote-control tools across multiple devices is a known tactic, technique, and procedure (TTP) of Such third-party alerts serve as crucial early warnings, allowing
ransomware operators. As such, detecting this activity immediately triggered a swift reaction from the experienced organizations to respond proactively to credible external
analysts. intelligence before the threats escalate. Since these alerts
08 CISO RECOMMENDATIONS come from trusted entities and usually undergo professional
In this case, it was discovered that the remote-control tools were distributed via Group Policy Object (GPO). Upon analysis before issuance, they are highly reliable. This prompts
examining domain controller (DC), an encryptor binary was found in a public folder, ready to be deployed to all devices organizations to act swiftly and initiate incident investigations.
within the domain. Organizations should not rely exclusively on external entities
and should regularly conduct proactive monitoring of the Dark
Thanks to the analysts' quick response, the threat was mitigated before the encryptor could be distributed, thus preventing Web to facilitate early breach detection.
a potentially severe ransomware attack.
01 INTRODUCTION
RESPONDING TO A Suspicious MFA request
Encrypted files
27%
By proactively searching for hidden indicators of compromise,
organizations can detect and mitigate threats that evade
11%
In 2024, 11% of the ransomware attacks investigated The CPIRT 2024 findings show encouraging progress in
specifically targeted VMware ESXi servers, which are early threat detection and proactive security measures
virtualized environments central to many enterprise among organizations. Security alerts have overtaken service
infrastructures. By focusing on ESXi servers, attackers disruptions as the primary trigger for incident response,
01 INTRODUCTION can render multiple critical servers inaccessible by and there is greater engagement in proactive threat hunting
compromising a single device. This strategy allows them OF THE RANSOMWARE ATTACKS INVESTIGATED and user awareness. These insights emphasize the need for
to cause substantial disruption without infecting the SPECIFICALLY TARGETED VMWARE ESXI SERVERS, WHICH continued vigilance, refinement of detection capabilities, and
02 2024 CYBER SECURITY EVENTS entire network or server base with encryption malware. collaboration with external intelligence sources to strengthen
Ransomware groups targeting VMware ESXi servers include
ARE VIRTUALIZED ENVIRONMENTS CENTRAL TO MANY cyber security resilience.
the Akira ransomware group which has been exploiting two ENTERPRISE INFRASTRUCTURES.
03 CYBER SECURITY TRENDS remote code execution (RCE) vulnerabilities in ESXi: CVE-
2023-20867 and CVE-2024-37085.
Cyber Wars - 2024 Edition
The Ransomware Ecosystem
The Rise of Infostealers
Cloud Complexities
Edge Devices and ORBs
04 GLOBAL ANALYSIS In 2024, the experiences and data collected by Check Point's Incident
Response Team demonstrate that organizations that prioritize security alerts
05 HIGH PROFILE VULNERABILITIES and harness insights from the data are better equipped to thwart threats
before they escalate, ultimately safeguarding their critical assets.
06 INCIDENT RESPONSE PERSPECTIVE
08 CISO RECOMMENDATIONS
TIM OTIS
Head of Incident Response
& Managed Detection and Response
7
PREDICTIONS:
THE FUTURE OF
CYBER SECURITY
THE STATE OF CYBER SECURITY 2025
Cloud Platforms Become the Backbone of Rising Supply-Chain Attacks on Open-Source The Growing Cyber Security Talent Gap
Cyber Security Projects
The global shortage of cyber security professionals poses a
Cloud-based platforms are increasingly serving as the As open-source projects gain popularity, they increasingly significant challenge for organizations trying to defend against
foundation for cyber security, with AI-driven integration become attractive targets for malicious actors aiming to the rising complexity and volume of cyber threats. While
proving more effective than standalone tools. By bringing covertly exploit vulnerabilities in widely used software. organizations invest in versatile security products, the need
01 INTRODUCTION together various security operations, these platforms Following the sophisticated multi-year operation that insert a for more skilled experts to effectively manage and integrate
reduce complexity, allowing organizations to tackle threats backdoor into Linux XZ Utils, we can expect new similar attack these tools results in a fragmented and inefficient security
and vulnerabilities in the cloud with greater efficiency and attempts and the discovery of previously implanted backdoors. approach. Dependence on numerous vendors and insufficient
02 2024 CYBER SECURITY EVENTS effectiveness. Solutions like CNAPP, ASPM, and DSPM merge This escalating threat highlights the urgent need for enhanced in-house knowledge expose organizations to attacks as their
to create all-encompassing security posture management security measures and icnreased vigilance within the open- security measures become increasingly difficult to manage
(SPM) suites. source community. and less effective. Companies will have to streamline security
03 CYBER SECURITY TRENDS operations and prioritize the upskilling of staff to maintain
As new tools such as Application and Data SPM emerge, resilience.
Decentralization of Cyber Crime Ecosystems
Cyber Wars - 2024 Edition they will likely be integrated into a broader Cloud Native
Application Protection Platform (CNAPP), potentially leading
Recent successes by law enforcement in combating major
The Ransomware Ecosystem to the development of what could be called Extended Security
ransomware operations and botnets have prompted malicious
Posture Management (XSPM). Integrating Attack Surface
actors to transition towards smaller, more decentralized
Management within this new category illustrates how these
The Rise of Infostealers platforms can offer more value than a simple collection of
networks, methodologies, and operations. Large ransomware
projects have restructured into smaller groups, while
point solutions, fundamentally changing how organizations
Cloud Complexities infostealer-driven ecosystems have emerged as the primary
address vulnerabilities.
means of facilitating initial access. This decentralization
Edge Devices and ORBs necessitates that defenders adapt their strategies, highlighting
Rising Risks of AI Misuse and Data Breaches the importance of enhanced collaboration and intelligence
sharing.
As AI technologies integrate into personal and workplace
04 GLOBAL ANALYSIS environments, concerns about their misuse are growing. This Increased Regulatory Demands and Stricter
year, the potential for data breaches caused by employees
inadvertently sharing sensitive information with AI platforms Cyber Insurance Standards
05 HIGH PROFILE VULNERABILITIES like ChatGPT or Google's Gemini is a significant risk.
Employees might input confidential information, such as Organizations will face increasing pressure due to new cyber
financials, to generate reports or analyses, often without security regulations, including the EU IoT Regulations, SEC
06 INCIDENT RESPONSE PERSPECTIVE realizing that unauthorized individuals could store and access Cyber security Disclosure Rules, the Digital Operational
this data. Establishing stricter controls on AI tools within an Resilience Act (DORA), and the NIS2 Directive. Compliance
organization’s systems will be crucial for striking a balance with these frameworks will demand a significant investment of
07 2025 INDUSTRY PREDICTIONS between enhancing productivity while ensuring data privacy time and resources for initiatives such as policy development
protections. and new security technologies.
U.S. HEADQUARTERS
UNDER ATTACK?
www.checkpoint.com
© 2025 Check Point Software Technologies Ltd. All rights reserved.