0% found this document useful (0 votes)
235 views57 pages

2025 Cyber Security Report - Final

The 13th annual edition of Check Point's State of Cyber Security report outlines significant threats and trends for 2025, including a rise in infostealer attacks and ransomware tactics shifting towards data exfiltration. The report emphasizes the impact of AI and cloud advancements on cybercrime, and provides insights and recommendations for Chief Information Security Officers (CISOs). It also highlights various high-profile cyber incidents and vulnerabilities that occurred in 2024, underscoring the importance of proactive security measures.

Uploaded by

mukeba2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
235 views57 pages

2025 Cyber Security Report - Final

The 13th annual edition of Check Point's State of Cyber Security report outlines significant threats and trends for 2025, including a rise in infostealer attacks and ransomware tactics shifting towards data exfiltration. The report emphasizes the impact of AI and cloud advancements on cybercrime, and provides insights and recommendations for Chief Information Security Officers (CISOs). It also highlights various high-profile cyber incidents and vulnerabilities that occurred in 2024, underscoring the importance of proactive security measures.

Uploaded by

mukeba2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

13 th

Annual
Edition

THE STATE OF
CYBER SECURITY 2025
Top threats, emerging trends, and CISO recommendations
TABLE OF CONTENTS
01
INTRODUCTION
02
2024 CYBER
03
CYBER SECURITY
04
GLOBAL ANALYSIS
SECURITY EVENTS TRENDS

05
HIGH PROFILE GLOBAL
06
INCIDENT RESPONSE
07
2025 INDUSTRY
08
CISO
VULNERABILITIES PERSPECTIVE PREDICTIONS RECOMMENDATIONS
0
1 INTRODUCTION
THE STATE OF CYBER SECURITY 2025
INTRODUCTION
01 INTRODUCTION
I’m happy to introduce the 13th annual edition of Check Point's State of Cyber Security. 2024’s advancements like AI and cloud
02 2024 CYBER SECURITY EVENTS infrastructure improved our daily lives but also benefited cyber criminals. This report highlights the real-world impact of these
changes, offering 2025 insights and recommendations from and for CISOs.

03 CYBER SECURITY TRENDS With over a decade of analysis, Check Point Research insights come from unparalleled data sources that no other company combines.
We gather attack telemetry from networks, cloud, email, endpoints, and mobile devices across enterprise and SMB customers. By
incorporating incident response, dark web, and open-source findings, we achieve visibility in over 170 countries to reveal global and
Cyber Wars - 2024 Edition regional trends.

The Ransomware Ecosystem


The 2025 State of Cyber Security report highlights key threats, including:
The Rise of Infostealers MAYA HOROWITZ
• The AI tactics that swayed a third of global elections through disinformation.
Cloud Complexities • A 58% surge in infostealer attacks, focusing on corporate access. VP Research
Edge Devices and ORBs • Ransomware attacks shift from encryption to data exfiltration extortion, with Healthcare now the second most targeted.

• Hybrid networks enabling lateral movement between on-premise and cloud.

04 GLOBAL ANALYSIS • Hardware and Software supply chains saw the highest attack surge attacks

05 HIGH PROFILE VULNERABILITIES I want to emphasize Check Point’s commitment to customer security. In 2024, edge devices were exploited to access enterprise
networks through leaked credentials and vulnerabilities. One of the many disclosed zero-day vulnerabilities was in a Check Point
product: the VPN Information Disclosure vulnerability (CVE-2024-24919). We promptly disclosed it, released a patch within a day,
06 INCIDENT RESPONSE PERSPECTIVE and proactively supported the few potentially affected customers with incident response and mitigation. Our dedication to protecting
customers is in our DNA.
07 2025 INDUSTRY PREDICTIONS While Check Point aims to protect our customers with our research, we hope this report serves the needs of the broader industry
as well, as we combine forces and share knowledge. On behalf of the Check Point family, I hope this report is useful to both security
08 CISO RECOMMENDATIONS practitioners as well as C-level executives.

Enjoy the read!

Maya Horowitz, VP Research

4 THE STATE OF CYBER SECURITY 2025


0
2
2024 CYBER
SECURITY
EVENTS
THE STATE OF CYBER SECURITY 2025
01 INTRODUCTION

02 2024 CYBER SECURITY EVENTS

03 CYBER SECURITY TRENDS

Cyber Wars - 2024 Edition


THE CYBER SECURITY EVENTS THAT DEFINED 2024

JAN
After disclosing two zero-day vulnerabilities, Ivanti's Connect
Secure VPNs faced mass exploitation. Thousands of VPN devices
were compromised, impacting victims like the U.S. Cyber
FEB
Exploiting a Fortinet vulnerability, Chinese state-backed
hackers targeted an unclassified military research network
in a cyber espionage operation against the Dutch Defense
MAR
Q1
The ALPHV ransomware gang attacked UnitedHealth Group’s
subsidiary, stealing six terabytes of data. U.S. military clinics
and hospitals worldwide were disrupted, necessitating manual
security and Infrastructure Security Agency (CISA). Ministry, marking the Netherlands’ first public attribution of a prescription processes.
cyber attack to China.
The Ransomware Ecosystem
Check Point Research uncovered an NFT scam targeting
holders of over 100 popular projects. Scammers send seemingly A high-severity vulnerability in Google Chrome’s V8 JavaScript Check Point Harmony Endpoint and Threat Emulation
The Rise of Infostealers legitimate airdrops that link to fraudulent websites. Victims are engine, CVE-2024-0517, was identified. The flaw could allow a protect against this threat (Ransomware.Wins.BlackCat.
tricked into connecting their wallets, granting attackers access to remote attacker to exploit heap corruption via a crafted HTML ta.*; Ransomware.Win.BlackCat)
Cloud Complexities their funds. page. Google has since patched the vulnerability.
Cutout.Pro, an AI-powered photo and video editing service,
Edge Devices and ORBs Microsoft reported an attack by the Russian group Midnight
Check Point Harmony IPS protects against this threat
experienced a data breach that exposed the personal data of 20
Blizzard (Nobelium), which used a password spray attack to million users, including email addresses, hashed passwords,
compromise corporate email accounts, including those of senior (Google Chrome Out of Bounds Write (CVE-2024-0517))
and IP addresses.
leadership, cyber security, and legal staff.
04 GLOBAL ANALYSIS Check Point Research discovered a critical Remote Code Chinese APT group Earth, Krahang, targeted 70 government
Execution (RCE) vulnerability in Microsoft Outlook, dubbed entities worldwide in a cyber espionage campaign, active since
Check Point Harmony Endpoint and Threat Emulation
#MonikerLink (CVE-2024-21413). #MonikerLink allows remote early 2022, utilizing vulnerabilities in internet-facing servers and
protect against this threat
05 HIGH PROFILE VULNERABILITIES (APT.Win.APT29; APT.Wins.Nobelium)
attackers to deploy a link that bypasses the Protected View
Protocol, potentially leading to credentials leakage and RCE
spear-phishing tactics.

capabilities. Microsoft has since patched the vulnerability.


Check Point Research tracked the financially motivated threat
06 INCIDENT RESPONSE PERSPECTIVE HealthEC LLC experienced a data breach that affected 4.5 million
individuals, compromising names, addresses, DOBs, SSNs,
actor Magnet Goblin, who exploited one-day vulnerabilities
in servers like Ivanti Connect Secure VPN, Magento, and Qlik
medical and billing information, and health insurance data. Check Point IPS blade protects against this threat Sense. The actor deployed a new Linux version of NerbianRAT
(Microsoft Outlook Malicious Moniker Link Remote Code
07 2025 INDUSTRY PREDICTIONS Execution (CVE-2024-21413)
and WARPWIRE JavaScript credential stealer while proving quick
adoption of exploits.

08 CISO RECOMMENDATIONS The US Department of Justice disrupted the KB botnet, used by


the China-affiliated APT Volt Typhoon to mask its identity while
Check Point IPS and Harmony Endpoint protect against this
threat (RAT_Linux_Nerbian_*)
targeting critical infrastructure in the US. The group exploited
vulnerable, end-of-life Cisco and NetGear SOHO devices for
initial access. In response, CISA and the FBI released guidance
for vendors on securing SOHO routers.

Check Point Threat Emulation protects against this threat


(APT.Wins.VoltTyphoon; InfoStealer.Wins.VoltTyphoon)

6 THE STATE OF CYBER SECURITY 2025


01 INTRODUCTION

02 2024 CYBER SECURITY EVENTS

03 CYBER SECURITY TRENDS

Cyber Wars - 2024 Edition


THE CYBER SECURITY EVENTS THAT DEFINED 2024

APR
Check Point researchers detected a typosquatting campaign
comprised of over 500 malicious packages deployed on PyPI
(Python Package Index), posing risks of PII theft malware
MAY
Check Point Research uncovered a cyber espionage campaign
targeting African and Caribbean governmental organizations.
Attributed to Chinese threat actor Sharp Dragon, the campaign
JUNE
Q2
Data from Ticketmaster and Santander Bank has been put up for
sale on a cyber crime forum by ShinyHunters, a notorious cyber
gang. The breach potentially exposes the personal information
installation. adopts Cobalt Strike Beacon as the payload, enabling backdoor of millions of customers. Reports indicate that the threat actor
functionalities like C2 communication and command execution gained access to Ticketmaster and Santander by using the stolen
The Ransomware Ecosystem while minimizing the exposure of their custom tools. This credentials of one employee from Snowflake, a large cloud
Check Point CloudGuard Code Security protects approach suggests a deeper understanding of their targets. storage company.
The Rise of Infostealers against this threat.
The Czech Republic, Germany, and NATO revealed an espionage Japanese crypto exchange DMM Bitcoin confirmed a data breach
Cloud Complexities Russian-speaking hacktivist group RGB-TEAM breached the
campaign targeting Czech institutions through a Microsoft that resulted in losing $308 million in BTC, one of the largest
Outlook vulnerability attributed to the Russian state-affiliated crypto heists.
website of Russia’s prosecutor general and leaked 100,000 group, APT28, which has been conducting a long-term espionage
Edge Devices and ORBs criminal records from 1993 to 2022 on Telegram. Data included effort across Europe.
details on crimes such as theft and drug trafficking. China-linked Water Sigbin 8220 Gang exploited vulnerabilities in
Oracle WebLogic (CVE-2017-3506 and CVE-2023-21839) to deploy
A Dell data breach affected 49 million customers after their cryptocurrency mining malware using PowerShell scripts with
An AT&T data breach exposed the personal information of
04 GLOBAL ANALYSIS approximately 51M former and current clients, potentially
database was listed on a hacking forum. The exposed data
includes full names, home addresses, and order details.
hexadecimal URL encoding and fileless execution techniques.
including full names, home addresses, email addresses,
phone numbers, social security numbers, AT&T account
Check Point IPS protects against this threat (Oracle
05 HIGH PROFILE VULNERABILITIES numbers, and AT&T passcodes. A data breach exposed 500 GB of biometric data from India,
affecting police, military personnel, and public workers WebLogic WLS Security Component Remote Code
during elections. The leak involved unsecured databases from Execution (CVE-2017-10271), Oracle WebLogic Server
Check Point Research reports a wave of scam attacks in ThoughtGreen Technologies and Timing Technologies, including Improper Access Control (CVE-2023-21839))
06 INCIDENT RESPONSE PERSPECTIVE which attackers use various methods, including malicious QR
codes and phishing emails, to gain US taxpayers’ credentials
fingerprints and facial scans. The information could be leveraged
to manipulate biometric systems in Indian elections.
to steal IRS refunds. Check Point Research analyzed Rafel RAT, an open-source

07 2025 INDUSTRY PREDICTIONS remote administration tool for espionage and ransomware
attacks on Android devices. The malware targeted high-profile
The US and UK announced a criminal indictment and
organizations, especially in the military sector, with victims
sanctions against APT31, a group of Chinese hackers, for
mainly from the U.S., China, and Indonesia. It enables data
08 CISO RECOMMENDATIONS their role in alleged attacks against US and UK governmental
officials. Check Point Research explored the group’s use of
exfiltration, surveillance, and complete device control, resulting
in severe privacy and security breaches.
zero-day vulnerabilities.

Check Point’s Harmony Mobile protects


against this threat.

7 THE STATE OF CYBER SECURITY 2025


01 INTRODUCTION

02 2024 CYBER SECURITY EVENTS

03 CYBER SECURITY TRENDS

Cyber Wars - 2024 Edition


THE CYBER SECURITY EVENTS THAT DEFINED 2024

JULY
Check Point Research identified the Stargazers Ghost Network,
consisting of 3,000 GitHub repositories that distribute malware
and malicious links through phishing schemes using a
AUG
Check Point Research found that over 20K Ubiquiti cameras
and routers are vulnerable (CVE-2017-0938) to amplification
attacks and privacy risks due to exposed UDP ports 10001
SEPT
Q3
93GB of sensitive data was stolen from Planned Parenthood’s
Montanna branch by the ransomware group RansomHub,
primarily affecting the organization’s administrative IT systems.
Distribution as a Service (DaaS) model. The network has shared and 7004. These ports permit unauthorized access to device
various types of malware, such as Atlantida Stealer and RedLine, information, which could be exploited for technical and social
The Ransomware Ecosystem and has generated significant profits. engineering attacks. Check Point Threat Emulation and Harmony Endpoint
protect against this threat (Ransomware.Win.RansomHub;
The Rise of Infostealers Check Point Research noted a rise in Server-Side Template Ransomware.Wins.RansomHub.ta.*)
Check Point Harmony Endpoint and Threat Emulation Injection (SSTI) vulnerabilities that allow attackers to execute
protect against this threat (InfoStealer.Win.Atlantida.*,
Cloud Complexities Trojan.WIN32.AtlantidaStealer*, InfoStealer.Wins.
commands and access sensitive data. Notable cases involve
Check Point Research identified an Iranian cyber campaign
Atlassian Confluence and CrushFTP. These vulnerabilities pose
Lumma.ta*, InfoStealer.Win.Lumma*, Injector.Win. significant risks, such as data theft and reputation damage, targeting Iraqi governmental networks using malware Veaty and
Edge Devices and ORBs RunPE.C, Loader.Wins.GoBitLoader.A, Trojan.Wins. reflected in a rise in critical CVEs Spearal. Techniques include a passive IIS backdoor, DNS tunneling,
Imphash.taim.LV, InfoStealer.Wins.Redline.ta.BY) and C2 communication via compromised emails, indicative of ties to
the APT34 group. The campaign likely utilizes social engineering for
initial infection and has a sophisticated C2 infrastructure.
Check Point IPS protects against this threat (Python
04 GLOBAL ANALYSIS RockYou2024, a leak of nearly 10 billion plaintext passwords from
multiple data breaches, poses significant risks for credential
Server-Side Template Injection, Java Server-Side
Template Injection, PHP Server-Side Template Injection,
stuffing and brute-force attacks that could affect various online Check Point Threat Emulation and Harmony Endpoint
Ruby Server-Side Template Injection, Node.js Server-
accounts and services. protect against this threat (APT.Wins.Oilrig.ta.B/C/D/E,
05 HIGH PROFILE VULNERABILITIES Side Template Injection, Expression Language Server-
Side Template Injection) APT.Win.OilRig.F, APT.Win.OilRig.WA.G, APT.Win.OilRig.H)
45M records from Rite Aid were stolen in a ransomware attack,
allegedly including clients’ identifying information and Rite Aid
06 INCIDENT RESPONSE PERSPECTIVE rewards numbers. RansomHub ransomware group claimed Following the July Venezuelan presidential elections, Check Point The FBI, CISA, and NSA report that Russian GRU Unit 29155
responsibility and threatened to leak the stolen data. Research revealed that hacktivist groups Anonymous Venezuela has targeted Ukraine with website defacements, data theft, and
and Cyber Hunters launched DDoS attacks and hacking attempts WhisperGate malware, disrupting aid efforts. They also targeted
07 2025 INDUSTRY PREDICTIONS against the government, driven by allegations of election fraud sectors globally, including government, finance, transportation,
energy, and healthcare.
Check Point Threat Emulation and Harmony Endpoint linked to Nicolás Maduro's administration.
protect against this threat (Ransomware.Win.RansomHub;
08 CISO RECOMMENDATIONS Ransomware.Wins.RansomHub.ta.*)
Harmony Endpoint and Threat Emulation protect against Check Point Threat Emulation and Harmony Endpoint
this threat (InfoStealer.Wins.PhemedroneStealer.*) protect against this threat (Trojan.Win.WhisperGate; Trojan.
Location safety app Life360 and project management tool Trello Wins.WhisperGate.ta.*; Trojan.Wins.WhisperGate)
suffered data breaches due to API vulnerabilities. Personal
information of Life360’s 442,519 customers was exposed, while
21.1GB of Trello’s data was leaked. Threat actor 'emo' claimed A vulnerability in the ChatGPT macOS app allowed attackers to
responsibility and shared the stolen data on the dark web. implant persistent spyware, SpAIware, into the app’s memory
through indirect prompt injection, enabling continuous data
exfiltration of user inputs and future chat sessions. OpenAI has
since resolved the issue.

8 THE STATE OF CYBER SECURITY 2025


01 INTRODUCTION

02 2024 CYBER SECURITY EVENTS

03 CYBER SECURITY TRENDS

Cyber Wars - 2024 Edition


THE CYBER SECURITY EVENTS THAT DEFINED 2024

OCT
Check Point Research analyzed ‘Operation MiddleFloor,' a
disinformation campaign targeting Moldova's government
and education sectors before the October 2024 elections. The
NOV
The FBI, the US Department of Treasury, and the Israeli
National Cyber security Directorate (INCD) released a joint
Cyber security Advisory attributing a large-scale phishing
DEC
Q4
Check Point Research uncovered a novel exploit of Godot
Engine—a gaming development platform—to execute malicious
GDScript code. The technique enables attackers to deliver
Russian-aligned group Lying Pigeon uses spoofed emails campaign impersonating the INCD and targeting Israeli malware across platforms like Windows, macOS, Linux, Android,
to spread false information about EU membership while organizations to the Iranian cyber group Emennet Pasargad. and iOS, while evading detection by most antivirus solutions.
The Ransomware Ecosystem collecting data for potential malware attacks. Check Point Research analyzed the malware, tracking its Malicious loader, “GodLoader”, used this technique and already
evolution and learning. infected over 17,000 machines.
The Rise of Infostealers A new phishing-as-a-service platform called Mamba 2FA
targets adversary-in-the-middle phishing attacks. It mimics
Check Point Threat Emulation and Harmony Endpoint Check Point Harmony Endpoint and Threat Emulation
Cloud Complexities Microsoft 365 login pages and bypasses multi-factor
protect against this threat (Behavioral.Win.FakeChrome.B provide protection against this threat (Technique.win.
authentication, stealing credentials and cookies sent to
attackers via a Telegram bot. and Trojan.Wins.FakeUpdater.A) GDscript.*, Dropper.Win.Godot.*)
Edge Devices and ORBs
The FBI and CISA investigate breaches by the Chinese Check Point Research monitored a large-scale phishing Check Point Research analyzed Akira ransomware’s latest
government-affiliated group Salt Typhoon at U.S. campaign dubbed CopyRh(ight)adamantys, which uses the latest variant, written in Rust, that primarily targeted ESXi bare metal
04 GLOBAL ANALYSIS telecommunications companies, including AT&T, Verizon,
and Lumen Technologies. The attacks targeted wiretapping
version of the Rhadamanthys stealer (0.7). This campaign targets
regions like the U.S., Europe, East Asia, and South America,
hypervisor servers in early 2024. The report showed how Rust
idioms, boilerplate code, and compiler strategies were used to
systems and devices of President-elect Trump, former Vice using a copyright theme and impersonating various companies, create complex assembly.
President Harris, and other notable politicians. tailoring each email from different Gmail accounts.
05 HIGH PROFILE VULNERABILITIES
Check Point Harmony Endpoint and Threat Emulation
Check Point Threat Emulation and Harmony Endpoint provide protection against this threat (Ransomware_Linux_
06 INCIDENT RESPONSE PERSPECTIVE protect against this threat (InfoStealer.Wins. Akira_C/D, Ransomware.Wins.Akira.G/H)
Rhadamanthys.ta.V, InfoStealer.Wins.Rhadamanthys.*, and
InfoStealer.Wins.Rhadamanthys.*)
07 2025 INDUSTRY PREDICTIONS Ukrainian intelligence agency HUR confirmed a DDoS against
Russia’s Gazprombank, one of Russia’s largest banks, which
Check Point Research tracked the WIRTE threat actor, linked to aimed to disrupt financial operations related to Russia’s war
Hamas-affiliated Gaza Cybergang, conducting espionage against efforts in Ukraine.
08 CISO RECOMMENDATIONS entities in the Palestinian Authority, Jordan, Iraq, Egypt, and
Saudi Arabia, and has expanded to disruptive attacks connected
to SameCoin malware targeting Israeli entities in 2024.

Check Point Threat Emulation and Harmony Endpoint


protect against this threat (APT.Wins.Wirte.ta.A/B/C/D/E/F,
ransom.win.honey, and infoastealer.win.blackguard.d)

9 THE STATE OF CYBER SECURITY 2025


0
3
CYBER
SECURITY
TRENDS
THE STATE OF CYBER SECURITY 2025
DISINFORMATION AND INFLUENCE
OPERATIONS
In 2024, disinformation campaigns reached new levels of
01 INTRODUCTION complexity, driven by the integration of AI and large language
models (LLMs). These operations focused on global events,
with nation-states like China, Russia, and Iran accused of using
02 2024 CYBER SECURITY EVENTS advanced tactics to manipulate public opinion, undermine trust,
and interfere with elections to destabilize democratic processes.

03 CYBER SECURITY TRENDS Based on Check Point Research’s findings, AI was utilized in
at least one third of the elections that took place worldwide
between September 2023 and February 2024, either by
Cyber Wars- 2024 Edition candidates themselves or potentially by foreign actors. Recent
instances demonstrate this development, such as the Russian-
The Ransomware Ecosystem linked APT group CopyCop targeting the June 2024 USA primary
elections with fabricated news segments featuring deepfake
The Rise of Infostealers portrayals of political figures. Distributed through X (formerly
known as Twitter) and Facebook, this content exploited platform
Cloud Complexities algorithms to target specific voter demographics. AI-generated
bots further disseminated divisive narratives, posing as genuine
Edge Devices and ORBs opinion pieces to polarize the electorate.

CYBER WARS 2024 EDITION


Iranian campaigns, often linked to the Islamic Revolutionary
Guard Corps (IRGC), also targeted the US presidential
04 GLOBAL ANALYSIS elections by attacking prominent political figures in "hack-
and-leak" operations. Journalists, activists, and lobbyists were
The global community has long speculated that devastating wars would also targeted through social engineering, impersonations,
05 HIGH PROFILE VULNERABILITIES be fought in cyberspace, with nation-states deploying digital doomsday phishing, and credential-harvesting malware. These
operations demonstrated Iran’s ability to blend disinformation
weapons capable of crippling critical infrastructure in one decisive strike.
with cyber infiltration to sway public perception.
06 INCIDENT RESPONSE PERSPECTIVE However, despite the unprecedented escalation in cyber activities, no such
apocalyptic event has occurred. Whether due to limited capabilities, fear of Meanwhile, Chinese-aligned actors used AI-generated deepfake
mutual destruction, or reluctance to trigger irreversible chaos, the nature videos portraying false endorsements and misleading public
07 2025 INDUSTRY PREDICTIONS service announcements. These videos, widely circulated on
of cyber warfare has taken a different path.
platforms like X and TikTok, aimed to discredit candidates and
08 CISO RECOMMENDATIONS Nation-states have shifted their focus to conflicts that undermine public deepen partisan divides. Additionally, viral posts embedded
with skewed polling questions seemingly portrayed support for
trust, exploit societal fractures, and destabilize institutions from within. certain candidates or fabricated evidence of fraud, undermining
Campaigns involve manipulating information across social media, "hacktivist" trust in the electoral process.
groups take credit for state-backed cyber attacks, and the threat of covert
access to compromised networks and poorly secured devices is constant. Beyond the high-profile presidential elections in the US,
Taiwan’s and Romania’s presidential elections and Moldova’s
EU referendum became prime targets for cyber-enabled
disinformation warfare. Chinese-attributed campaigns
used AI-generated articles and social media posts to mimic
legitimate news sources, discredit candidates, and sway

11 THE STATE OF CYBER SECURITY 2025


public opinion. Deepfake videos portraying candidates making with or supports propaganda from specific states has already
controversial statements circulated widely, while misleading taken root, deepening societal divides. STEALTHY STAGE PUBLIC STAGE
polling questions suggested declining support for specific
candidates. In Romania, Russian interference leveraged fake Democracies have responded by tightening regulations and
social media accounts and manipulated content to promote far- recognizing disinformation as a threat to critical infrastructure.
DATA DATA
right candidate Călin Georgescu. After Georgescu unexpectedly The U.S. Department of Homeland Security highlighted election EXFILTRATION LEAK

01 INTRODUCTION won the first round, declassified intelligence revealed the extent
of foreign interference, prompting an unprecedented annulment
meddling as a threat, while Canada expanded the CSIS Act for
better intelligence sharing. The European Union imposed strict INITIAL HACKTIVISTS
ACCESS ENTITIES
of the election results and scheduling a new vote. In Moldova, rules on platforms like Meta to curb Russian disinformation.
02 2024 CYBER SECURITY EVENTS a campaign called "Operation MiddleFloor", attributed to a OpenAI and Microsoft are disturbing accounts associated with
Russian-aligned group, targeted government and education groups from China, Iran, Russia, and North Korea. DESTRUCTIVE
ACTIVITY
sectors using spoofed emails and documents to spread anti-EU
03 CYBER SECURITY TRENDS
DESTRUCTIVE AND DISRUPTIVE MALWARE
narratives and undermine trust in pro-European leadership.
Figure 1 – Iran’s typical warfare campaign tactics.
The Paris Olympics became another key focus for disinformation.
Cyber Wars- 2024 Edition Russian-linked Storm-1679 spread false narratives about Nation-states increasingly relied on destructive malware
corruption, biased officiating, and threats of violence. Automated as an important weapon in cyber warfare. These "loud" Similarly, the Hamas-linked group WIRTE showcased its
The Ransomware Ecosystem accounts and bots amplified these claims to discredit the event operations, characterized by wiper malware and other evolving cyber capabilities by using the SameCoin wiper variant
and disrupt Western unity. More aggressively, the Iranian group disruptive tools, targeted critical infrastructure, disrupting to target hospitals and municipalities in Israel, exacerbating the
The Rise of Infostealers Emennet Pasargad exploited vulnerabilities in the Olympics’ essential services and spreading chaos. psychological and logistical toll of the ongoing conflict.
display system provider to disrupt broadcasts and spread anti-
Cloud Complexities Israel propaganda and sent threats to Israeli athletes from a fake Amidst the heightened tensions in the Middle East, Iran and In Eastern Europe, Russian-linked groups continued to
persona imitating the French group GUD. other regional threat groups demonstrated the destructive weaponize destructive malware as part of its broader hybrid
potential of wiper malware. Void Manticore, an Iranian group warfare strategy in Ukraine. The notorious Russian-affiliated
Edge Devices and ORBs These attacks on democracies and Western political alliances linked to the Ministry of Intelligence and Security (MOIS), APT44 (also known as Sandworm) introduced AcidPour, an
such as NATO have become increasingly effective and dangerous deployed the No-Justice Wiper under the guise of hacktivist advanced wiper variant of the AcidRain malware. AcidPour was
as democratic countries face ever-growing challenges. personas like Karma and Homeland Justice. These campaigns deployed to disrupt Ukrainian critical infrastructure, telecom
04 GLOBAL ANALYSIS Online cultural wars, social media-fueled populism, and targeted critical Israeli infrastructure and private organizations, networks, and internet service providers. This malware was
politicized media platforms using advanced algorithms to tailor erasing data and disrupting services. designed not only to destroy systems but also to embed itself
favorable content created fertile ground for foreign actors to deeper into environments, exfiltrating sensitive military plans
05 HIGH PROFILE VULNERABILITIES undermine public trust. The dissemination of content that aligns and severing vital communication channels. These operations
underscored Russia’s intent to leverage cyber tools as a vital
support mechanism in its geopolitical conflicts.
06 INCIDENT RESPONSE PERSPECTIVE

07 2025 INDUSTRY PREDICTIONS


DISRUPTION PREPARATION –
POSSIBLE “RED BUTTONS”
08 CISO RECOMMENDATIONS While some nations embraced these high-impact, one-time
attacks, others, like China, took a quieter approach. They
penetrated deep within critical systems, laying the groundwork
for potential large-scale disruption in the future. Chinese-
affiliated actors now focus on infiltrating critical infrastructure
and maintaining a persistent, undetected presence. Exploiting
vulnerabilities in edge devices such as routers, VPN appliances,
and IoT systems, groups like APT41 and Bronze Butler gained
unauthorized access to less secure network components,
allowing them to collect intelligence and establish a potential

12 THE STATE OF CYBER SECURITY 2025


"red button" capability—access that could be used for Handala Hack conducted defacement campaigns, hack and
future large-scale disruptions. This strategic positioning, leak operations, and disruptions and claimed responsibility
particularly evident in US targets, enables Chinese actors for breaching Israeli networks and exfiltrating terabytes
to silently prepare for potential conflicts while avoiding the of sensitive data. Karma, associated with Iran’s Ministry
immediate visibility and retaliation that come with destructive of Intelligence and Security (MOIS), deployed destructive
operations. tools like the BiBi and No Justice wipers against Israeli
01 INTRODUCTION Chinese APT group Volt Typhoon exemplified this approach
organizations. The Cyber Avengers, linked to the Islamic
Revolutionary Guard Corps (IRGC), targeted critical
by intensifying its focus on exploiting firewalls and routers infrastructure, including power grids and water systems
02 2024 CYBER SECURITY EVENTS in US critical infrastructure. Using living-off-the-land (LOTL) in Israel, the US, and Ireland. The Iranian group Homeland
techniques, Volt Typhoon relied on legitimate administrative Justice also attacked Albanian governmental institutions
tools within compromised environments to evade detection. in retaliation for hosting the opposition group Mujahedin-
03 CYBER SECURITY TRENDS This allowed the group to bypass conventional cyber security e-Khalq (MEK). These activities highlight Iran’s adept use
measures and maintain a covert presence, positioning itself of proxy groups to merge hacktivism with state-directed
for future actions. cyber warfare, advancing its geopolitical interests while
Cyber Wars- 2024 Edition maintaining plausible deniability.
Adding another layer to this covert strategy, Salt Typhoon
The Ransomware Ecosystem targeted major internet service providers (ISPs), including Similarly, Russian actors also exemplified this tactic, with
AT&T and Verizon, exploiting vulnerabilities to intercept and groups like KillNet, NoName057(16), and the Cyber Army of
The Rise of Infostealers manipulate network traffic. Additionally, Chinese-linked Russia targeting critical infrastructure in countries aligned
actors used Operational Relay Boxes (ORBs), which are against Russia. These groups carried out mostly Distributed
Cloud Complexities networks of compromised VPS and IoT devices, to maintain Denial of Service (DDoS) attacks and other manipulations,
persistence, relay commands, and gather intelligence. Often disrupting government and private sector operations in
managed by contractors within China, ORBs enabled these Ukraine and pro-Ukrainian countries. Figure 2 – telegram post about the creation of the "Holy League".
Edge Devices and ORBs attackers to remain embedded in compromised systems,
discreetly relaying commands and gathering intelligence. Beyond their individual efforts, Russian-aligned hacktivists
expanded their influence by forming alliances with foreign In 2024, hacktivist activity underscored the evolving dynamics
04 GLOBAL ANALYSIS actors. A notable example is the High Society hacktivist
“HACKTIVIST” GROUPS
of alliances and influence in cyberspace, reflecting geopolitical
collective, which incorporates over 20 Russian-affiliated tensions between the East and West. Groups such as the Holy
cyber gangs, including Russian-linked groups like People’s League symbolized shared strategic goals among Russian and
05 HIGH PROFILE VULNERABILITIES Last year, the blurred boundaries of state-backed cyber Cyber Army, NoName057(16) and UserSec. High Society Iranian-affiliated actors. These alliances often mirrored real-
warfare became increasingly evident as nation-states relied joined the 7 October Union, a pro-Palestinian hacktivist world political developments: for example, after South Korea
on a sprawling network of online personas to serve their collective of over 40 groups, many of which are linked to sent observers to Ukraine during North Korea's involvement
06 INCIDENT RESPONSE PERSPECTIVE geopolitical agendas. Many of these figures, presenting Iran. This alliance, named Holy League, targeted NATO, with Russian forces, Russian-linked groups NoName057(16)
themselves as ideologically motivated independent Europe, Ukraine, and Israel, with notable campaigns like and Z Pentest launched retaliatory DDoS attacks and industrial
hacktivists, were fronts for state-sponsored APT groups. By the coordinated DDoS and propaganda efforts targeting hacks on South Korean entities. By emphasizing their united
07 2025 INDUSTRY PREDICTIONS amplifying divisive narratives and targeting public trust, NATO’s 75th Anniversary Summit in Washington. The fronts through recurring declarations of collaboration, these
the hacktivist groups became critical components of more campaign sought to undermine public support for NATO’s groups sought to sustain attention, bolster their psychological
extensive influence operations, allowing their sponsors backing of Ukraine, blending cyberattacks with psychological impact, and amplify global influence in the increasingly complex
08 CISO RECOMMENDATIONS to obscure their direct involvement while leveraging manipulation to influence public opinion. landscape of modern cyber conflict.
patriotic rhetoric to amplify their impact. Amid a backdrop
of declining public interest and increasing fatigue, a notable
trend emerged in 2024: the formation of alliances, where
disparate groups united under shared banners to create a
stronger, more cohesive front.

On the individual front, Iranian-backed hacktivist groups


also intensified their activities, primarily focusing on Israeli
and Albanian targets. Groups such as Malek Team and

13 THE STATE OF CYBER SECURITY 2025


NORTH KOREA’S CYBER DRIVEN Even the employment landscape became a battlefield. In
2024, Western companies unwittingly welcomed North Korean
blurring the boundaries between state and civilian spheres.

Influence operations emerged as a key front, with AI-powered


FINANCIAL WARFARE
operatives posing as remote IT freelancers. By infiltrating
corporate environments under false identities, these operatives disinformation campaigns targeting elections, societal
achieved a dual purpose: generating hard currency for the cohesion, and geopolitical stability. Simultaneously, destructive
Where other nations deploy hacktivists to disrupt and regime and gaining potential access to sensitive organizational malware, hacktivist fronts, and financial cyber crime served as
destabilize, North Korea’s cyber efforts transcend the
01 INTRODUCTION pretense of activism. Instead, Pyongyang engineered a vast
networks. tools for coercion, destabilization, and self-sustenance in the
case of heavily sanctioned regimes like North Korea.
and interconnected apparatus of cyber operations that meld
02 2024 CYBER SECURITY EVENTS financial crime with espionage to help sustain its embattled
regime under the weight of international sanctions.
FROM PREDICTED CATASTROPHIC While democracies attempt to adapt by tightening regulations
and investing in cyber defenses, the battleground has already

03 CYBER SECURITY TRENDS North Korea’s "financial warfare" is a delicate balancing act: STRIKES TO CONTINUOUS BATTLES shifted beneath their feet. Cyber warfare is no longer confined
to digital infrastructure but has permeated the social fabric.
ransomware and cryptocurrency theft fund the regime's nuclear Battles over information and perception threaten to outlast the
In a broader view of this year, cyber warfare has fragmented
ambitions, missile programs, and other weapons development, physical systems they were once expected to target.
into smaller, continuous battles across multiple domains
Cyber Wars- 2024 Edition while espionage campaigns gather intelligence to enhance
instead of catastrophic strikes aimed at crippling nations at a
military and technological capabilities.
single blow. These conflicts rarely have clear winners or losers
The Ransomware Ecosystem but mostly succeed in eroding trust, weakening institutions, and
Lazarus Group, the prime example of North Korea’s cyber criminal
The Rise of Infostealers machine, spearheaded operations in 2024 with characteristic
sophistication. One operation disguised as a tank-themed
cryptocurrency game exploited a zero-day vulnerability in Google
Cloud Complexities Chrome to deploy the Manuscrypt backdoor. The goal wasn’t just
to steal cryptocurrency but also to add an element of espionage. A
Edge Devices and ORBs stolen wallet today might fund a stolen military blueprint tomorrow.

Subgroups like BlueNoroff further refined this approach. Their


"Hidden Risk" campaign lured cryptocurrency traders with
04 GLOBAL ANALYSIS convincing phishing emails and fake news websites designed
Today’s cyber warfare has evolved from immediate destruction to
to manipulate transactions and siphon funds into the regime's encompassing campaigns that lay the foundations for eroding systems—
05 HIGH PROFILE VULNERABILITIES coffers. It also demonstrated how disinformation deployment
strategies can be leveraged into cyber crime.
whether social or physical. Now, nation-states wield cyber ‘weapons’
like AI-generated deepfakes and social media manipulation that weaken
06 INCIDENT RESPONSE PERSPECTIVE Andariel, another of the regime’s APTs, blurred the line democratic processes over time while their covert operations secure access
between financial theft and destruction. It targeted US
healthcare organizations encrypting critical systems to extort
to critical infrastructure, setting the stage for future attacks.
07 2025 INDUSTRY PREDICTIONS cryptocurrency payment using cyber crime-oriented Play
ransomware. These operations weren’t just about immediate
financial gain but also served as a testing ground for tactics that
08 CISO RECOMMENDATIONS could disrupt vital sectors in a geopolitical crisis.

ELI SMADJA
Security Research
Group Manager

14 THE STATE OF CYBER SECURITY 2025


Despite this increase, the median ransom payment in 2024
remained at approximately $200,000, with most attacks unfolding
quietly with little public attention.

Aside from high-profile cases, the threat landscape fundamentally


changed this year. Sustained law enforcement pressure and
01 INTRODUCTION inter-criminal disputes brought about the downfall of LockBit, a
dominant player in the ransomware landscape for many years, and
its main rival, ALPHV. Their exits paved the way for the new threat
02 2024 CYBER SECURITY EVENTS group RansomHub to rise. Furthermore, the healthcare sector
which was once thought to be less targeted due to its role, became
a prime focus for cybercriminals. Finally, threat actors increasingly
03 CYBER SECURITY TRENDS shift from traditional encryption-based tactics to pure data
extortion, signaling a more streamlined and dangerous approach.

Cyber Wars - 2024 Edition


The Ransomware Ecosystem
LAW ENFORCEMENT OPERATIONS
The Rise of Infostealers
AND THEIR EFFECT ON THE
Cloud Complexities
RANSOMWARE ECOSYSTEM
While cyber security measures offer protection, they are
Edge Devices and ORBs insufficient to counter what has become businesses’ foremost
cyber threat —ransomware. Efforts to combat attacks are hindered
by a lack of international cooperation, as Russia, North Korea, and
Iran either tolerate or actively support such activities.
04 GLOBAL ANALYSIS

05 HIGH PROFILE VULNERABILITIES THE RANSOMWARE ECOSYSTEM IN 2024:


06 INCIDENT RESPONSE PERSPECTIVE
IMPACT FROM LAW ENFORCEMENT, HEALTHCARE TARGETING,
AND THE RISE OF DATA LEAK EXTORTION
07 2025 INDUSTRY PREDICTIONS Ransomware remained the most significant cyber threat to businesses worldwide in 2024, reaching new
heights in both scale and impact. The little-known ransomware group
Dark Angels reportedly secured a staggering $75 million payment from an unnamed Fortune 50 company,
08 CISO RECOMMENDATIONS while ALPHV extracted $22 million from Change Healthcare. In the Change Health care case, the
ransomware attack resulted in months of disrupted service and over 100 million patients’ medical records Figure 3 - Dark-web post, specifying recruitment conditions to the
were stolen. UnitedHealth, Change Healthcare’s parent company, reported a shocking $872 million impact Cicada3301! group prohibiting activity against Russian affiliated
in the first quarter of 2024. This included $593 million in direct response costs and $279 million in business entities (Commonwealth of Independent States -CIS).
disruption. In addition, the company allocated $800 million for future claim reserves.

Addressing this threat requires sustained and coordinated


international law enforcement efforts such as sharing intelligence,
coordinating legal frameworks, and jointly pursuing perpetrators

15 THE STATE OF CYBER SECURITY 2025


and taking down their infrastructure. Encouragingly, 2024 saw increased with the shift to data-based extortion. Despite LockBit’s
several effective examples of such operations. attempts to re-establish operations, ongoing law enforcement
pressure and the loss of credibility within the cybercriminal
In previous years, takedown operations successfully targeted community hinder their resurgence. However, in the last week of
major ransomware groups such as Hive, Ragnar, and others. In 2024, the group announced a new version, LockBit 4.0. Only time
February 2024, Operation Cronos, a coordinated international law will tell if this marks a resurgence for the criminal organization.
01 INTRODUCTION operation led by the UK’s National Crime Agency (NCA) and the
FBI, struck a significant blow to LockBit, the dominant group in ALPHV was another major RaaS actor to exit the scene. At the
the Ransomware-as-a-Service (RaaS) ecosystem. The operation end of 2023, they suffered from a law enforcement operation but
02 2024 CYBER SECURITY EVENTS seized LockBit's data leak sites (DLS) and dismantled critical briefly recovered and aggressively resumed operations against
infrastructure, significantly disrupting their operations. Authorities healthcare entities.
took control of 34 servers across multiple countries, including
03 CYBER SECURITY TRENDS the Netherlands, Germany, and the United States. The campaign In February 2024, an ALPHV affiliate attacked Change Healthcare.
continued through October and arrested key players in Poland The group withheld all $22 million from the affiliate, denying the
and Ukraine while French and US judicial authorities issued affiliate's share. The group then faked a seizure notice on their DLS
Cyber Wars - 2024 Edition indictments. Law enforcement agencies obtained and released and announced their retirement.
LockBit's decryption keys and internal data, exposing the group’s
The Ransomware Ecosystem operations and affiliate networks to further scrutiny. While the removal of these two dominant groups impacted the
ransomware landscape in the short and long term, it did little
The Rise of Infostealers to curb the ecosystem’s volume of attacks. In fact, the number
of published victims rose steadily. This resilience highlights the
nature of RaaS operations: independent affiliates remain largely
Cloud Complexities
unaffected by the downfall of a single brand or operator and
simply migrate to other platforms. Free of prior allegiances, these
Edge Devices and ORBs affiliates find alternative RaaS groups that offer the necessary
infrastructure, leak sites, and support services, ensuring that
their pipeline of ransomware attacks remains intact.
04 GLOBAL ANALYSIS
Figure 4 - Screenshots from the LockBit shame-site undermining its
05 HIGH PROFILE VULNERABILITIES reputation (source: NCA). 700
603

06 INCIDENT RESPONSE PERSPECTIVE 600 544 541 534


The operation aimed not only to dismantle LockBit's technical 500 477
infrastructure but also to tarnish its image in cybercriminal
07 2025 INDUSTRY PREDICTIONS circles. LockBit's reputation was crucial to its operations, as 400
420
386
evidenced by its active engagement in criminal forums and media 380
407 387
interviews. The group's leader, known as LockBitSupp, frequently 347
08 CISO RECOMMENDATIONS interacted on these platforms, promoting their ransomware
300
293 304
services and maintaining a public persona. This visibility was 200
integral to recruiting affiliates and assuring victims of their
"professionalism" in handling ransom payments and data. 100

Following Operation Cronos, LockBit’s activity significantly 0


declined. Once their internal communications and affiliate Dec Jan Feb Mar Apr May June Jul Aug Sep Oct Nov Dec
23 24 24 24 24 24 24 24 24 24 24 24 24
identities were exposed, their trust was lost. LockBit attempted
to project a "business as usual" image by publishing fake lists of
Figure 5 - Total number of victims reported on ransomware data
recycled, or victims of other attackers, a phenomenon that has
leak sites.

16 THE STATE OF CYBER SECURITY 2025


In the immediate aftermath, no single entity could replicate
the market dominance previously held by LockBit and ALPHV.
While RansomHub seemed poised to assume a leading role,
its position was far from guaranteed. Instead, the landscape
entered a period of competitive fragmentation, with mid-sized RansomHub
actors, like Akira, Play, Medusa, Dan0n, Hunters, and Bianlian,
16%
01 INTRODUCTION scrambling to recruit affiliates and build momentum Akira

Other 6%
The fallout from ALPHV’s withholding an affiliate’s ransom share,
02 2024 CYBER SECURITY EVENTS combined with LockBit’s damaged reputation and the availability 42% KillSec3
of leaked ransomware code, fueled the rise of more autonomous
operators. An increasing number of smaller, independent groups
6%
03 CYBER SECURITY TRENDS emerged, unwilling to rely on established RaaS frameworks or
QiLin
share profits with centralized operators. By leveraging leaked
code, these actors customized their own ransomware strains and 5%
Cyber Wars - 2024 Edition infrastructures, reducing dependence on major RaaS providers SafePay
and fostering a more decentralized and competitive ecosystem.
The Ransomware Ecosystem
5%
Play
The Rise of Infostealers Inc Ransom Medusa 4%
Hunters
4% Lynx
4%
200 4% 4%
Cloud Complexities
180
Figure 7 - Data leak sites victims by actor, November 2024.
Edge Devices and ORBs 160

140

04 GLOBAL ANALYSIS
120

100
HEALTHCARE UNDER FIRE
80 The migration of ransomware groups to targeting healthcare
organizations underscores the gradual decline of previously
05 HIGH PROFILE VULNERABILITIES 60
established “ethical” guidelines. In the early months of the
40
COVID-19 pandemic, many RaaS operators publicly declared
hospitals and medical providers off-limits. However, over
06 INCIDENT RESPONSE PERSPECTIVE
20

0
time, these restrictions weakened. Some RaaS administrators
adopted a more nuanced approach. While they discouraged
outright service disruption, such as encrypting critical systems,
07 2025 INDUSTRY PREDICTIONS Nov
23
Dec
23
Jan
24
Feb Mar
24 24
Apr May June
24 24 24
Jul
24
Aug
24
Sep
24
Oct
24
Nov
24
they permitted the theft of sensitive medical data. Affiliates
LockBit victims RansomHub victims could then extort victims by threatening to leak patient
08 CISO RECOMMENDATIONS information and pressure healthcare entities to pay without
directly endangering patients.
Figure 6 - Data leak sites reported victims of LockBit vs. RansomHub.
in 2024 This approach deteriorated further after the law enforcement
operation against ALPHV. The group openly encouraged
affiliates to specifically target hospitals. By February 2024, the
As 2024 closed, RansomHub emerged as the new dominant healthcare and medical sectors became the most targeted
player, accounting for 16% of reported victims in November. sectors for ALPHV, making up approximately 30% of their
Over 40 other double-extortion ransomware groups remained reported victims.
active during the same period, each maintaining their own data
leak sites and targeting new victims.

17 THE STATE OF CYBER SECURITY 2025


slower medical services, delayed patient care, and significantly
reduced operational capacity. THE SHIFT TO EXTORTION OF DATA
In June, Synnovis, a crucial pathology services provider for major
London hospitals, was hit by the Qilin (Agenda) ransomware
EXFILTRATION (DXF)
group. The attack involved a $50 million ransom demand and The encryption phase of a ransomware attack presents
significant challenges for attackers. It is inherently “noisy”
01 INTRODUCTION the leak of approximately 400GB of sensitive data. The breach
led to the cancellation of over 6,000 medical appointments and which increases the risk of detection and interception.
procedures. The disruption also caused a shortage of blood Managing multiple victims adds to the complexity as
02 2024 CYBER SECURITY EVENTS donations in the UK’s National Health Service (NHS). it requires distributing unique decryption keys and
providing “customer support” for data recovery. Both tasks
Many healthcare victims are now targeted by ransomware are resource-intensive and operationally demanding.
03 CYBER SECURITY TRENDS attacks: 19% for Bianlian, 23% for INC Ransomware, and Ransomware groups rely heavily on their reputation for
10% for RansomHub, despite its policy of avoiding non-profit reliably restoring encrypted data to maintain victim trust
Figure 8 - ALPHV permitting affiliates to "block hospitals, nuclear organizations and hospitals (see the image below). This and secure payments. If decryption fails, it undermines
Cyber Wars - 2024 Edition power plants, anything, anywhere." (source). underscores the increasing focus on threat actors in this sector. this trust and reduces the likelihood of future ransom
payouts. Additionally, dependence on encryption increases
The Ransomware Ecosystem Notably, over 65% of healthcare-related victims are based in the affiliates’ reliance on RaaS platforms. This reliance can
The critical nature of healthcare operations means that prolonged the US, disproportionately high compared to their share in the reduce their profits while increasing their exposure to law
The Rise of Infostealers system downtime is unacceptable due to the risk it poses to broader ransomware ecosystem. The importance of healthcare enforcement agencies.
patients. As demonstrated by the Change Healthcare attack, this operations and their limited capacity to withstand extended
significantly increases the likelihood of ransom payments. disruptions make them particularly attractive targets. All Victims’ willingness to pay ransoms for encryption-based
Cloud Complexities
indications suggest that this troubling trend will persist into 2025. attacks has steadily decreased due to repeated instances
Healthcare and medical organizations now account for 10% of where payments failed to lead to data recovery, along with
Edge Devices and ORBs all publicly reported ransomware victims, making healthcare organizations becoming more proficient at maintaining up-to-
the second most targeted sector in 2024, trailing only the date backups. Data from Coveware, a US-based ransomware
manufacturing industry. response firm, highlights the trend: the percentage of
04 GLOBAL ANALYSIS While the high-profile Change Healthcare attack captured global
encryption-based cases resolved through ransom payments
declined from 75% in 2019 to 32% by Q3 2024. In contrast,
attention, many other significant incidents highlight this troubling data exfiltration only extortion maintained a steady payment
05 HIGH PROFILE VULNERABILITIES trend. In February 2024, a Phobos ransomware attack targeted
Romania’s healthcare system, directly impacting 25 hospitals and
resolution rate of about 35%. This shift, combined with
increased operation costs of managing decryption efforts, has
causing operation disruptions at over 100 additional facilities due led many ransomware actors to abandon encryption in favor
06 INCIDENT RESPONSE PERSPECTIVE to its effect on the Hipocrate Information System (HIS). As a result of DXF-only operations.
of being disconnected from the internet, hospitals experienced Figure 9 - RansomHub official policy from their DLS.

07 2025 INDUSTRY PREDICTIONS

08 CISO RECOMMENDATIONS
10%
OF RANSOMWARE VICTIMS
65%
OF HEALTHCARE-RELATED
ARE HEALTHCARE VICTIMS ARE BASED IN THE US

18 THE STATE OF CYBER SECURITY 2025


Early adopters of the data exfiltration only trend, such as
Karakurt and Lapsus$, paved the way for others to follow. By NAVIGATING RANSOMWARE’S
EVOLVING LANDSCAPE
2024, established groups like BianLian, a Russian-speaking
ransomware group, fully transitioned to DXF-only extortion
and abandoned encryption altogether. Similarly, Meow,
an older ransomware group previously engaged in double The ransomware landscape in 2024 reflects a dynamic and
increasingly complex threat environment. Law enforcement
01 INTRODUCTION extortion, re-emerged this year, focusing solely on data sales,
offering stolen data at different price points, and allowing successes against major groups have opened the door
victims to “buy back” their information to prevent public for new actors, with RansomHub emerging as the most
02 2024 CYBER SECURITY EVENTS exposure. prominent. At the same time, the erosion of ethical
boundaries concerning attacks on healthcare organizations
New actors have also emerged exclusively as “data-selling highlights a growing ruthlessness among threat actors.
03 CYBER SECURITY TRENDS platforms.” For example, Bashe (also known as Eraleign), Additionally, the strategic shift from encryption-based
which first appeared in April 2024, operates purely as a data extortion to DXF introduces new challenges, requiring
exfiltration only based extortion platform. It offers a dedicated organizations to adapt their defensive strategies to focus on
Cyber Wars - 2024 Edition data leak site (DLS) and a negotiation platform without data protection, monitoring, and rapid threat detection.
providing encryption services or additional tools.
The Ransomware Ecosystem
The Rise of Infostealers
Cloud Complexities
Edge Devices and ORBs

04 GLOBAL ANALYSIS Figure 10 - Bashe Operation Policy, from their data leak sites. Each year, the ransomware environment becomes progressively
complicated. While law enforcement successfully dismantled larger
05 HIGH PROFILE VULNERABILITIES Ransomware as a Service (RaaS) groups, new groups emerged this year.
This approach also created opportunities for false victim
claims. Without the visible disruption caused by encryption,
Additionally, the shift from encryption-based extortion to data extortion
06 INCIDENT RESPONSE PERSPECTIVE threat actors can more easily recycle previously leaked brings new challenges. However, one thing remains consistent: the need to
data and falsely claim credit for new attacks. This tactic adapt and enhance data protection, monitoring, and rapid threat detection.
complicates tracking ransomware campaigns and identifying
07 2025 INDUSTRY PREDICTIONS genuine perpetrators as multiple groups claim responsibility
for the same victim.

08 CISO RECOMMENDATIONS The rise of data exfiltration-only extortion marks a critical


shift in cyber security priorities. Organizations must
now focus on strengthening Data Leak Prevention (DLP)
strategies by leveraging advanced monitoring and detection OMER DEMBINSKY
systems to identify and mitigate potential breaches
earlier. As the financial and operational incentives for data
exfiltration-only attacks continue to grow, this trend will likely
Data Research
persist this year as more ransomware groups adopt these Group Manager
tactics to streamline operations and evade detection.

19 THE STATE OF CYBER SECURITY 2025


As we examine the cyber landscape in 2024, infostealers are
in the spotlight. This is not only due to the evolution of their
methods and tactics but also because the broader criminal
ecosystem has matured and specialized, making these threats
more effective. Infostealers have gained significant power due
to their ability to efficiently manage, quickly process, and sell
01 INTRODUCTION large quantities of logs. They serve as the first step toward
full-scale corporate network breaches. A crucial aspect of
infostealer distribution is that it mostly relies on a "spray-
02 2024 CYBER SECURITY EVENTS and-pray" approach rather than directly targeting corporate
networks. Despite this strategy, one of its main goals is to
extract credentials for accessing corporate resources on BYOD
03 CYBER SECURITY TRENDS (Bring Your Own Device). Cyberint, a Check Point company,
reports that over 70% of devices infected by infostealers are
personal rather than corporate or managed.
Cyber Wars - 2024 Edition
The Ransomware Ecosystem DEFINING INFOSTEALERS
The Rise of Infostealers Infostealers, often called “stealers”, are malware engineered
to covertly extract sensitive data from compromised systems,
Cloud Complexities primarily targeting browser data. They can also exfiltrate files
from the infected machines and take screenshots. Stealers
Edge Devices and ORBs are spread through phishing emails or malicious downloads.
Once they infiltrate a computer, they can harvest a wide
range of valuable information that can be used for further
cyber crime or fraudulent activities. This includes usernames
04 GLOBAL ANALYSIS and passwords, financial details, system configurations,
browser cookies, and cryptocurrency wallets. Infostealers are

FROM INFOSTEALER LOGS TO FULL BREACHES:


marketed on the Dark Web as Malware-as-a-Service (MaaS),
05 HIGH PROFILE VULNERABILITIES where buyers receive customer support, regular updates,
and detailed documentation, lowering the barrier to entry for

06 INCIDENT RESPONSE PERSPECTIVE


THE POTENCY OF INFOSTEALERS IN A MATURE CYBER would-be cyber criminals.

CRIME ECOSYSTEM
07 2025 INDUSTRY PREDICTIONS
As big botnets and banking malware decline, infostealers have emerged as the
new Big Bad, now distributed through large-scale campaigns. A quick search on
08 CISO RECOMMENDATIONS the Russian Market, one of the largest underground criminal marketplaces, reveals
that over 10 million infostealer logs are currently available for purchase. These logs
contain stolen user credentials, authentication tokens, and sensitive data. Cyber
criminals can use them as powerful tools to steal funds from individuals, identity
theft, or breach computer networks worldwide.

Figure 11 - A darkweb forum thread promoting the sale of a


Lumma infostealer.

20 THE STATE OF CYBER SECURITY 2025


THE INFOSTEALER MARKET The need for rapid exploitation highlights another key area
where infostealer vendors compete: the efficient presentation
and classification of stolen data. Advanced operator panels
The infostealer market is robust and highly competitive, with and download mechanisms are developed to provide affiliates
pricing that reflects the product's sophistication and the level with quick and clear access to the logs. Some systems offer
of support the developers offer. For example, RedLine Stealer automatic streaming of logs to Telegram channels, enabling
is available for approximately $150 per month, StealC costs
01 INTRODUCTION around $200, and Lumma’s price tag is about $250. Threat
near real-time exploitation of live session tokens. Effective user
interfaces not only facilitate rapid access but also automatically
actors who operate these malware services, often referred to as parse and highlight high-value credentials, enhancing the
"affiliates," purchase licenses and use the stealers in individual
02 2024 CYBER SECURITY EVENTS infection campaigns within the MaaS model. The data, or “logs,”
efficiency and appeal of the malware to affiliates.
collected by the affiliates, consist of batches of information stolen
from individual computers. The logs are then sold or traded on
03 CYBER SECURITY TRENDS platforms like Telegram or underground criminal marketplaces
like the Russian Market, typically for about $10 each. The stolen
Cyber Wars - 2024 Edition information fuels illicit activities, including financial fraud, identity
theft, and further cyberattacks, thereby perpetuating a broader
The Ransomware Ecosystem cyber crime ecosystem.

The Rise of Infostealers


Cloud Complexities
Edge Devices and ORBs
Figure 12 - Lumma Stealer logs stolen from a French computer for
sale on the Russian Market.
04 GLOBAL ANALYSIS
Figure 13 - StealC panel view.
Session tokens and cookies are among the most desirable
05 HIGH PROFILE VULNERABILITIES types of data harvested by infostealers. These artifacts are
particularly valuable because they provide immediate access The infrastructure supporting these malicious activities is
06 INCIDENT RESPONSE PERSPECTIVE to user accounts without needing login credentials. Acquiring often comprehensive and maintained by the MaaS vendors
"fresh" or recently stolen logs is critical, as active session cookies themselves. This infrastructure can include a mechanism for
are time -sensitive. If harvested and sold promptly, they can panel authentication, command-and-control (C2) servers that
07 2025 INDUSTRY PREDICTIONS hijack ongoing sessions and bypass Multi-Factor Authentication deliver additional plugins and updates, and secure locations for
(MFA) mechanisms that many security systems rely on. Many storing and downloading stolen data. Dependency on extensive
cyber criminals often analyze data obtained from infostealers to infrastructure can sometimes prove to be the malware’s
08 CISO RECOMMENDATIONS uncover credentials for corporate accounts. These credentials Achilles' heel, as law enforcement agencies can target and
can provide an initial foothold within a corporate network or grant seize these resources to disrupt MaaS operations.
access to critical resources. Targets often include credentials
and tokens for VPN accounts, Microsoft 365 accounts, corporate
messaging systems, and more.
THE DISTRIBUTION OF INFOSTEALERS
To address this significant security risk, Google introduced
Infostealer campaigns are driven by affiliates who purchase
App-Bound encryption in July. However, by September, several
licenses from developers and independently operate infection
infostealers had already adopted techniques to bypass this
campaigns. To spread the malware, they use creative methods,
protection and decrypt the sensitive stolen data.
including phishing emails, malvertising, distributing fake or

21 THE STATE OF CYBER SECURITY 2025


cracked software, deceptive advertisements, and counterfeit through stolen credentials is highly valuable and can be further

90%
websites mimicking legitimate platforms like cryptocurrency monetized. In many cases, IABs resell access to carefully
services, AI tools, and groupware applications. Affiliates selected targets on other forums, attracting ransomware OF BREACHED COMPANIES
may also exploit platforms like GitHub to host malicious affiliates keen to exploit these opportunities. These affiliates PREVIOUSLY HAD
repositories, as seen in campaigns using fraudulent accounts then deploy ransomware, often acquired from Ransomware-as- CORPORATE CREDENTIALS
to disseminate popular infostealers. Other tactics involve
LEAKED IN A STEALER LOG
01 INTRODUCTION phishing templates that target users seeking cracked
software, fake CAPTCHA pages designed to trick users into
downloading malware, and malicious Google ads that redirect
02 2024 CYBER SECURITY EVENTS to counterfeit download sites. Unlike developers, who focus
on creating and updating the malware, the affiliates entirely
determine the distribution, resulting in a wide range of exploitation of stolen data.
03 CYBER SECURITY TRENDS innovative infection campaigns.
Credentials and session cookies stolen from employee home
computers can be used to breach corporate networks. One
Cyber Wars - 2024 Edition MONETIZATION AND THE CYBER Figure 14 - Ad offering access to corporate networks.
study revealed that 90% of breached companies had corporate
credentials leaked in a stealer log before the breach. This
The Ransomware Ecosystem CRIMINAL ECOSYSTEM statistic underscores the critical role that infostealers play
in enabling more significant cyber attacks and emphasizes
The Rise of Infostealers the importance of addressing this threat within the broader
To understand the full impact of infostealers, we must
a-Service (RaaS) providers, to execute their attacks. context of cyber security.
examine their role within the broader cyber criminal
Cloud Complexities ecosystem. Many infostealer operators depend on clients Earlier this year, the Snowflake mega data breach exposed
and effective distribution channels to monetize the data they The funds generated from successful ransomware attacks fuel
this entire ecosystem. The stolen personal data offers other sensitive information from over 165 organizations, including
Edge Devices and ORBs steal. Underground markets and Telegram channels provide Advance Auto Parts, Ticketmaster, and Santander Bank,
immediate platforms where sellers can offer their stolen data, lucrative avenues for cyber criminals. Personally Identifiable
and buyers can efficiently search for specific logs that suit Information (PII), financial details, and credit card numbers
their objectives. can be used for identity theft, fraud, and unauthorized
04 GLOBAL ANALYSIS transactions resulting in Business Email Compromise
Initial Access Brokers (IABs) leverage this information to (BEC). All these activities rely on a mature and functioning
gain initial footholds in corporate networks. Access obtained criminal infrastructure that facilitates the exchange, sale, and
05 HIGH PROFILE VULNERABILITIES

06 INCIDENT RESPONSE PERSPECTIVE

07 2025 INDUSTRY PREDICTIONS

08 CISO RECOMMENDATIONS

22 THE STATE OF CYBER SECURITY 2025


affecting millions of customers. The breach most likely started closely followed by FormBook (detailed statistics are provided
with credentials extracted by infostealers and sold online. in the next chapter). The differences between these data
sources can be attributed to the types of victims analyzed. Total

Check Point data primarily focuses on corporate entities,


ANALYSIS OF INFOSTEALERS whereas Russian Market data encompasses a broader
spectrum of victims, most of whom are personal device
01 INTRODUCTION IN THE WILD users.

An analysis of logs offered for sale on platforms like the Further data analysis from Cyberint, a Check Point company,
02 2024 CYBER SECURITY EVENTS Russian Market reveals which infostealers are most prolific highlights the top URL credentials stolen from infected
in terms of harvested data. Lumma Stealer, first reported in machines. While many of these URLs belong to major
2022, is currently the most prominent infostealer, with the internet services and social media platforms, as expected,
03 CYBER SECURITY TRENDS highest number of logs available for sale. RisePro, Vidar, other frequently visited sites include Roblox, Discord, Twitch,

Cyber Wars - 2024 Edition


Racoon
The Ransomware Ecosystem 3% 1 Jan Mar May Jul Sep Nov Jan Mar May Jul Sep Nov Jan Mar May Jul Sep Nov

The Rise of Infostealers accounts.google.com 2022 2023 2024


RedLine
facebook.com
Cloud Complexities 8% roblox.com
StealC Figure 17 - RedLine logs found on tracked Telegram channels 2022-
login.live.com
Edge Devices and ORBs 2024 (Cyberint, a Check Point Company).
10% instagram.com
netflix.com
Lumma discord.com Another significant observation is the growth trajectory of specific
04 GLOBAL ANALYSIS Vidar 51% login.microsoftonline.com malware families. For example, the prevalence of the RedLine
13% amazon.com Stealer has more than quadrupled over the past three years.
05 HIGH PROFILE VULNERABILITIES paypal.com
The increase in infostealers can be attributed to the decrease
twitch.tv in the popularity of botnets. In May, a coalition operation
Risepro twitter.com
15%
called "Endgame" targeted the infrastructures of botnets used
06 INCIDENT RESPONSE PERSPECTIVE epicgames.com to distribute malware, focusing on groups such as IcedID,
Smokeloader, Pikabot, Bumblebee, SystemBC, and Trickbot.
13
07 2025 INDUSTRY PREDICTIONS As a result of Endgame, over 100 servers were dismantled,
and more than 2,000 domains used by these cyber criminals
were seized. These botnets previously played a central role in
08 CISO RECOMMENDATIONS Figure 15 - Logs on Russian Market by infostealer family (November 2024). Figure 16 - Top URLs that appear in infostealer data, according to data
from Cyberint, a Check Point company.
malware distribution, and their disruption has dramatically
impacted the ecosystem, indirectly contributing to the rise of
infostealers.

and StealC follow it. This data suggests that these malware Infostealers’ popularity has not gone unnoticed by international
families have been particularly effective in recent campaigns and EpicGames. This suggests that "gamers" may be more law enforcement coalitions. Two closely related infostealer
or have extensive distribution channels. susceptible to infostealer infections, likely due to less families, RedLine and Meta, were the focus of a major law
stringent internet hygiene practices in these communities. enforcement operation known as "Magnus." In October, this
Insights from the analysis of Check Point gateway data operation resulted in the seizure of multiple servers and
reveal a different perspective on infostealer activity. In these domains associated with these malware strains.
datasets, AgentTesla emerges as the most active infostealer,

23 THE STATE OF CYBER SECURITY 2025


Geographical analysis of the logs offered for sale also yields the widespread adoption of remote work and BYOD policies
important insights. A substantial portion of the logs in the as employees access corporate assets from personal
Russian Market originates from India and Brazil. devices, extending business networks to individual home
India environments. Logs’ rapid delivery and searchability allow
Although Infostealer technology hasn’t drastically evolved
10% Brazil over the past year, the environment in which the malware
IABs to quickly identify potential entry points to corporate
networks, often bypassing MFA mechanisms with stolen valid
01 INTRODUCTION 8% 5%
operates has transformed dramatically. Infostealers now hold session cookies found on personal devices.
a prominent position in the cyber offensive landscape. The
Indonesia
Rest of maturation of the market for infostealer products and the logs To combat these evolving threats, businesses must extend
02 2024 CYBER SECURITY EVENTS World 5% they generate enables IABs to efficiently search for and exploit their security measures to cover the expanded surface
valuable credentials, ultimately enabling them to breach area, including employee access points. Organizations
55% Pakistan
corporate networks. should actively search for indications of company-related
03 CYBER SECURITY TRENDS 5% artifacts being sold on criminal markets to preempt potential
breaches. By broadening protective strategies and staying

Cyber Wars - 2024 Edition


Egypt
4% Turkey
COMBATING INFOSTEALERS: vigilant, companies can strengthen their defenses against
the sophisticated and interconnected threats posed by

The Ransomware Ecosystem


3% Philippines STRENGTHENING CORPORATE SECURITY modern infostealers.

The Rise of Infostealers


3% Thailand
2% Vietnam
IN THE AGE OF REMOTE WORK
The potential corporate attack surface has expanded with
Cloud Complexities Figure 18 - Logs on the Russian Market, by country of origin.

Edge Devices and ORBs

04 GLOBAL ANALYSIS
Following the decline of the big botnets, infostealers have become a significant and wide-
05 HIGH PROFILE VULNERABILITIES scale threat. They offer cyber criminals efficient ways to steal credentials and session
tokens, contributing to financial fraud and identity theft and acting as an entry point to
06 INCIDENT RESPONSE PERSPECTIVE corporate networks. As companies increasingly adopt remote work and bring-your-own-
device (BYOD) policies, it is essential that they implement protective strategies.
07 2025 INDUSTRY PREDICTIONS

08 CISO RECOMMENDATIONS

SERGEY SHYKEVICH
Threat Intelligence
Group Manager

24 THE STATE OF CYBER SECURITY 2025


CLOUD ADMINISTRATION’S
COMPLEXITY
The complexity of administering cloud infrastructure adds
a significant layer of vulnerability that cannot be resolved
01 INTRODUCTION with a simple patch. The rapidly evolving ecosystem and the
multitude of cloud providers, each offering dozens of services,
02 2024 CYBER SECURITY EVENTS terminologies, and security mechanisms, create complexity
that is hard to navigate. As a result, administrators are often
overwhelmed by the amount of settings and configurations
03 CYBER SECURITY TRENDS required to secure their environments effectively. This leads to
the exposure of resources online or penetrable environments
that allow easy privilege escalation paths.
Cyber Wars- 2024 Edition
An example of such administrative complexity can be seen
The Ransomware Ecosystem with Non-Human Identities (Service Accounts, API Keys,
Built-in Users, etc.), which proved hard to secure. In January
The Rise of Infostealers 2024, Microsoft failed to secure its own Azure environment
when an advanced nation-state threat group, Midnight
Blizzard, breached Microsoft’s production environment via
Cloud Complexities
misconfigured OAuth Application and Service Principles.
This allowed attackers to pivot from testing to production
Edge Devices and ORBs environments and access internal systems, source code, and
Microsoft executives’ emails.

04 GLOBAL ANALYSIS Known misconfigurations and poor security practices

CLOUD: THE EVER-EXPANDING


continue to play a significant role in driving large-scale
data breaches. For example, in India, 500GB of personal
05 THE RANSOMWARE ECOSYSTEM information and biometric data of millions of individuals,
including law enforcement and military personnel, were

ATTACK SURFACE
exposed on a misconfigured S3 bucket. Microsoft’s S3 bucket
06 THE RISE OF INFOSTEALERS alternative, Azure Blob Storage containers, is also susceptible
to misconfigurations. A Fujitsu employee publicly exposed vast
amounts of sensitive data, including private client information,
07 2025 INDUSTRY PREDICTIONS Cloud infrastructure became integral to most organizations’ IT emails, AWS keys, and plaintext passwords. BMW likewise
frameworks in 2024. Companies of all sizes now harness the scalability suffered from an exposed storage container, leaking secret
and flexibility the cloud provides to support their operational requirements keys for accessing private buckets and credentials for other
08 CISO RECOMMENDATIONS like email services, development operations, data storage, and hosting cloud services.
production services. The cloud empowers organizations to swiftly deploy
In the realm of poor API security practices, the developers of
and scale their environments to match their needs. At the same time,
the Rabbit R1—an AI-driven personal assistant device—were
this widespread adoption has brought about a new array of security notified after hard-coded API keys for third-party services were
vulnerabilities that are increasingly exploited by threat actors. found in their codebase. These keys were overly permissive,
essentially granting the ability to read all chat responses from
every customer, potentially revealing sensitive information.

25 THE STATE OF CYBER SECURITY 2025


The absence of robust authentication and access controls on-premises infrastructure to multiple cloud and SaaS
in some organizations—particularly the lack of Multi- applications, including vCenter, CyberArk, SalesForce, Azure,
Factor Authentication (MFA) for cloud services—contributed CrowdStrike, AWS, and GCP. The attacker could then perform
to a significant data loss incident this year. Attackers reconnaissance inspections of the Okta web portal to identify
targeted Snowflake, a cloud data warehousing platform, available applications, perform role assignments to these
using usernames and passwords obtained through various applications, and thus move laterally through multiple cloud
01 INTRODUCTION infostealers. This allowed them to access the Snowflake
accounts of at least 165 companies, exfiltrate sensitive data,
providers and victims’ assets.

and issue extortion demands.


02 2024 CYBER SECURITY EVENTS SSO ACCOUNTS UNDER ATTACK
THE HAZARDS OF HYBRID Securing SSO accounts has become an increasingly
03 CYBER SECURITY TRENDS concerning and daunting task. Threat actors, especially
ENVIRONMENTS advanced threat groups, are conducting large-scale
credential stuffing and “low and slow” brute-force attacks
Cyber Wars- 2024 Edition Integrating on-premises resources with cloud services on SSO providers and cloud services. In April 2024, Okta
through Identity and Access Management (IAM) providers, researchers observed a significant credential stuffing
The Ransomware Ecosystem such as Microsoft Entra ID, has become standard practice. operation against its service, where attackers employed
These configurations aim to streamline IAM and enable Single residential proxy services and other anonymizers to avoid
The Rise of Infostealers Sign-On (SSO) authentication. However, these integrations detection. Similarly, Microsoft researchers reported an
have also become prime targets for cyber attacks given advanced Chinese-speaking group that leveraged thousands of
Cloud Complexities their ability to facilitate bidirectional lateral movement. compromised SOHO devices to execute low-volume password
While organizations benefit from distributing their data and spray attacks on accounts behind Microsoft’s SSO, attempting
Edge Devices and ORBs resources across cloud and on-premises systems, attackers only one or two passwords per day per user account.
exploit the same pathways to deploy destructive attacks,
exfiltrate sensitive data, or establish backdoors within As corporations depend on external SSO providers to protect
organizations. against brute-force attacks and other malicious techniques,
04 GLOBAL ANALYSIS they also trust the providers’ logs and global visibility to
Companies using cloud-based email services like Microsoft detect suspicious activity. This dependency raises concerns
365 have discovered that compromised on-premises networks about reliance on third-party security practices, manifested in
05 THE RANSOMWARE ECOSYSTEM can also expose their cloud assets. When attackers gain Microsoft’s September report that some customers received
control of an on-premises environment, they can pivot to cloud only partial log collection due to a systems issue.
environments through several pathways like Azure AD Connect
06 THE RISE OF INFOSTEALERS servers (via Microsoft Entra Connect Sync user) or hybrid
user accounts. For example, in 2024, the financially motivated THE POPULARITY OF AI
threat actor Storm-0501 launched multi-stage attacks that
07 2025 INDUSTRY PREDICTIONS compromised hybrid cloud environments, performed lateral AI also impacts the cloud, as generative AI (GenAI) solutions
movement from on-premises to the cloud, and deployed are offered as a service by all major cloud service providers
(CSPs). Companies choose large language model (LLM)
08 CISO RECOMMENDATIONS backdoor accounts before ultimately launching ransomware
across the network. The same tactic was used in 2023, solutions from CSPs instead of using GenAI services like
when an Iranian-based threat group, Mango Sandstorm (aka ChatGPT directly via an API for various reasons. For one,
Mercury) and Storm-1084, targeted Israeli organizations. The they can build, train, and deploy custom models tailored to
attackers leveraged the pivot to cloud environments to dump their specific business needs or use Retrieval-Augmented
email conversations, send emails, and deploy destructive Generation (RAG) to integrate their proprietary knowledge
attacks on cloud assets. bases and datasets. Another reason is data privacy and
protection; by leveraging CSP-based solutions, companies
In another case, a financially motivated threat actor have greater control over their data, ensuring that chat
named UNC3944 (aka Scattered Spider) exploited highly content is not used to train public models.
privileged Okta SSO accounts to extend their intrusion from

26 THE STATE OF CYBER SECURITY 2025


Naturally, threat actors will find ways to exploit these new
technologies for their own financial benefit. Until recently, SECURITY CHALLENGES IN CLOUD
INFRASTRUCTURE
actors mainly focused on hijacking cloud resources to
perform crypto jacking (crypto mining) on a single vulnerable
server or a Kubernetes cluster. This year, attackers found a
new opportunity called LLMjacking. After a cloud account This year’s incidents underscore the critical security
challenges emerging from the widespread adoption of cloud
01 INTRODUCTION is compromised, attackers take control of existing hosted
LLM models or attempt to deploy new ones. In one instance, infrastructure. Complex administration, misconfigurations,
attackers used an LLM proxy to resell access to these LLMs and vulnerabilities in hybrid environments have led to
02 2024 CYBER SECURITY EVENTS to third parties. In another case, attackers combined LLM significant breaches. As cloud technologies continue to evolve,
so will the tactics of those seeking to exploit them. Proactive
jailbreaks—a technique to remove limitations on banned chat
topics—to sell uncensored role-playing chatbot characters measures will be critical to protecting ever-complex cloud
03 CYBER SECURITY TRENDS that were NSFW. environments.

As state-affiliated threat groups from Russia, China, and Iran


Cyber Wars- 2024 Edition were “caught” by Microsoft and OpenAI abusing ChatGPT to
research advanced topics, create tools, and find vulnerabilities,
The Ransomware Ecosystem some threat actors may pivot to private LLM instances for
improved operational security.
The Rise of Infostealers
Cloud Complexities
Edge Devices and ORBs

04 GLOBAL ANALYSIS As cloud offerings continue to grow, so does the cloud


attack surface. Recent incidents highlight the need for
05 THE RANSOMWARE ECOSYSTEM continuous posture management and proactive threat
prevention across hybrid and multi-cloud environments to
06 THE RISE OF INFOSTEALERS detect and block sophisticated attacks

07 2025 INDUSTRY PREDICTIONS

08 CISO RECOMMENDATIONS

MICHAEL ABRAMZON
Threat Intelligence
and Research Architect

27 THE STATE OF CYBER SECURITY 2025


Traditionally, edge devices have been a primary interest for
state-sponsored actors, especially those associated with
Chinese threat groups. However, cyber crime groups have
increasingly targeted these assets, adopting similar tactics
to achieve financial gains.

01 INTRODUCTION In 2024, the number of disclosed zero-day vulnerabilities


affecting edge devices significantly increased, with over a
dozen specifically targeting various vendors’ devices. These
02 2024 CYBER SECURITY EVENTS vulnerabilities received a CVSS risk score of eight or higher,
underscoring their critical severity and potential impact.

03 CYBER SECURITY TRENDS A notable development is the rise of complex botnets used
as ORBs. One of the most sophisticated is the Raptor Train
botnet, orchestrated by the Chinese APT group Flax Typhoon,
Cyber Wars - 2024 Edition which assembled over 200,000 compromised devices,
including small office/home office (SOHO) routers, NAS
The Ransomware Ecosystem systems, and IP cameras. Organized into multi-tiered layers,
the botnet’s structure supports a command-and-control (C2)
The Rise of Infostealers system through the “Sparrow” platform, enabling remote
operations, DDoS attacks, and espionage. The attackers
Cloud Complexities leverage both zero-day and known vulnerabilities, creating a
scalable, persistent attack infrastructure with global reach.
Through these devices, Flax Typhoon maintains operational
Edge Devices and ORBs control, posing significant risks for both public and private
sector entities.

04 GLOBAL ANALYSIS Flax Typhoon is not the only Chinese-aligned actor operating

05 HIGH PROFILE VULNERABILITIES


THE EVOLVING THREAT OF EDGE through ORBs. Another state sponsored actor linked to
China is Volt Typhoon, known for targeting critical US
infrastructure. This group has operated through a different

DEVICES AND ORBS


network to hide its activities. The KV-botnet is a sophisticated
network of compromised SOHO routers and firewall devices
06 INCIDENT RESPONSE PERSPECTIVE that primarily target end-of-life (EoL) equipment from
manufacturers like Cisco and NetGear. This network is used
Over the past year, both cyber criminals and state-sponsored actors by several Chinese actors, complicating attribution efforts.
07 2025 INDUSTRY PREDICTIONS have significantly increased their exploitation of edge devices as an initial
access vector. Edge devices, like routers, firewalls, and VPN appliances, In addition to state-affiliated actors, financially motivated
are particularly appealing given their lack of dedicated security solutions. attackers also use proxy services powered by compromised
08 CISO RECOMMENDATIONS They are often exploited to set up anonymization infrastructure commonly IoT and EoL devices. The Faceless proxy network, built upon
a legacy botnet called TheMoon, comprises over 40,000
referred to as Operational Relay Boxes (ORBs). ORBs represent a type of compromised devices. Cyber criminals use these older
network infrastructure that cyber threat actors use to anonymize and relay routers as anonymizing nodes to obscure malicious activity
communications across various devices, many of which are compromised, like data exfiltration and credential stuffing. The reliance
creating covert channels that evade detection. on EoL devices underscores a major risk: thousands of
unsupported devices remain vulnerable to compromise,
providing attackers with a resilient infrastructure that
circumvents conventional defenses.

28 THE STATE OF CYBER SECURITY 2025


This year, corporate edge devices increasingly faced zero- deploy custom malware. Magnet Goblin’s toolkit includes
day exploitation as attackers continued repurposing them NerbianRAT, a cross-platform remote access Trojan (RAT),
for broader network penetration. In early 2024, high-severity and MiniNerbian, a Linux backdoor. The actor’s emphasis
Anonymous ORB Platform vulnerabilities were discovered in Ivanti Connect Secure and on swiftly exploiting edge device vulnerabilities highlights a
Palo Alto Networks’ PAN-OS GlobalProtect, allowing for broader trend in financially motivated attacks against these
remote code execution and multifactor bypass. Both nation- critical components, using tools like WARPWIRE, a credential-
01 INTRODUCTION ORB C&C Servers
state actors and ransomware groups exploited these devices
as entry points for accessing and compromising sensitive
stealing JavaScript to access sensitive data in real time.

Anonymous environments. Such zero-day exploits in edge devices have Check Point’s SSLVPN appliance was also targeted through
02 2024 CYBER SECURITY EVENTS Traffic significant consequences as these devices are not easily the path traversal vulnerability identified as CVE-2024-24919.
patched, given their critical role in the main network flow. This exploit allowed attackers to access and read files on
Corporate Network
SOHO Routers Corporate Firewalls Patching edge devices can shut down network services SSLVPN devices, including sensitive password hashes and
Compromised Backdoor Access
03 CYBER SECURITY TRENDS Assets
for some time, which can lead to considerable operational configuration files. When these devices are configured with
Brute-Force consequences. weaker authentication methods, like username-and-password
Attacks access, they are prone to unauthorized data reads. This
Cyber Wars - 2024 Edition VPN Gateways IOT Devices Some actors have turned to exploiting edge devices as a attack demonstrates the evolving focus on edge devices by
DDoS Attacks methodology. Magnet Goblin, a financially motivated actor different threat actors, who can rapidly exploit any emerging
The Ransomware Ecosystem that first emerged in 2024, focuses on rapidly exploiting vulnerabilities.
newly disclosed vulnerabilities in widely used edge devices.
The Rise of Infostealers Their campaigns have targeted Ivanti Connect Secure While cyber criminals have improved their exploitation of
VPNs and popular software like Magento and Qlik Sense to edge devices, state-sponsored actors continue demonstrating
Figure 19 – ORB infrastructure overview. their technological superiority. They use zero-day exploits
Cloud Complexities
Edge Devices and ORBs

04 GLOBAL ANALYSIS
SIGNIFICANT EDGE DEVICE VULNERABILITIES DISCLOSED IN 2024

05 HIGH PROFILE VULNERABILITIES

06 INCIDENT RESPONSE PERSPECTIVE

07 2025 INDUSTRY PREDICTIONS

08 CISO RECOMMENDATIONS

Figure 20 – Timeline of disclosed edge device vulnerabilities in 2024.

29 THE STATE OF CYBER SECURITY 2025


to deploy custom implants tailor made for specific devices. anonymization, network exploitation, persistence, or record- Originally a tactic used by nation-state actors for covert
Cisco’s Adaptive Security Appliances (ASA) were targeted in breaking DDoS attacks. infiltration, the strategy of targeting edge devices has now
a sophisticated campaign known as ArcaneDoor. Exploiting been co-opted by financially motivated attackers leveraging
weaknesses in ASA, this operation enabled nation-state ORBs and botnets like Raptor Train and Faceless use off-the-shelf toolkits. This approach has enabled breaches of
actors to infiltrate government and industrial networks, decentralized C2 infrastructures that can dynamically switch high-value targets while remaining undetected for extended
obtain sensitive information, and set up long-term espionage between compromised devices. This allows attackers to periods. The persistent targeting of edge devices highlights
01 INTRODUCTION capabilities. Throughout the campaign, the threat actors
leveraged a unique implant, custom-made for the affected
rotate nodes and effectively evade detection. Some malware
variants, like TheMoon, employ advanced evasion strategies,
a critical security gap. Publicly exposed network devices
will remain at considerable risk without prompt patching,
devices, indicating significant research and development including in-memory-only execution and frequent IP switching, comprehensive monitoring, and robust detection systems.
02 2024 CYBER SECURITY EVENTS efforts. which further complicates mitigation efforts. Together with
the ongoing cycling of infected devices, these tactics present
Many custom implants for various security products were significant challenges for defenders.
03 CYBER SECURITY TRENDS discovered. One such effort, codenamed Pacific Rim, suggests
Chinese actors have been targeting perimeter devices, such as
Sophos firewalls and VPN gateways, for several years. Pacific
Cyber Wars - 2024 Edition Rim used various tactics to exploit vulnerabilities in internet-
facing services, including CVE-2020-12271 and CVE-2022-
The Ransomware Ecosystem 1040, and enabled access to critical network points. Once
compromised, these devices become part of an ORB network
The Rise of Infostealers that supports covert command and control (C2) channels that
evade detection. The attackers used advanced techniques
Cloud Complexities in their operation, such as rootkit implants and obfuscated
hotfixes, to maintain persistence and conceal their presence
Edge Devices and ORBs on compromised devices. This allowed the operation to pivot
from edge devices to internal network assets, focusing on With thousands of unsupported devices at risk of attack, threat
high-value targets across the Indo-Pacific region. Pacific
Rim's sustained and strategic approach emphasizes the
actors have access to infrastructure that bypasses traditional
04 GLOBAL ANALYSIS vulnerabilities in edge devices, particularly in sectors where security measures. Timely patches, thorough monitoring, and
comprehensive monitoring and timely patching are difficult to strong detection systems will be crucial
achieve.
05 HIGH PROFILE VULNERABILITIES
While those sophisticated backdoors have become more
common over time, it’s important to note that many “classic”
06 INCIDENT RESPONSE PERSPECTIVE threats from unsecured edge devices are still present in
the cyber ecosystem. In September 2024, CloudFlare began
defending against a months-long DDoS campaign that was
07 2025 INDUSTRY PREDICTIONS disclosed as the largest attack volume ever reported by
any organization. These high packet rate attacks appear
to originate from multiple types of compromised devices,
08 CISO RECOMMENDATIONS including MikroTik devices, DVRs, and web servers. The high
bitrate originated from a large number of compromised ASUS
home routers, which were probably exploited using a critical
vulnerability. Currently, this large-scale attack has not been LOTEM FINKELSTEIN
attributed to any state-sponsored actor or cyber crime group.

In 2024, large-scale botnets built from vulnerable and


Director, Threat
unmonitored edge devices have become an indispensable Intelligence and Research
part of advanced threat actors’ arsenals, whether used for

30 THE STATE OF CYBER SECURITY 2025


0
4
GLOBAL
ANALYSIS
THE STATE OF CYBER SECURITY 2025
CYBER ATTACK CATEGORIES BY REGION
Figure 1 shows attacks according to malware type. These
numbers exclude general scans and only deal with direct
attacks, which enabled us to classify the type of malware and its
intention.

In 2024, there was a notable increase in attempted attacks by


both Infostealers and Multipurpose malware. Multipurpose
01 INTRODUCTION malware (RATs, botnets, and bankers) is frequently used in the
initial stages of an attack to drop additional tools and expand
02 2024 CYBER SECURITY EVENTS the attackers’ control over the breached system. It’s therefore
unsurprising that this is the most common malware type, with
39% of organizations affected in 2024. This figure marks a
03 CYBER SECURITY TRENDS significant 25% increase compared to 2023 when only 31% of
organizations faced similar attempts.

Cyber Wars - 2024 Edition


The Ransomware Ecosystem

58%
INCREASE OF
The Rise of Infostealers GLOBAL AMERICAS INFOSTEALER INFECTION
ATTEMPTS IN 2024
Cloud Complexities
39% 19% 6% 2% 32% 15% 4% 1%
Edge Devices and ORBs Multipurpose Malware Infostealer Mobile Crypto Miners Multipurpose Malware Infostealer Mobile Crypto Miners

Infostealer infection attempts also increased significantly, from


04 GLOBAL ANALYSIS 12% to 19% of organizations affected in 2024, a 58% increase.
The rise in infostealer attacks, typically distributed in mass
campaigns rather than targeting specific victims, reflects a
05 HIGH PROFILE VULNERABILITIES maturing ecosystem and an increasing demand for stolen
infostealer logs containing credentials, session cookies, and
other personal information. Infostealers are used for multiple
06 INCIDENT RESPONSE PERSPECTIVE malicious activities, ranging from direct fraud via stolen
financial credentials to leveraging stolen session cookies for
breaching corporate networks. Additional details on recent
07 2025 INDUSTRY PREDICTIONS developments in the infostealer ecosystem are provided in the
Trends chapter, and a dedicated data section will be provided
later in this chapter.
08 CISO RECOMMENDATIONS
Crypto miner attacks, installed without the system owners’
EMEA APAC knowledge, dropped significantly, from 9% to just 2% of

42% 20% 6% 2% 42% 28% 8% 5%


organizations affected. Most crypto miners we have seen
target the Monero cryptocurrency, whose mining difficulty
Multipurpose Malware Infostealer Mobile Crypto Miners Multipurpose Malware Infostealer Mobile Crypto Miners (computational effort required to mine Monero) nearly doubled
this year, rising from an average of 260G in January to nearly
450G in December. This critically decreases their profitability.
Further details about crypto miners are presented in a
dedicated section.
Figure 1 - Percentage of organizations affected by malware type in 2024.

32 THE STATE OF CYBER SECURITY 2025


GLOBAL THREAT INDEX MAP

01 INTRODUCTION

02 2024 CYBER SECURITY EVENTS

03 CYBER SECURITY TRENDS

Cyber Wars - 2024 Edition


The Ransomware Ecosystem
The Rise of Infostealers
Cloud Complexities
Edge Devices and ORBs

04 GLOBAL ANALYSIS

05 HIGH PROFILE VULNERABILITIES

06 INCIDENT RESPONSE PERSPECTIVE

07 2025 INDUSTRY PREDICTIONS

08 CISO RECOMMENDATIONS

Figure 2 - The map displays the cyber threat risk index globally, demonstrating the main risk areas around the world.

33 THE STATE OF CYBER SECURITY 2025


ATTACKS PER ORGANIZATION
Education 3,574 +75% The overall global attacks against organizations significantly
increased in the past year, with the average number of weekly
Government 2,286 +43% attacks per organization reaching 1,673. This is 44% higher
than in 2023. Figure 3 illustrates the average number of weekly
01 INTRODUCTION Healthcare & Medical 2,210 +47% attacks per organization by industry. In 2024, there was a
significant increase in the number of attacks per week across
Telecommunications 2,084 +40% most sectors. The education sector experiences the highest
02 2024 CYBER SECURITY EVENTS volume, with a 75% year-over-year (YoY) increase, surpassing
Construction & Engineering 1,579
an average of 3,574 weekly attacks. Education institutions were
specifically targeted for personal information collection. This
03 CYBER SECURITY TRENDS Energy & Utilities 1,577 +42%
persistent rise in attack rates impacts universities, schools, and
Aerospace & Defence 1,572 educational departments and services.
Cyber Wars - 2024 Edition
Consumer Goods & Services 1,554 The healthcare sector also witnessed a 47% increase in average
The Ransomware Ecosystem weekly attacks. Cyber criminals are increasingly abandoning
Automotive 1,553 their previous self-imposed prohibitions against targeting
healthcare services. The health sector is particularly vulnerable
The Rise of Infostealers Media & Entertainment 1,553 to prolonged service disruptions (as noted in the earlier
Ransomware section) and the highly sensitive nature of patient
Cloud Complexities Associations & Non Profits 1,520 data they hold.

Edge Devices and ORBs Financial Services 1,510 +30% The technological supply chain sector, including software,
hardware, and semiconductor companies, also experienced
Biotech & Pharmaceuticals 1,486 a significant surge in cyberattacks. Notably, the hardware
and semiconductor industries saw the sharpest rise, with a
04 GLOBAL ANALYSIS Business Services 1,434 +71%
staggering 179% increase in average weekly attacks, with the
Real Estate, Rentals, & Leasing 1,422 total number now exceeding 1,400. This spike can be attributed
to the growing global demand for hardware and the heightened
05 HIGH PROFILE VULNERABILITIES Wholesale & Distribution focus on AI technologies. As critical components of modern
1,415 +33%
infrastructure and innovation, these industries have become
06 INCIDENT RESPONSE PERSPECTIVE Hardware & Semiconductors 1,410 +179% prime targets for cyber criminals seeking to exploit supply chain

Software 1,361 +109% GLOBAL vulnerabilities for financial gain, espionage, or disruption.

07 2025 INDUSTRY PREDICTIONS Industrial Manufacturing 1,312 +43% WEEKLY ATTACKS


08 CISO RECOMMENDATIONS Hospitality, Travel, & Recreation 1,270 +33%
PER ORGANIZATION THE OVERALL GLOBAL ATTACKS AGAINST
BY INDUSTRY IN 2024
Transportation & Logistics 1,180 +58%
ORGANIZATIONS SIGNIFICANTLY INCREASED IN
Agriculture 854 THE PAST YEAR, WITH THE AVERAGE NUMBER OF
Information Technology 845 -34% (% OF CHANGE FROM 2023) WEEKLY ATTACKS PER ORGANIZATION REACHING
1,673. THIS IS 44% HIGHER THAN IN 2023

Figure 3 - Global average of weekly attacks per organization by industry in 2024 [% of change from 2023].
[*] Newly introduced sectors which were not part of the previous report.

34 THE STATE OF CYBER SECURITY 2025


ATTACK VECTORS

exe 54% html 61% zip 31%


01 INTRODUCTION dll 11% pdf 22% rar 22%

pdf 8% exe 5% 7z 8%
02 2024 CYBER SECURITY EVENTS
jar 5% lnk 4% gz 6%

03 CYBER SECURITY TRENDS apk 4% js 3% z 4%

doc* 3% xls* 1.2% tar 3.2%


Cyber Wars - 2024 Edition
sh 2% doc* 0.7% lzh 2.6%
The Ransomware Ecosystem xls* 1% arj 2.1%
rtf 0.7%

The Rise of Infostealers elf 1%


WEB bat 0.2%
EMAIL img 2%
ARCHIVES
TOP MALICIOUS TOP MALICIOUS TOP MALICIOUS
Cloud Complexities msi 1% iso 0.2% cab 1%
FILE TYPES IN 2024 FILE TYPES IN 2024 FILE TYPES IN 2024
Edge Devices and ORBs
Figure 4 - Web – Top malicious file types in 2024. Figure 5 - Email – Top malicious file types in 2024. Figure 6- Top malicious archive file types in Email and Web in 2024.
xls* includes common Office Excel files such as .xls, .xlsx, .xlsm, and more xls* includes common Office Excel files such as .xls, .xlsx, .xlsm, and more
doc* includes common Office Word files such as .doc, .docx, docm, and .dot doc* includes common Office Word files such as .doc, .docx, docm, and .dot
04 GLOBAL ANALYSIS

05 HIGH PROFILE VULNERABILITIES

68% 61%
2021 2022 2023 2024
OF ATTACKS OF EMAIL-DELIVERED
06 INCIDENT RESPONSE PERSPECTIVE EMAIL 84% 86% 89% 68% ORIGINATE
FROM EMAIL
MALICIOUS FILES INCLUDE
HTML ATTACHMENTS
07 2025 INDUSTRY PREDICTIONS
WEB 16% 14% 11% 32%
08 CISO RECOMMENDATIONS Figure 7 - Delivery protocols—Email vs. Web attack vectors in 2021-2024.
has led to a shift in tactics: most malicious emails now contain embedding JavaScript code or embedded links within the
HTML files or PDF documents. Malicious uses of HTML files document, which can either trigger malware downloads or
include phishing and credential theft, often achieved by replicating redirect victims to malicious websites. In some cases, PDFs
Email-based attacks remain the dominant initial attack vector, legitimate login pages. Additional use cases include more advanced exploit vulnerabilities in outdated PDF reader software to
with 68% of attacks originating from email. This persists techniques like HTML smuggling, redirection to malicious websites, execute code on the victim’s machine.
despite a significant rise in web-delivered attacks (32%), which browser exploits, and other methods. Notably, 61% of email-
is primarily attributed to the dominance of infected-website- delivered malicious files include HTML attachments. Malicious archive files have also become a common attack vector
based malware distribution frameworks such as FakeUpdates. in cyber campaigns, leveraging formats like ZIP, RAR, 7z, and
Malicious PDF files is another prevalent attack vector that more. Among these, ZIP files are the most common, and account
The decline of malicious macro attacks within Office documents is found in 22% of malicious emails. These typically involve for 31% of malicious archives, followed by RAR files at 22% and

35 THE STATE OF CYBER SECURITY 2025


7z files at 8%. Archive files are particularly effective
for evading detection, as they compress malicious
payloads and obfuscate their content, making it
harder for security solutions to analyze them.

A notable challenge for security mechanisms


01 INTRODUCTION arises when attackers use password-protected
archives. These archives cannot be scanned for
malicious content without the password, which is
02 2024 CYBER SECURITY EVENTS often included in the body of the email or shared
separately. By encrypting the archive's content,
threat actors attempt to bypass automated
03 CYBER SECURITY TRENDS defenses. Once extracted, these archives can
deliver malware directly to the victim’s system.
Attackers often use multi-stage delivery, where
Cyber Wars - 2024 Edition the initial archive file contains seemingly harmless
documents or scripts that, when executed,
The Ransomware Ecosystem download the actual malicious payload from a
remote server. The increased use of archive files
The Rise of Infostealers highlights the evolving tactics of cyber criminals to
exploit weaknesses in email security and leverage
Cloud Complexities user trust to execute attacks successfully.

Malicious DLL files (Dynamic Link Libraries),


Edge Devices and ORBs often delivered within compressed archives,
are commonly used in DLL side-loading or DLL
hijacking techniques. In these cases, attackers
04 GLOBAL ANALYSIS exploit vulnerable legitimate applications by placing
a malicious DLL file in the same directory as a
trusted executable. When the application runs, it
05 HIGH PROFILE VULNERABILITIES loads the malicious DLL instead of the intended
one, allowing the attacker to execute arbitrary code.
This technique is particularly effective for evading
06 INCIDENT RESPONSE PERSPECTIVE detection, as the legitimate application acts as a
trusted carrier for the malicious payload and DLLs.

07 2025 INDUSTRY PREDICTIONS Web-delivered attacks often rely on drive-by


downloads, compromised websites, or deceptive ads
to deliver these files, highlighting the importance of
08 CISO RECOMMENDATIONS web filtering, updated security software, and user
awareness to mitigate such threats. Web-delivered
malicious files are on the rise, leveraging file formats
like EXE, DLL, and PDF to distribute malware. Among
these, EXE files are the most prevalent, accounting
for 54% of web-delivered malicious files. These
executable files are often disguised as legitimate
software or updates, tricking users into downloading
and running them. DLL files comprise 11% of these
attacks, while PDF files represent 8%.

36 THE STATE OF CYBER SECURITY 2025


GLOBAL MALWARE STATISTICS
GLOBAL AMERICAS Data comparisons presented in the following sections are based
on data drawn from the Check Point ThreatCloud Cyber Threat
FakeUpdates 16% FakeUpdates 17% Map between January and December 2024.

01 INTRODUCTION AgentTesla 12% AgentTesla 15% For each region below, we present the most prevalent malware in
2024, and the percentage of corporate networks impacted by each
Remcos 8% Androxgh0st 7%
malware family.
02 2024 CYBER SECURITY EVENTS Formbook 8% Remcos 6%

03 CYBER SECURITY TRENDS


Androxgh0st 7% Formbook 5% GLOBAL ANALYSIS OF TOP MALWARE
AsyncRAT 7% AsyncRAT 4%
Our analysis highlights the most frequently detected malware
Cyber Wars - 2024 Edition CloudEyE 5% Lumma 4% families identified by Check Point’s network protections. It
is important to note that these families are not necessarily
Lumma 5% NJRAT 4% the most sophisticated or dangerous but are the most widely
The Ransomware Ecosystem
2%
distributed.
NJRAT 4% Mirai
The Rise of Infostealers Nanocore 3% Darkgate 2% FakeUpdates (SocGholish) continues to lead Check Point's most
prevalent malware rankings for 2024. This malware operation
Cloud Complexities relies on a network of compromised websites to distribute
Figure 8 - Most prevalent malware globally – 2024. Figure 9 - Most prevalent malware in the Americas – 2024. malware disguised as fake browser or software update prompts.
Edge Devices and ORBs The deceptive prompts trick users into downloading and
executing a JScript-based downloader which in turn downloads
additional malware. The network of compromised websites
is attributed to TA569, a prominent Initial Access Broker (IAB)
04 GLOBAL ANALYSIS EMEA APAC believed to operate on a pay-per-install (PPI) model. TA569
provides system access to other cyber criminals, who often
deploy ransomware or other malicious payloads.
05 HIGH PROFILE VULNERABILITIES FakeUpdates 16% FakeUpdates 14%

AsyncRAT
Qbot, one of the oldest and most versatile malware families,
AgentTesla 12% 10%
experienced a dramatic decline over the past year. Previously
06 INCIDENT RESPONSE PERSPECTIVE Remcos 10% Remcos 9% at second place in our rankings, Qbot's activity was significantly
disrupted in late 2023 following a multinational operation led by
CloudEyE 10% Androxgh0st 9%
07 2025 INDUSTRY PREDICTIONS the FBI which targeted and dismantled its infrastructure. Since
then, many threat actors who previously distributed Qbot shifted
Formbook 9% Formbook 8%
to other malware strains, including DarkGate.
08 CISO RECOMMENDATIONS AsyncRAT 8% AgentTesla 7%
AgentTesla, a regular presence in our most prevalent malware
Androxgh0st 7% Lumma 6% list since 2020, specializes in stealing sensitive information from
NJRAT 5%
infected systems. Check Point Research continues to monitor
Lumma 5%
this infostealer that is frequently deployed in global campaigns.
NJRAT 4% Ramnit 5% AgentTesla can extract a wide range of data from compromised
machines, including keystrokes, login credentials from web
Nanocore 4% Mirai 5% browsers, and credentials from email clients.

Figure 10 – Most prevalent malware in EMEA – 2024. Figure 11 - Most prevalent malware in APAC – 2024.

37 THE STATE OF CYBER SECURITY 2025


MULTIPURPOSE MALWARE GLOBAL
GLOBAL AMERICAS
ANALYSIS
Multipurpose malware includes Remote Access Trojans (RATs),
Raspberry Other botnets, and banking trojans —categories that are continually
01 INTRODUCTION Other Robin
19% updated as malware capabilities evolve. Malware classifications
26% FakeUpdates
3% are dynamic and upgrades permitting additional functionalities
02 2024 CYBER SECURITY EVENTS may require reclassification to a new category. Check Point
40% Darkgate FakeUpdates continuously monitors these developments, updating malware
5% 48% classifications and occasionally redefining entire categories to
03 CYBER SECURITY TRENDS Darkgate better reflect the evolving threat landscape.
5% Mirai
DarkGate serves as a prime example of multifaceted malware.
Cyber Wars - 2024 Edition Phorpiex
7% Androxgh0st Beyond its core RAT, downloader and information-stealing
Androxgh0st functionality, DarkGate incorporates crypto mining capabilities,
The Ransomware Ecosystem 5% 18% 19% making it difficult to fit neatly into traditional malware
Mirai
AgentTesla
Formbook
27%
21%
categories. However, such complexities are not anomalies.

6%
The Rise of Infostealers Lumma 12% These categories remain critical for understanding the main
Lokibot
SnakeKeylogger
6%
5%
intent behind specific attacks and identifying overarching trends
within the cyber criminals ecosystem.
Cloud Complexities Other 30%

Figure 12 - Most prevalent multipurpose malware globally – 2024. Figure 13 - Most prevalent multipurpose malware in the Americas – 2024. Intensive law enforcement activity throughout the year has
Edge Devices and ORBs significantly reshaped the cyber threat landscape. In May
2024, a multinational coalition executed Operation Endgame,
targeting botnet infrastructure responsible for distributing
APAC
04 GLOBAL ANALYSIS EMEA APAC malware. This operation disrupted malware distribution
networks linked to groups such as IcedID, Smokeloader,
Pikabot, Bumblebee, SystemBC, and Trickbot. The operation
05 HIGH PROFILE VULNERABILITIES dismantled over 100 servers, seized more than 2,000 domains,
Other and led to the arrest of four individuals—one in Armenia and
FakeUpdates
06 INCIDENT RESPONSE PERSPECTIVE 24% Other 28%
three in Ukraine—while also freezing illegal assets.

FakeUpdates 33% Botnets historically played a central role in malware


distribution. Their dismantling has triggered significant
07 2025 INDUSTRY PREDICTIONS Phorpiex 42% changes, including a noticeable shift toward infostealers, which
are often more decentralized and widely used among individual
5% cyber criminals. This decentralization makes infostealer activity
08 CISO RECOMMENDATIONS Androxgh0st harder to target through centralized enforcement operations.
Darkgate
5% Androxgh0st 17% As a result of these disruptions, the multipurpose malware
Raspberry 19% Phorpiex market has shifted considerably compared to last year. Qbot

Robin 7% and Emotet, which previously dominated the space, have been
replaced by FakeUpdates (40%), Androxgh0st (18%), Phorpiex
5% Glupteba (5%), Darkgate (5%) and Raspberry Robin malware families.
7% Mirai
9%
Figure 14 - Most prevalent multipurpose malware in EMEA – 2024. Figure 15 - Most prevalent multipurpose malware in APAC – 2024.

38 THE STATE OF CYBER SECURITY 2025


GLOBAL AMERICAS
INFOSTEALER MALWARE GLOBAL
GLOBAL AMERICAS
ANALYSIS
In 2024, the infostealer malware landscape continued to be
Other dominated by previously known, established threats such
01 INTRODUCTION Other AgentTesla 24% as AgentTesla which accounted for 29% of all detections,
33% 29% Formbook for 18%, and Lumma for 12% of the detections.
02 2024 CYBER SECURITY EVENTS AgentTesla
Despite the absence of significant new entrants, there was still
a 58% increase in infostealer infection attempts compared to
Ramnit
2% 43% the previous year, and there is a combination of several possible
03 CYBER SECURITY TRENDS Amadey
reasons that can explain it.

Formbook 4% Lumma Traditional malware distribution channels were disrupted by law


Cyber Wars - 2024 Edition
Ramnit Lumma 18% 11% Formbook
enforcement operations, such as Operation Endgame in May
2024 which targeted major botnets like IcedID, Smokeloader,
The Ransomware Ecosystem 4% 12% 15% and Trickbot, dismantling over 100 servers and seizing more
Lokibot than 2,000 domains. Cyber criminals may be turning to
The Rise of Infostealers 4% infostealers as an alternative. In addition, the maturation of
the cyber criminals ecosystem increased demand for data
harvested by infostealers, commonly referred to as "logs."
Cloud Complexities
These logs, containing sensitive information such as credentials
Figure 16 - Top infostealer malware globally – 2024. Figure 17 - Top infostealer malware in the Americas – 2024. and personal data, are sold on underground marketplaces to
Edge Devices and ORBs EMEA other cyber criminals seeking to exploit this information.

As a result, infostealers are playing an increasingly pivotal role


APAC
04 GLOBAL ANALYSIS EMEA APAC in the evolving threat landscape. A comprehensive analysis of
these trends is provided in the subsequent chapters.

05 HIGH PROFILE VULNERABILITIES Formbook


The Styx Stealer, investigated by Check Point Research, is
one new infostealer that appeared this year. Styx is derived
Other
AgentTesla
16% from the Phemedrone Stealer and is designed to exfiltrate
06 INCIDENT RESPONSE PERSPECTIVE
30% 27% sensitive information such as saved passwords, cookies, autofill
data from various browsers, cryptocurrency wallet details,
Other AgentTesla and session data from messaging platforms like Telegram
07 2025 INDUSTRY PREDICTIONS 42% 15% and Discord. It also gathers system information, including
hardware specifics and external IP addresses, and can capture
screenshots to assess the environment prior to executing its
08 CISO RECOMMENDATIONS Formbook Lumma payload. Notably, Styx Stealer incorporates features like auto-
start, clipboard monitoring, crypto-clipping, enhanced sandbox
SnakeKeylogger
21% 11%
5% Lumma evasion, and anti-analysis techniques. Unlike its predecessor,
Ramnit which was available for free, Styx Stealer is sold through a
Lokibot 12% 9% subscription model, with prices ranging from $75 for a monthly

6% Amadey
license to $350 for a lifetime subscription.

6%
Figure 18 - Top infostealer malware in EMEA – 2024. Figure 19 - Top infostealer malware in APAC – 2024.

39 THE STATE OF CYBER SECURITY 2025


CRYPTO MINERS GLOBAL ANALYSIS
GLOBAL AMERICAS In 2024, the cryptocurrency sector underwent significant
regulatory and market developments, resulting in an upswing.
Lucifer Bitcoin surpassed the $100,000 mark in December and reached
Other Other
3% an all-time high of $103,649. However, the number of crypto
01 INTRODUCTION 16% 13% mining attacks declined, from impacting 9% of corporations in
Lucifer 2023 to just 2%.
LemonDuck
2% Wannamine
02 2024 CYBER SECURITY EVENTS 46% LemonDuck
9% 42%
Illegal crypto miners focus on Monero (XMR) due to its
RedTail robust privacy features, which render transactions virtually
5% untraceable, as well as its CPU-friendly mining and lower
03 CYBER SECURITY TRENDS RedTail computational requirements. However, Monero's value
Kinsing 14% remained relatively stagnant throughout the year, while its
Cyber Wars - 2024 Edition 15% Wannamine Kinsing
mining difficulty (computational effort required to mine Monero)
nearly doubled from an average of 260G in January to almost
The Ransomware Ecosystem 17% 19% 450G in December. The sharp increase in difficulty drastically
reduced mining profitability and many illegal crypto mining
operations scaled back, leading to a decline in crypto mining
The Rise of Infostealers attacks.
Cloud Complexities In 2024, LemonDuck remained one of the most prevalent
Figure 20 - Top crypto mining malware globally – 2024. Figure 21 - Top crypto mining malware in the Americas – 2024. crypto mining malware strains and was deployed in 46% of all
Edge Devices and ORBs attempted crypto mining attacks. Initially discovered in 2018,
LemonDuck evolved from a simple crypto miner into a highly
sophisticated, modular, and cross-platform malware with
Lucifer Other capabilities that now include credential theft, self-propagation,
04 GLOBAL ANALYSIS EMEA APAC RedTail 2% 5%
and fileless, in-memory mining operations. These added
2%
Kinsing features make it versatile and difficult to detect. Recent activity
Lucifer
Other shows that LemonDuck operators are actively exploiting
05 HIGH PROFILE VULNERABILITIES 3% 3%
Wannamine 11% Server Message Block (SMB) vulnerabilities, specifically the
EternalBlue exploit, to infiltrate Windows systems. LemonDuck
06 INCIDENT RESPONSE PERSPECTIVE 5% campaigns use a variety of attack vectors, including phishing
emails with malicious attachments, brute-force attacks
RedTail LemonDuck targeting RDP and SSH, weaponized USB drives containing
5% LemonDuck
07 2025 INDUSTRY PREDICTIONS 41% Wannamine 58%
.LNK files, and other infiltration techniques.

29%
08 CISO RECOMMENDATIONS
Kinsing
35%

Figure 22 - Top crypto mining malware in EMEA – 2024. Figure 23 - Top crypto mining malware in APAC – 2024.

40 THE STATE OF CYBER SECURITY 2025


MOBILE MALWARE GLOBAL ANALYSIS
GLOBAL AMERICAS In 2024, more than 60% of global internet traffic originated from
mobile devices. The sensitive data stored on these devices is highly
sought after, not only by cyber criminals seeking financial gain
Joker but also by state-sponsored actors engaged in espionage and
01 INTRODUCTION Other Necro
Other 23% intelligence gathering.

34% 28% 27% Rafel RAT, an open-source Android Remote Access Trojan, is widely
02 2024 CYBER SECURITY EVENTS used for espionage purposes, as revealed by this Check Point
Research report. Our investigation found that it was deployed in
approximately 120 distinct malicious campaigns, many of which
03 CYBER SECURITY TRENDS Necro targeted high-profile organizations, including entities within
Hiddad
19% 7%
Joker the military sector. Rafel RAT enables threat actors to exfiltrate
Cyber Wars - 2024 Edition
AhMyth Anubis
Anubis 15% sensitive data, contact lists, and Two-Factor Authentication
AhMyth (2FA) messages, gain access to accounts, and bypass multi-
The Ransomware Ecosystem Hiddad
9% 12% 10% 12% factor authentication mechanisms. Notably, the espionage
4% group APT-C-35, also known as the DoNot Team, was observed
leveraging Rafel RAT in their operations, which highlights the
The Rise of Infostealers malware’s adaptability and effectiveness across a diverse range of
threat actor profiles and objectives.
Cloud Complexities
Figure 24 - Top mobile malware globally – 2024. Figure 25 - Top mobile malware in the Americas – 2024. The most prevalent mobile malware in 2024 (23%) was Joker, a
Edge Devices and ORBs notorious malware targeting Android devices since 2017. Joker’s
primary objective is to covertly subscribe users to premium
services by simulating user clicks and intercepting SMS messages
and notifications. A notable case involved a Joker variant embedded
04 GLOBAL ANALYSIS EMEA APAC in the app Beauty Camera in the Google Play Store, which garnered
over 100,000 downloads. While the app appeared legitimate, it
secretly downloaded additional resources from remote command
05 HIGH PROFILE VULNERABILITIES and control (C2) servers, enabling further malicious activities.
Joker Joker
06 INCIDENT RESPONSE PERSPECTIVE 24% Other 25% The rise of Necro (19%) in the top three mobile malware across
all regions is unsurprising. First identified in 2019, Necro is a
Other
38% 33% dropper malware designed to download and execute additional
07 2025 INDUSTRY PREDICTIONS payloads. Recently, Necro was distributed through two malicious
applications in the Google Play Store with a combined 11 million
Anubis
downloads. Beyond Google Play, Necro was also identified in
08 CISO RECOMMENDATIONS 13% Necro unofficial repositories, embedded into popular apps and games like

Necro AhMyth
22% WhatsApp, Minecraft, Stumble Guys, and others.

AhMyth Hiddad Anubis Two other prominent mobile threats, Anubis and AhMyth, are still
12% 7%
Hydra 8% 3% 10% widely used due to their publicly available source code. Anubis,
originally developed as a banking Trojan, evolved to include Remote
5% Access Trojan (RAT) functionality, keylogging, audio recording, and
even ransomware-like features. Its versatility makes it a preferred
tool for threat actors targeting financial institutions. AhMyth, initially
created as an educational project and made public on GitHub, has
Figure 26 - Top mobile malware in EMEA – 2024. Figure 27 - Top mobile malware in APAC – 2024. been integrated into malicious campaigns.

41 THE STATE OF CYBER SECURITY 2025


RANSOMWARE is attributed to the Cronos law enforcement operation, while
ALPHV's inactivity results from a combination of law enforcement
In terms of geographical distribution, 50% of the companies
affected this year are in the United States, followed by the United
actions and internal disputes with affiliates. Although LockBit still Kingdom at 6%, Canada at 5%, and Germany and Italy at 3% each.
This section presents data and insights drawn from over 140 appears to be the second most prolific ransomware actor in 2024,
ransomware Data Leak Sites (DLS) operated by more than the majority of its victim postings took place in the first half of the However, when adjusted for population size, the picture changes.
90 double-extortion ransomware groups. The details of more year. By the final months of 2024, LockBit reported less than five While the U.S. remains statistically the most targeted country, the
5,200 companies have been published on data leak sites by
01 INTRODUCTION cyber criminals who use these platforms to increase pressure
victims per month. However, in the last week of 2024, the group
announced a new version, LockBit 4.0. Only time will tell if this
differences between the countries become less pronounced. Many
industrialized nations counted between 2 and 6 corporate victims
on organizations that refuse to comply with ransom demands. marks a resurgence for the criminal organization. (More details per 1 million inhabitants, highlighting a broader, global exposure
Corporations that pay the ransom generally do not appear
02 2024 CYBER SECURITY EVENTS on the DLS and are therefore excluded from this dataset,
are available in chapter - 03) to ransomware attacks.

introducing an inherent bias. However, the information shared The decline of these two major criminal groups reshaped the
on these criminal DLS offers valuable perspectives on the
03 CYBER SECURITY TRENDS ransomware landscape. The data analyzed here covers the
ransomware landscape. There is greater fragmentation within
the ecosystem, as numerous smaller groups now account for a
period from January to December 2024. United States 7.5
larger share of the total annual victims. While the top 10 most
Cyber Wars - 2024 Edition active groups were responsible for over 66% of all posted victims
Canada 6.4

Switzerland
in 2023, their combined share dropped to just 51% in 2024. 4.4

The Ransomware Ecosystem RansomHub’s rise as the leading double-extortion group can be United Kingdom 4.1

attributed to their successfully attracting many former LockBit Australia 4.1

The Rise of Infostealers and ALPHV affiliates who lack the capability or choose not to Belgium 4.1

ransomhub operate independently. Sweden 3.8

Cloud Complexities 10% New Zealand 3.5

Singapore
LockBit3 3.4

Edge Devices and ORBs 10% UAE 3.2

play Norway 2.9

Other 6%
04 GLOBAL ANALYSIS 49% akira
Figure 30 - Ransomware corporate victims per 1M capita, per country.

5% Rest of World
05 HIGH PROFILE VULNERABILITIES hunters 23% In the RaaS (Ransomware as a Service) model, affiliates
4% Spain select their victims independently, leading to a geographical
medusa 2% United distribution of victims that reflects broader ecosystem trends
06 INCIDENT RESPONSE PERSPECTIVE 4% Australia States rather than the RaaS operator preferences. Operators can

inc
qilin
3%
2%
India 50% impose restrictions, such as prohibiting attacks on former
2% Soviet republics or non-profit organizations or those involved in
07 2025 INDUSTRY PREDICTIONS 8base
3%
ransom bianlian
3% 3%
France
2% healthcare. However, some groups demonstrate a more distinct
Brazil geographical focus. For instance, the ransomware group known
2%
Figure 28 - Ransomware double-extortion groups, by percentage of total as “RA Group” disproportionately targets Germany, where over
08 CISO RECOMMENDATIONS published victims in 2024.*
Italy
3% 20% of its published victims are located, while KillSec focuses
Germany heavily on India, with 30% of its victims located there.
3%
Canada
United An analysis of the global average of weekly attacks per
Two of the most dominant ransomware actors in 2023 have 5% Kingdom
organization by industry (Figure 3) shows that the education,
become inactive during 2024. LockBit, which accounted for 21% 6% government, and healthcare sectors are the most frequently
of victims in 2023, and ALPHV, responsible for 9%, either ceased targeted. However, looking specifically on ransomware
or significantly reduced their victim postings. LockBit's decline Figure 29 - Victims by country, as reported on data leak sites – 2024. extortion, according to DLS data, manufacturing emerges as

* Data from the DLS covers the period of January 1, 2024 to December 23, 2024.

42 THE STATE OF CYBER SECURITY 2025


the most impacted sector, while government and education
rank lower in the victim hierarchy. This discrepancy likely
reflects sector-specific differences in their willingness to
comply with ransom demands, as government and educational
organizations are generally less inclined to pay, making them
less attractive targets for ransomware actors.
01 INTRODUCTION In 2024, ransomware actors increasingly targeted healthcare
and medical service providers, making this sector the second
02 2024 CYBER SECURITY EVENTS most targeted industry.

Further details on this year’s ransomware developments can be


03 CYBER SECURITY TRENDS found in a dedicated section.

Cyber Wars - 2024 Edition


Industrial
The Ransomware Ecosystem Manufacturing
22%

Healthcare
The Rise of Infostealers & Medical
10%

Consumer Goods
Cloud Complexities & Services
9%

Business
Edge Devices and ORBs Services
7%

Financial
7%
Services

04 GLOBAL ANALYSIS Construction


& Engineering
6%

Education 5%
05 HIGH PROFILE VULNERABILITIES
Government 4%

06 INCIDENT RESPONSE PERSPECTIVE Transportation


4%
& Logistics

07 2025 INDUSTRY PREDICTIONS Software 3%

Figure 31 - Industry distribution of ransomware victims, as reported on


08 CISO RECOMMENDATIONS shame sites – 2024.

43 THE STATE OF CYBER SECURITY 2025


0
5
HIGH PROFILE
GLOBAL
VULNERABILITIES
THE STATE OF CYBER SECURITY 2025
The following list of top vulnerabilities is based on data
collected by the Check Point Intrusion Prevention System VMWARE ESXI AUTHENTICATION An analysis of attack data reveals that vulnerabilities disclosed
in 2024 and 2023 accounted for 4% and 15%, respectively, of

BYPASS (CVE-2024-37085)
(IPS) sensor net and details some of the most prominent and all exploitation attempts. Recent vulnerabilities are increasingly
interesting attack techniques and exploits observed by Check severe, easier to exploit, and adopted by threat actors more
Point Research (CP<R>) in 2024. rapidly than in the past. However, threat actors continue to
In June 2024, a critical authentication bypass vulnerability was target older vulnerabilities, with over 57% of exploitation
disclosed in Broadcom VMware's ESXi hypervisor. This flaw
01 INTRODUCTION attempts focusing on CVEs published in 2020 or earlier.
PHP CGI ARGUMENT INJECTION affects the integration of ESXi with Active Directory (AD) for
user management. Specifically, when an ESXi host is joined
This underscores a persistent issue where systems remain
unpatched for years, even after patches are available.
02 2024 CYBER SECURITY EVENTS (CVE-2024-4577) to an AD domain, it automatically grants full administrative
privileges to members of a domain group named "ESX
CVE-2024-4577 is a critical command injection vulnerability in Admins." Notably, this group does not exist by default in AD,
03 CYBER SECURITY TRENDS PHP that specifically affects Windows systems running Apache and ESXi does not verify its existence upon domain integration.
with PHP-CGI, and was exploited within a day of its release. Therefore, any domain user with permissions to create
Notably, the vulnerability mainly affects Windows installations groups can establish and assign users to an "ESX Admins"
Cyber Wars - 2024 Edition using Chinese and Japanese language locales, although group, thereby obtaining full administrative access to the
other installations are also targeted. Disclosed as part of a ESXi host. This vulnerability was actively exploited by multiple
The Ransomware Ecosystem patch released in June 2024, the issue arises from Windows' ransomware operators, including Storm-0506, Storm-1175,
"Best-Fit" behavior during character encoding conversions, Octo Tempest, and Manatee Tempest. In some instances, the
The Rise of Infostealers which can cause the PHP CGI module to misinterpret certain observed post-compromise technique resulted in Akira and
characters as PHP options. This enables unauthenticated Black Basta ransomware deployments.
Cloud Complexities users to inject arguments into the PHP binary, leading to
remote code execution or the exposure of sensitive data.
Edge Devices and ORBs
Following its disclosure, the vulnerability was quickly
leveraged by multiple malicious actors, including for
2024 4%
ransomware deployment, and we observed it impacting more
04 GLOBAL ANALYSIS than 25% of corporation networks. The vulnerability was also 2023 15%
used to deploy malware such as the Msupedge backdoor,
Gh0st RAT, RedTail crypto miners, and XMRig. 2022 12%
05 HIGH PROFILE VULNERABILITIES 2021 12%

06 INCIDENT RESPONSE PERSPECTIVE IVANTI COMMAND INJECTION 2020 9%

(CVE-2024-21887) 2019 6%

07 2025 INDUSTRY PREDICTIONS In early 2024, a critical command injection vulnerability, CVE-
2018 7%

2024-21887, was discovered in Ivanti's Connect Secure and 2017 5%


08 CISO RECOMMENDATIONS Policy Secure gateways. This flaw allows attackers to use
2016 6%
administrative privileges to execute arbitrary commands on
a compromised system. When combined with CVE-2023- 2015 2%
46805, an authentication bypass vulnerability, attackers can
achieve remote code execution without authentication. These 2014 7%
vulnerabilities were actively exploited by Chinese state-
Earlier 15%
sponsored hackers to implant web shells, steal sensitive data,
and establish persistence on compromised devices.

Figure 1 - Percentage of attacks leveraging vulnerabilities by


disclosure year in 2024.

45 THE STATE OF CYBER SECURITY 2025


0
6
INCIDENT
RESPONSE
PERSPECTIVE
THE STATE OF CYBER SECURITY 2025
This section is based on the experience and data collected Of the cases where CPIRT was contacted this year 35% were communication anomalies and active investigations into
from a wide range of Check Point Incident Response Team triggered by an alert from a security product, compared intelligence and Dark Web sources and indicates enhanced
(CPIRT) incident investigation and mitigation cases. Unlike the to just 20% of our cases from the previous year. This shift and increasingly mature cyber security measures across the
other sections, the data presented here is from case studies indicates a significant rise in the expertise of security teams industry.
of actual events that triggered incident reports, not limited and advancements in detection and prevention technologies.
to Check Point product users. Most attacks compromised Organizations are progressively adept at recognizing alerts By focusing on early detection through security alerts
and proactive measures, organizations can respond more
01 INTRODUCTION their targets and provide us with a different perspective into
the threat landscape and the practical challenges faced by
from security systems and identify breaches before they
escalate to service disruptions. effectively to threats and reduce the impact of cyber
organizations during active breaches. incidents.
02 2024 CYBER SECURITY EVENTS For example, CPIRT witnessed multiple attempted
ransomware attacks that were detected after a mass
INCIDENT TRIGGERS installation of remote access tools such as Any Desk and SECURITY ALERTS
03 CYBER SECURITY TRENDS Screen Connect, but before the encryption stage began. CPIRT
Clients contact Check Point’s Incident Response team due to have seen multiple cases this year where security teams Organizations can increasingly identify threats before they
one or more triggers originating from various sources such as responded quickly to the installation alerts and were able to escalate into the final attack stages. Analyzing the different
Cyber Wars - 2024 Edition automated security alerts, user reports, service disruptions, or mitigate the attack before the ransomware encryptor was types of alerts that prompt security teams to initiate their
intelligence gathered from third parties, vendors, or government deployed. incident response processes provides valuable insights into how
The Ransomware Ecosystem agencies. Collecting and analyzing these triggers helps us teams should be trained and operate in these situations.
understand how threats are discovered, which threat indications Another noticeable increase is in the number of alerts
The Rise of Infostealers are more likely to prompt immediate action, and how speed and originating from teams' proactive investigations and
efficacy of incident responses can be enhanced. Cyber Emergency Response Team (CERT) or government
Cloud Complexities notifications. This reflects growing awareness of
The primary goal of security teams is to respond as soon as
possible before an attack reaches the impact stage involving
Edge Devices and ORBs
service disruption or data theft. 2024 marks the first time
security alerts become the leading trigger for incidents,
surpassing service disruptions as the primary indicator for
04 GLOBAL ANALYSIS initiating incident response. Reconnaissance 1%
Resource development 1%
05 HIGH PROFILE VULNERABILITIES Initial access 13%
Security alert 35%
Execution 13%
06 INCIDENT RESPONSE PERSPECTIVE Service disruption 26%
Persistence 3%
Proactive
13%
activity Privilege escalation 4%
07 2025 INDUSTRY PREDICTIONS User Report 8%
Defense evasion 4%
Government
6%
08 CISO RECOMMENDATIONS notification
Vendor
Credential access 18%
notification
5%
Lateral movement 3%
Financial details
modification
3%
Command and Control 18%
Extortion message 1% Exfiltration 1%
Resource spike 1% Impact 12%
Defacement 1%

Figure 1 - Most Common Triggers for contacting Incident Response. Figure 2 – Attack tactics in security alerts that trigger incident responses, ordered by MITRE ATT&CK Matrix.

47 THE STATE OF CYBER SECURITY 2025


A breakdown of the security alerts triggered by MITRE ATT&CK
tactics reveals that Command and Control (C2) communication
rarely overlooked or justified as legitimate user behavior. For
this reason, they usually trigger immediate and decisive action ALERTS FROM GOVERNMENT AGENCIES
AND SECURITY VENDORS
is the most common trigger to incident response. Malicious by security teams.
activity related to C2 communication can often be detected by
relatively simple means, such as indicators of compromise
(IoCs), suspicious network signatures, or unusual outbound SERVICE DISRUPTIONS In 2024, incident triggers stemming from alerts issued by
government agencies and security vendors increased.
01 INTRODUCTION traffic patterns. In addition, security solutions that detect
these activities, such as Intrusion Prevention Systems As in previous years, service disruptions remain a prominent
(IPS) and Anti-Bot/Anti-Virus (AB/AV) modules, are widely trigger for incident response. Service disruptions include
02 2024 CYBER SECURITY EVENTS implemented across industries. These tools enhance visibility attacks such as ransomware, where the service disruption
into C2 actions and contribute to the high detection rate at this is caused by encryption and renders critical resources
Communication with
stage. inaccessible; blocking traffic, which prevents legitimate malicious IPs
03 CYBER SECURITY TRENDS communications; and DDoS attacks that overwhelm the system
The next highest tactic alert that prompts IRT involvement capacity, making legitimate services unavailable. Dark web intelligence
is Credential Access. While this tactic may not generate the
Cyber Wars - 2024 Edition highest volume of alerts from security products, in many of
the CPIRT cases analyzed, Credential Access is often the Large outbound traffic
The Ransomware Ecosystem tactic that leads security teams to escalate an alert into a full
incident response. Credential Access attempts include the
Figure 3 - Top 3 causes for government and security vendors alerts.
The Rise of Infostealers use of tools such as Mimikatz to dump the Lssas.exe process
and exfiltrate the NTDS.dit file from a DC. These alerts are
Cloud Complexities
Many of these alerts are based on network traffic linked
to malicious IP addresses, often identified as indicators of
Edge Devices and ORBs compromise (IoCs) associated with specific threat actors.
Similar traffic monitoring can also lead to alerts about
unusually large outbound data transfers to suspicious
04 GLOBAL ANALYSIS CASE STUDY: destinations, typically indicating threat actors’ exfiltration
activities.

05 HIGH PROFILE VULNERABILITIES


RAPID RESPONSE TO A RANSOMWARE THREAT Monitoring of the Dark Web by government agencies and
Earlier this year, the Check Point Managed Detection and Response (MDR) team alerted a customer in North America security vendors is another critical source of information
about a potential ransomware threat. Within minutes, the team detected the installation of AnyDesk on multiple devices leading to potential security alerts. This includes information
06 INCIDENT RESPONSE PERSPECTIVE across the organization. The analysts quickly identified this as a security incident and escalated the issue to the incident about leaked credentials or sensitive company data shared on
response team to initiate mitigation and investigation protocols. Dark Web forums and markets.

07 2025 INDUSTRY PREDICTIONS Rapidly installing remote-control tools across multiple devices is a known tactic, technique, and procedure (TTP) of Such third-party alerts serve as crucial early warnings, allowing
ransomware operators. As such, detecting this activity immediately triggered a swift reaction from the experienced organizations to respond proactively to credible external
analysts. intelligence before the threats escalate. Since these alerts
08 CISO RECOMMENDATIONS come from trusted entities and usually undergo professional
In this case, it was discovered that the remote-control tools were distributed via Group Policy Object (GPO). Upon analysis before issuance, they are highly reliable. This prompts
examining domain controller (DC), an encryptor binary was found in a public folder, ready to be deployed to all devices organizations to act swiftly and initiate incident investigations.
within the domain. Organizations should not rely exclusively on external entities
and should regularly conduct proactive monitoring of the Dark
Thanks to the analysts' quick response, the threat was mitigated before the encryptor could be distributed, thus preventing Web to facilitate early breach detection.
a potentially severe ransomware attack.

48 THE STATE OF CYBER SECURITY 2025


USER REPORTS Key areas to focus on proactively include abnormal behavior by
‘admin users’ and suspicious traffic patterns that do not align
with regular operational flow, like traffic to and from countries
CASE STUDY: with which the organization does not do business.

01 INTRODUCTION
RESPONDING TO A Suspicious MFA request

Encrypted files
27%
By proactively searching for hidden indicators of compromise,
organizations can detect and mitigate threats that evade

GOVERNMENT CERT ALERT ON


27%
automated detection tools, reinforcing a layered security
Suspicious emails 27% approach.
02 2024 CYBER SECURITY EVENTS
DATA EXFILTRATION
Suspicious financial request 7%

Figure 4 - Top causes for users to report incidents.


ATTACK TYPES
03 CYBER SECURITY TRENDS In October 2024, a CPIRT case was triggered by a
In 2024, ransomware continues to dominate the cyber security
European government CERT alert, indicating that
an IP address of the organization was transmitting threat landscape. The most prevalent ransomware family in
Cyber Wars - 2024 Edition large amounts of data to an IP associated with User reports provide an additional source for threat detection incident response cases this year is LockBit, followed by Akira
command-and-control (C2) activities. The provided by identifying malicious activities that are not easily detected by and Black Basta.
The Ransomware Ecosystem IP address was the organization's external NAT IP, other security mechanisms. As users become more security-
prompting the SOC team and CPIRT to investigate conscious it provides an additional layer to the organization's Other notable threat types are Business Email Compromise
defense strategy. In 2024, most user reports were of overt (BEC) and DDOS attacks. Twenty-five percent of the CPIRT case
The Rise of Infostealers firewall and DNS logs to identify the specific
attacks were identified and prevented in early stages, making it
device on the network responsible for the data malicious activities, such as file encryption resulting from
transmission. ransomware attacks. However, users increasingly reported difficult to determine the type of attack.
Cloud Complexities suspicious multi-factor authentication (MFA) attempts that
The investigation revealed that the domain they did not initiate. Reports of suspicious emails and phishing
Edge Devices and ORBs controller (DC), which was also used as a file attempts also frequently led to the detection of malicious
server, was the source of the data transmission. On activities.
the server, CPIRT discovered archiving tools and a
04 GLOBAL ANALYSIS recent installation of FileZilla.
PROACTIVE THREAT HUNTING
CPIRT assisted the customer in determining what Disrupted in
05 HIGH PROFILE VULNERABILITIES data might have been exfiltrated and conducted preliminary stage
a thorough investigation to identify any additional
footholds the threat actor might have established 25% Ransomware
06 INCIDENT RESPONSE PERSPECTIVE within the organization. Authentication anomaly
Communication with
24%
53%
53%
suspicious IPs
Wiper
07 2025 INDUSTRY PREDICTIONS Credential exposure 6%
4%
DDOS
08 CISO RECOMMENDATIONS Figure 5 - Findings in proactive activities that trigger incidents.
8%
BEC

The past year saw a rise in incidents triggered by proactive 10%


activities and threat-hunting led by security teams, as opposed
to responses to system alerts. These incidents often originate
from examining system logs, user behavior, and network traffic
uncharacteristic of the environment. Security teams that are
experts in their own network topology can more easily identify Figure 6 - Main attack categories in CPIRT 2024 cases.
suspicious activities than external security products.

49 THE STATE OF CYBER SECURITY 2025


ESXI RANSOMWARE CONCLUSION

11%
In 2024, 11% of the ransomware attacks investigated The CPIRT 2024 findings show encouraging progress in
specifically targeted VMware ESXi servers, which are early threat detection and proactive security measures
virtualized environments central to many enterprise among organizations. Security alerts have overtaken service
infrastructures. By focusing on ESXi servers, attackers disruptions as the primary trigger for incident response,
01 INTRODUCTION can render multiple critical servers inaccessible by and there is greater engagement in proactive threat hunting
compromising a single device. This strategy allows them OF THE RANSOMWARE ATTACKS INVESTIGATED and user awareness. These insights emphasize the need for
to cause substantial disruption without infecting the SPECIFICALLY TARGETED VMWARE ESXI SERVERS, WHICH continued vigilance, refinement of detection capabilities, and
02 2024 CYBER SECURITY EVENTS entire network or server base with encryption malware. collaboration with external intelligence sources to strengthen
Ransomware groups targeting VMware ESXi servers include
ARE VIRTUALIZED ENVIRONMENTS CENTRAL TO MANY cyber security resilience.
the Akira ransomware group which has been exploiting two ENTERPRISE INFRASTRUCTURES.
03 CYBER SECURITY TRENDS remote code execution (RCE) vulnerabilities in ESXi: CVE-
2023-20867 and CVE-2024-37085.
Cyber Wars - 2024 Edition
The Ransomware Ecosystem
The Rise of Infostealers
Cloud Complexities
Edge Devices and ORBs

04 GLOBAL ANALYSIS In 2024, the experiences and data collected by Check Point's Incident
Response Team demonstrate that organizations that prioritize security alerts
05 HIGH PROFILE VULNERABILITIES and harness insights from the data are better equipped to thwart threats
before they escalate, ultimately safeguarding their critical assets.
06 INCIDENT RESPONSE PERSPECTIVE

07 2025 INDUSTRY PREDICTIONS

08 CISO RECOMMENDATIONS

TIM OTIS
Head of Incident Response
& Managed Detection and Response

50 THE STATE OF CYBER SECURITY 2025


0 2025 INDUSTRY

7
PREDICTIONS:
THE FUTURE OF
CYBER SECURITY
THE STATE OF CYBER SECURITY 2025
Cloud Platforms Become the Backbone of Rising Supply-Chain Attacks on Open-Source The Growing Cyber Security Talent Gap
Cyber Security Projects
The global shortage of cyber security professionals poses a
Cloud-based platforms are increasingly serving as the As open-source projects gain popularity, they increasingly significant challenge for organizations trying to defend against
foundation for cyber security, with AI-driven integration become attractive targets for malicious actors aiming to the rising complexity and volume of cyber threats. While
proving more effective than standalone tools. By bringing covertly exploit vulnerabilities in widely used software. organizations invest in versatile security products, the need
01 INTRODUCTION together various security operations, these platforms Following the sophisticated multi-year operation that insert a for more skilled experts to effectively manage and integrate
reduce complexity, allowing organizations to tackle threats backdoor into Linux XZ Utils, we can expect new similar attack these tools results in a fragmented and inefficient security
and vulnerabilities in the cloud with greater efficiency and attempts and the discovery of previously implanted backdoors. approach. Dependence on numerous vendors and insufficient
02 2024 CYBER SECURITY EVENTS effectiveness. Solutions like CNAPP, ASPM, and DSPM merge This escalating threat highlights the urgent need for enhanced in-house knowledge expose organizations to attacks as their
to create all-encompassing security posture management security measures and icnreased vigilance within the open- security measures become increasingly difficult to manage
(SPM) suites. source community. and less effective. Companies will have to streamline security
03 CYBER SECURITY TRENDS operations and prioritize the upskilling of staff to maintain
As new tools such as Application and Data SPM emerge, resilience.
Decentralization of Cyber Crime Ecosystems
Cyber Wars - 2024 Edition they will likely be integrated into a broader Cloud Native
Application Protection Platform (CNAPP), potentially leading
Recent successes by law enforcement in combating major
The Ransomware Ecosystem to the development of what could be called Extended Security
ransomware operations and botnets have prompted malicious
Posture Management (XSPM). Integrating Attack Surface
actors to transition towards smaller, more decentralized
Management within this new category illustrates how these
The Rise of Infostealers platforms can offer more value than a simple collection of
networks, methodologies, and operations. Large ransomware
projects have restructured into smaller groups, while
point solutions, fundamentally changing how organizations
Cloud Complexities infostealer-driven ecosystems have emerged as the primary
address vulnerabilities.
means of facilitating initial access. This decentralization
Edge Devices and ORBs necessitates that defenders adapt their strategies, highlighting
Rising Risks of AI Misuse and Data Breaches the importance of enhanced collaboration and intelligence
sharing.
As AI technologies integrate into personal and workplace
04 GLOBAL ANALYSIS environments, concerns about their misuse are growing. This Increased Regulatory Demands and Stricter
year, the potential for data breaches caused by employees
inadvertently sharing sensitive information with AI platforms Cyber Insurance Standards
05 HIGH PROFILE VULNERABILITIES like ChatGPT or Google's Gemini is a significant risk.
Employees might input confidential information, such as Organizations will face increasing pressure due to new cyber
financials, to generate reports or analyses, often without security regulations, including the EU IoT Regulations, SEC
06 INCIDENT RESPONSE PERSPECTIVE realizing that unauthorized individuals could store and access Cyber security Disclosure Rules, the Digital Operational
this data. Establishing stricter controls on AI tools within an Resilience Act (DORA), and the NIS2 Directive. Compliance
organization’s systems will be crucial for striking a balance with these frameworks will demand a significant investment of
07 2025 INDUSTRY PREDICTIONS between enhancing productivity while ensuring data privacy time and resources for initiatives such as policy development
protections. and new security technologies.

08 CISO RECOMMENDATIONS AI Powered Financial Crime


While these regulations aim to improve security measures,
they also create additional operational complexities. This
requires businesses to devote more attention and effort to
2024 began with headlines reporting on sporadic but meet these standards. Moreover, cyber insurance policies
successful instances of Generative AI powered financial are anticipated to become more stringent, with insurers
crime. Cyber criminals recognized the potential of GenAI and enforcing stricter controls and compliance requirements
started investing in its integration into various technological as prerequisites for coverage. This will further intensify the
tools, particularly for Business Email Compromise (BEC) and regulatory challenges organizations must navigate.
Know Your Customer (KYC) bypass methods. These threats
will become more prevalent this year, as cyber criminals
are actively working to implement GenAI in these malicious
services.
52 THE STATE OF CYBER SECURITY 2025
0
8
CISO
RECOMMENDATIONS
THE STATE OF CYBER SECURITY 2025
1. Adopt a multi layered approach within your weak authentication. They often use legitimate credentials companies can proactively protect customer data, enhance
security stack and tools, blurring the line between regular user activity security, and stay ahead of digital threats. This approach
and malicious actions. Organizations must understand the fosters a strong compliance framework that ultimately builds
link between identity, cloud, endpoint, and data protection customer trust.
Organizations should implement a multi-layered security
to identify these threats across multiple systems. With the
strategy that includes regular data backups, employee training
on phishing awareness, and robust email filtering to mitigate
average enterprise using over 45 security tools, data silos 6. Implement Vulnerability and Risk
01 INTRODUCTION ransomware and information stealers. Utilizing endpoint
can lead to visibility gaps. A unified security platform with AI
capabilities enhances visibility and control, improving breach
Management Program
detection and response (EDR) tools can help identify and
detection and prevention while saving time and money.
isolate threats early. Also, maintaining strict access controls The rapid emergence of new vulnerabilities, particularly zero-
02 2024 CYBER SECURITY EVENTS and employing least privilege principles can limit potential day attacks, poses a significant challenge for vulnerability
breach damage. Regularly updating software and systems 5. Develop a customer-trust program to management. Edge devices, which are often publicly
03 CYBER SECURITY TRENDS to patch vulnerabilities and conducting regular security ensure compliance accessible, are especially at risk. To effectively manage
assessments and incident response drills are essential to these risks, assessing their threat levels and prioritizing
ensure preparedness against attacks. Organizations must establish a customer trust program to them accordingly is essential, allowing for prompt patching.
Cyber Wars - 2024 Edition ensure compliance in today's rapidly changing regulatory External-facing assets and critical systems should be the
2. Prioritize advanced cloud security solutions environment. Implementing automation for compliance can primary focus.
The Ransomware Ecosystem streamline adherence to stringent regulations and reduce
Organizations should prioritize API security, identity human error during audits and reporting. Prioritizing data Furthermore, using threat intelligence alongside external
management, and a zero-trust architecture to address cloud sovereignty allows businesses to maintain control over attack surface management provides valuable visibility into
The Rise of Infostealers
vulnerabilities. Strong API gateways and regular security sensitive information. By incorporating privacy by design,
Cloud Complexities assessments can mitigate data exchange risks. Implementing
least-privilege access and multi-factor authentication is
essential for securing resources. A zero-trust model enhances
Edge Devices and ORBs
security by verifying users and devices before access. Cloud
security posture management (CSPM) tools identify and fix
misconfigurations, while cloud workload protection platforms
04 GLOBAL ANALYSIS (CWPP) secure workloads. These strategies collectively help As we reflect on the incidents of 2024, it's essential to focus on the key
manage cloud infrastructure risks effectively.
elements that led to attackers' success and the strategic mitigations
05 HIGH PROFILE VULNERABILITIES 3. Leverage AI for Prevention and Detection defenders can employ to thwart such threats. This introduction summarizes
vital insights gained and provides actionable recommendations for
Harness the power of advanced artificial intelligence
06 INCIDENT RESPONSE PERSPECTIVE technologies to enhance prevention and detection strategies.
cyber security professionals. These guidelines serve as a practical framework
By developing robust, AI-driven systems, organizations can to enhance defenses and prevent severe incidents outlined in this report
07 2025 INDUSTRY PREDICTIONS effectively identify and mitigate potential threats before they by addressing common systemic issues and mistakes that have historically
escalate. This proactive approach involves implementing
automated solutions that leverage AI capabilities to provide contributed to cyber attacks.
08 CISO RECOMMENDATIONS timely and accurate detection of issues in real time. Such
systems improve overall security and streamline response
efforts, enabling teams to act swiftly and efficiently against
emerging challenges.
JONATHAN FISCHBEIN
4. Gain 360 visibility across your attack surface
Check Point Software Global CISO
Criminals exploit vulnerabilities from bring-your-own-device
practices and cloud-native applications, increasing the risk EMEA & LATAM
of breaches due to issues like hard-coded credentials and

54 THE STATE OF CYBER SECURITY 2025


how adversaries perceive your security measures. With this
insight, you can implement immediate prevention strategies.

7. Choose a security manufacturer that you


trust
01 INTRODUCTION When choosing a security manufacturer that embodies
digital trust, look for a company with a proven track record
of effective security practices and low vulnerability rates.
02 2024 CYBER SECURITY EVENTS Prioritize vendors that ensure prompt patch releases, allowing
users to address potential threats swiftly. Additionally, evaluate
03 CYBER SECURITY TRENDS their incident response strategies and history of handling
breaches.

Cyber Wars - 2024 Edition 8. Optimize security operations


The Ransomware Ecosystem Given the shortage of skilled cyber security personnel, AI is
essential to improving efficiency so teams can better manage
The Rise of Infostealers and prioritize threats management. AI tools can automate
repetitive tasks, minimizing time spent on tasks like event
Cloud Complexities analysis and troubleshooting with automation. Security
professionals can focus on strategic innovation and proactive
Edge Devices and ORBs measures with streamlined processes.

9. Focus on Resilience and Incident Response


04 GLOBAL ANALYSIS Organizations must prioritize operational resilience as they
face growing threats from ransomware and geopolitical
cyber warfare. To strengthen your IT strategy, ensure that
05 HIGH PROFILE VULNERABILITIES your operations are effectively segregated. This approach
will enhance your incident response in the event of an attack.
Additionally, regularly assess and update your disaster
06 INCIDENT RESPONSE PERSPECTIVE recovery plans to minimize disruptions caused by cyberattacks
or IT outages.
07 2025 INDUSTRY PREDICTIONS User education is crucial in preventing malware infections.
Employees should be aware of the sources of files and emails
08 CISO RECOMMENDATIONS and whether they can trust senders. The most common
ransomware infection methods are still phishing emails and
malicious web downloads. Increased user awareness often
prevents attacks. Educate your users and encourage them
to report anything unusual or suspicious to security teams
immediately.

55 THE STATE OF CYBER SECURITY 2025


ABOUT CHECK POINT SOFTWARE TECHNOLOGIES LTD. CONTACT US
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security
platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to WORLDWIDE HEADQUARTERS
enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling
5 Shlomo Kaplan Street, Tel Aviv 6789159, Israel
proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered
technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Tel: 972-3-753-4599
Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Email: [email protected]

U.S. HEADQUARTERS

100 Oracle Parkway, Suite 800, Redwood City, CA 94065


Tel: 800-429-4391

UNDER ATTACK?

Contact our Incident Response Team:


[email protected]

CHECK POINT RESEARCH

To get our latest research and other exclusive content,


Visit us at www.research.checkpoint.com

www.checkpoint.com
© 2025 Check Point Software Technologies Ltd. All rights reserved.

You might also like