Google Cloud Cybersecurity Forecast Report 2025
Google Cloud Cybersecurity Forecast Report 2025
Forecast
GO
2025
R
BA
EM
Table of Contents
Next Phase of AI and Security 5 More Interest in Web3 and Crypto Heists 11
GO
When looking at the year ahead, we never make predictions.
Instead, we look at the trends we are already seeing, and provide
realistic forecasts of what we expect to see in the wide world
of cybersecurity.
R Mandiant CTO, Google Cloud, and Phil Venables, VP, TI Security &
CISO, Google Cloud.
AI for IO
Information Operations (IO) threat actors will increasingly leverage gen AI
tools to support their efforts. Deployment of AI capabilities has expanded
beyond early use of generative adversarial network (GAN)-created profiles
to backstop inauthentic personas, and has shifted to include the use of large
language models (LLMs) to support content creation, and the manufacturing
of seemingly genuine articles published to inauthentic websites. This
is a significant force multiplier that increases the scale at which actors
engaged in this space can produce content, and create additional layers of
obfuscation. We expect this trend to continue; actors likely using increasingly
available gen AI tooling for a variety of ends, including scaling content
creation, producing more persuasive content, and backstopping
inauthentic personas.
China
We anticipate that institutional investments China has made in equipping
its cyber threat operators over the last decade will continue to fuel the
volume of threat activity and capability development trends into 2025. We
will continue to observe Pro-People’s Republic of China (PRC) actors using
stealthy tactics, including operational relay box (ORB) networks to obscure
operator traffic to and from target environments, targeting of network edge
devices to take advantage of vulnerable Internet-exposed attack surface
and reduce their footprint in target environments, and exploitation of zero-
day vulnerabilities as a byproduct of industrializing collection of software
vulnerabilities at a national scale. Additionally, we expect Chinese state-
sponsored actors to continue to be aggressive, and demonstrate a high
risk tolerance.
In 2025, PRC actors will continue to employ this strategy to deploy custom
malware that enables them to achieve stealthy backdoor access into
environments, such as trojanizing legitimate services to listen for attacker
connections. They will also leverage low-level malware like rootkits in order to
hide evidence of their activities and hinder investigation efforts.
GO
“2025 is going to be the In 2025, the cybersecurity industry will continue to innovate,
year when AI moves from while organizations will face evolving challenges across the
pilots and prototypes into
large-scale adoption.”
vast threat landscape.
GO
R
BA
EM