0% found this document useful (0 votes)
46 views19 pages

Google Cloud Cybersecurity Forecast Report 2025

The Cybersecurity Forecast 2025 report outlines anticipated trends in cybersecurity, emphasizing the increasing use of AI by both attackers and defenders, and the evolving threat landscape driven by geopolitical conflicts. Key threats include ransomware, infostealer malware, and targeted cyber operations from nations like Russia, China, Iran, and North Korea, with a particular focus on hybrid environments and cloud security. The report aims to provide insights for organizations to better prepare for and respond to these evolving threats in the coming year.

Uploaded by

r_somnath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views19 pages

Google Cloud Cybersecurity Forecast Report 2025

The Cybersecurity Forecast 2025 report outlines anticipated trends in cybersecurity, emphasizing the increasing use of AI by both attackers and defenders, and the evolving threat landscape driven by geopolitical conflicts. Key threats include ransomware, infostealer malware, and targeted cyber operations from nations like Russia, China, Iran, and North Korea, with a particular focus on hybrid environments and cloud security. The report aims to provide insights for organizations to better prepare for and respond to these evolving threats in the coming year.

Uploaded by

r_somnath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Cybersecurity

Forecast

GO
2025

R
BA
EM
Table of Contents

Introduction 3 Rising Impact of Compromised


Identities in Hybrid Environments 10
Artificial Intelligence 4
Maturing Security Operations in the Cloud 11
Attacker Use of AI 4
Criticality Drives More Regulations
AI for IO 4 for Cloud Providers 11

Next Phase of AI and Security 5 More Interest in Web3 and Crypto Heists 11

The Big Four 6 Faster Exploitation and More


Vendors Targeted 12
Russia 6
Preparing for an Age of
China 6
Post-Quantum Cryptography 12
Iran 7
EMEA Forecasts 13
North Korea 7
A Pivotal Year for Compliance 13
Global Forecasts 8
Geopolitical Conflicts Drive
PRC Actors Will Continue to Deploy Threat Activity 14
Custom Malware Ecosystems for
More Focus on Cloud Security 14
Embedded Systems 8
JAPAC Forecasts 15
No End in Sight: Ransomware
and Multifaceted Extortion 9 North Korea Threat Actors
Setting Their Sights on JAPAC 15
The Rising Threat of Infostealer Malware:
A Gateway to High-Impact Data Breaches 9 Chinese-Controlled Websites Posing
as Local News Outlets Target Global
Uncovering Operations From Years Past 9
Audiences with Pro-Beijing Content 16
Post U.S. Election Activity 10
Cyber Criminals in Southeast Asia
Democratizing of Cyber Capabilities Continue to Innovate 16
Will Continue To Lower Barriers to
Entry for Less-Skilled and Newer Actors 10 Conclusion 17

Cybersecurity Forecast 2025 2


Introduction SPECIAL REPORT: MANDIANT M-TRENDS 2023 3

GO
When looking at the year ahead, we never make predictions.
Instead, we look at the trends we are already seeing, and provide
realistic forecasts of what we expect to see in the wide world
of cybersecurity.

The Cybersecurity Forecast 2025 report is filled with forward-


looking insights from Google Cloud security leaders, including
Sunil Potti, VP/GM, Google Cloud Security, Sandra Joyce, VP of
Google Threat Intelligence at Google Cloud, Charles Carmakal,

R Mandiant CTO, Google Cloud, and Phil Venables, VP, TI Security &
CISO, Google Cloud.

The report also features insights from more than a dozen


researchers, analysts, responders and experts across
BA
numerous Google Cloud security teams, including Google
Threat Intelligence, Mandiant Consulting, Google Security
Operations, Google Cloud’s Office of the CISO, and VirusTotal.
These individuals are regularly on the frontlines, and know what
organizations and security teams should be prioritizing next year.

Technology advances, threats evolve, the cybersecurity


landscape changes, and defenders must adapt to it all if they
want to keep up. The Google Cloud Cybersecurity Forecast 2025
report aims to help the cybersecurity industry frame its fight
EM

against cyber adversaries in 2025.

Cybersecurity Forecast 2025 3


Artificial
Intelligence
Attacker Use of AI
“2025 is the first year Next year we anticipate malicious actors will continue their rapid adoption of
where we’ll genuinely see AI-based tools to augment and assist their online operations across various
the second phase of AI in
action with security.”
phases of the attack lifecycle. We will see continued use of AI and large
language models (LLMs) to develop and scale more convincing phishing,
Sunil Potti. VP/GM, vishing, SMS, and other social engineering attacks. We expect to see cyber
Google Cloud Security espionage and cyber crime actors continue to leverage deepfakes for
identity theft, fraud, and bypassing know-your-customer (KYC) security
requirements. We expect to observe more evidence of malicious actors
experimenting with LLMs and deepfake applications for other use cases,
including vulnerability research, code development, and reconnaissance.
Additionally, we anticipate more demand in underground forums for LLMs
that lack security guardrails, allowing threat actors to query for illicit topics
without limit. As AI capabilities become more widely available throughout
2025, enterprises will increasingly struggle to defend themselves against
these more frequent and effective compromises.

AI for IO
Information Operations (IO) threat actors will increasingly leverage gen AI
tools to support their efforts. Deployment of AI capabilities has expanded
beyond early use of generative adversarial network (GAN)-created profiles
to backstop inauthentic personas, and has shifted to include the use of large
language models (LLMs) to support content creation, and the manufacturing
of seemingly genuine articles published to inauthentic websites. This
is a significant force multiplier that increases the scale at which actors
engaged in this space can produce content, and create additional layers of
obfuscation. We expect this trend to continue; actors likely using increasingly
available gen AI tooling for a variety of ends, including scaling content
creation, producing more persuasive content, and backstopping
inauthentic personas.

Cybersecurity Forecast 2025 4


Next Phase of AI and Security
In 2025, we expect to see a second phase of AI and closer to fully autonomous security operations,
security in action. This past year, practitioners have 2025 will usher in an intermediate stage of semi-
been using AI to democratize security, meaning autonomous security operations. This will require
they’ve begun using AI-driven tools to automate enough capabilities in our security workflows that
the summarization of complex reports, querying are being done by the system itself, smartly, but
vast datasets with ease, and obtaining real- there still needs to be a human being who can
time assistance for a multitude of tasks, thereby now accomplish much more with AI support. This
augmenting their capabilities and streamlining includes being able to parse through
workflows. Reducing the toil on defenders alerts—even with false positives—to
performing repetitive tasks by integrating AI create a list of the highest priority
into processes and procedures is allowing items, enabling security teams to further triage and
investigations to run more efficiently, and remediate the risks that matter most.
security decision-makers see AI as a key tool
in combatting threats. Before AI helps us get

Cybersecurity Forecast 2025 5


The
Big Four
Russia
“Geopolitical conflicts In 2025, the Ukraine conflict will likely remain a primary focus of Russian
will continue driving cyber cyber espionage, cyber attack, and information operations efforts. In 2024,
activity around the world,
we tracked increased targeting of Ukrainian soldiers’ mobile devices, with
creating more complexity.”
operators likely seeking tactical insight to support kinetic operations and
Sandra Joyce. other conventional military activities. While less frequent than in 2022
VP of Google and 2023, we continued to observe disruptive attacks, including a range
Threat Intelligence
of different critical infrastructure operators, as well as use of hacktivist
at Google Cloud
personas such as CyberArmyofRussia_Reborn to publicize threat activity. We
expect these types of operations to continue into next year.

Outside of Ukraine, Russian cyber espionage will almost certainly continue to


support Moscow’s global interests, targeting governments, politicians, civil
society, journalists, media outlets, and technology organizations primarily
in Europe and NATO member countries. Pro-Russian information operations
will continue to use a variety of tactics to promote Russian interests and
undermine perceived opponents, and capitalize on high-profile events as we
observed during the 2024 Summer Olympics in Paris.

China
We anticipate that institutional investments China has made in equipping
its cyber threat operators over the last decade will continue to fuel the
volume of threat activity and capability development trends into 2025. We
will continue to observe Pro-People’s Republic of China (PRC) actors using
stealthy tactics, including operational relay box (ORB) networks to obscure
operator traffic to and from target environments, targeting of network edge
devices to take advantage of vulnerable Internet-exposed attack surface
and reduce their footprint in target environments, and exploitation of zero-
day vulnerabilities as a byproduct of industrializing collection of software
vulnerabilities at a national scale. Additionally, we expect Chinese state-
sponsored actors to continue to be aggressive, and demonstrate a high
risk tolerance.

Cybersecurity Forecast 2025 6


Pro-PRC information operations (IO) are expected North Korea
to directly target elections and voters in countries
and regions viewed as top strategic priorities for the We expect geopolitics and economic need will
PRC, most notably Taiwan and the U.S. This activity drive North Korean cyber operations into 2025
is expected to include impersonation of voters, and beyond.
promotion of disinformation about rigged votes,
North Korean cyber espionage operations will
and video content featuring AI-generated news
continue to support the country’s geopolitical
hosts. Pro-PRC IO have been largely ineffective
objectives, including targeting government,
at generating authentic engagement, except for
defense, education, think tank targets primarily in
isolated successes. However, narratives and tactics
South Korea, and the U.S., with some interest in the
will remain aggressive, including use
UK, Germany, Australia, China, and Russia. North
of ad hominem attacks and intimidation.
Korean actors placed heavy emphasis on supply
chain compromises in 2023 and 2024, usually
Iran using trojanized open source software packages in
social engineering operations targeting software
So long as it remains active, the Israel-Hamas developers, and we expect these tactics to
conflict will likely continue to dominate Iranian continue into next year.
state sponsored cyber threat activity, fueling
cyber espionage, disruptive and destructive North Korean actors will continue to pursue revenue
attacks, and information operations. However, this generation through IT workers and cryptocurrency
focus will not prevent Iranian threat actors from theft. IT workers will use stolen and fabricated
continuing operations consistent with long-term identities to apply for high paying software
patterns, including targeting government and development jobs. Significantly, IT workers have
telecommunications organizations across the Middle also leveraged privileged access to their employers’
East and North Africa, or dabbling in cyber crime. systems to enable malicious cyber intrusions, and
We are confident that longstanding objectives that trend will continue into next year.
of regime stability, economic development, and
regional influence will continue to drive monitoring of
dissidents, key individuals and organizations linked
to Iranian or regional politics, and technologies that
could support Iran’s military capabilities.

Cybersecurity Forecast 2025 7


Global
Forecasts
PRC Actors Will Continue to Deploy
Custom Malware Ecosystems for
Embedded Systems
Endpoint detection and response (EDR) platforms continue to be a vital
component of an organization’s security architecture and enable visibility into
endpoint activity that is critical for effective security monitoring. In order to
evade detection, People’s Republic of China (PRC)-nexus espionage actors
have continually demonstrated their proclivity and adeptness in developing
highly customized malware ecosystems for embedded systems where EDR
solutions are not readily available, and traditional digital forensics and incident
response can be difficult. Examples include edge devices like firewalls and
VPN gateways, or internal network devices like switches and routers. PRC
actors design such malware ecosystems with additional capabilities that are
specific to the targeted platform or operating system, and take advantage of
native functionality in the underlying operating systems. These ecosystems
can consist of several different components that work in unison to achieve
their desired functionality.

In 2025, PRC actors will continue to employ this strategy to deploy custom
malware that enables them to achieve stealthy backdoor access into
environments, such as trojanizing legitimate services to listen for attacker
connections. They will also leverage low-level malware like rootkits in order to
hide evidence of their activities and hinder investigation efforts.

No End in Sight: Ransomware and


Multifaceted Extortion
“Without question,
multifaceted extortion and Ransomware, data theft extortion, and multifaceted extortion are, and will
ransomware will continue in
continue to be in 2025, the most disruptive type of cyber crime globally—both
2025, likely with an increase
outside the U.S.” due to the volume of incidents and the scope of potential damage for each
event. The impact of ransomware and extortion operations will also continue
Charles Carmakal. to extend far beyond the initial victim. 2024 saw significant ransomware
Mandiant CTO,
incidents in the healthcare sector that negatively impacted patient care at
Google Cloud
hospitals, blocked patients from refilling important prescriptions, prevented
doctors from running vital laboratory tests or billing insurance, and led to

Cybersecurity Forecast 2025 8


urgent requests for blood donations.

Based on available evidence, ransomware and


extortion operations to date in 2024 have affected
more than 100 countries and every industry vertical.
The number of newly identified data leak sites (DLS)
doubling in 2024 over 2023, and the emergence
of multiple new ransomware as a service (RaaS)
offerings, illustrate the thriving and prolific nature of
the ransomware and extortion threat landscape.

Post U.S. Election Activity


A variety of campaigns targeted the U.S. presidential
election throughout 2024, and we don’t expect
The Rising Threat of
operations to immediately cease now that the Infostealer Malware:
election is over. China, Russia, and Iran will continue A Gateway to High-
to target the U.S. government throughout the rest of Impact Data Breaches
the year and into 2025, likely taking advantage of the
administration change to seek a decision advantage. Infostealer malware, though not a novel threat, has
We anticipate seeing continued state-sponsored demonstrated a concerning surge in sophistication
cyber espionage, as well as information operations and effectiveness. In 2024, threat actors leveraged
promoting politically divisive content on social media stolen credentials, obtained through widespread
and other platforms. Gen AI tools will enable these infostealer campaigns, to infiltrate a significant
actors to increase the scale and effectiveness of number of prominent organizations, resulting
these operations, so these campaigns may feel more in various high impact intrusions. The alarming
prevalent now than in previous elections. accessibility of credentials from these tools, even to
low-skilled threat actors, amplifies their potential for
widespread impact.
Uncovering Operations
From Years Past We anticipate the use of stolen credentials to
persist into 2025, with infostealers continuing
We anticipate discovering and helping remediate to serve as a primary vector to obtain them,
a number of intrusions in 2025 that had been particularly in environments where two-factor
transpiring for quite some time before. In particular, authentication remains unenforced. The absence of
we expect to identify more China-nexus intrusion this additional security layer leaves organizations
operations and espionage campaigns that originally susceptible to data breaches of varying degrees
occurred in 2024, or perhaps even prior. What we of severity. Furthermore, the sophistication of
find today is that China-nexus espionage groups are infostealer malware has escalated in recent years,
so good at hiding their tracks, and staying buried with advancements in anti-evasion techniques
in networks for long periods of time, that our teams and capabilities to bypass endpoint detection
sometimes just stumble upon them years after the and response (EDR), rendering them even more
threat actors initially broke into an organization. formidable challenges in the cyber threat landscape.

Cybersecurity Forecast 2025 9


Rising Impact of Democratizing of Cyber
Compromised Identities Capabilities Will Continue
in Hybrid Environments to Lower Barriers to
With today’s hybrid integration of identities that
Entry for Less-Skilled
span on-premises and multi-cloud architectures, and Newer Actors
the overall impact of a compromised identity will
In 2025, organizations will continue to be challenged
result in elevated risks for organizations. In 2025,
by a landscape in which an increasing number of
it is important that organizations align processes,
barriers to entry will be eroded for cyber criminals
security controls, and validation efforts to minimize
and state actors with less sophistication. As more
the overall impact of a single compromised identity
tools, phishing kits, and “as-a-service” resources
resulting in downstream consequences, and also to
incorporate advanced capabilities, less skilled threat
reinforce the strategy of strong authentication.
actors and new entrants into malicious cyber activity
Historically, authentication for an established will have opportunities to carry out operations with
identity was based upon a singular transaction, greater efficiency and skill. From web skimming
which typically consisted of password-based, to multifactor authentication (MFA) bypass, the
single-factor authentication. Now, based on the growing professionalization of such services will
distributed nature of operations, organizations expand the number of threat actors defenders
need to transition from a singular action to one that will have to contend with. Additionally, increasing
includes multiple criteria for validation as part of the experimentation by threat actors with gen AI at
authentication transaction. The multiplier element different parts of the attack lifecycle will also start
should not only include the identity (user) performing playing a greater role in increased efficiencies on the
the authentication request, but can also require adversary side of the security equation.
strong phishing-resistant multifactor authentication
(MFA) verification of the device associated with the
identity, shorter session lifetime (re-validation) when
accessing sensitive resources or applications, and
identity risk reviews and verifications.

Following this model, organizations can not only


enforce proper guardrails to minimize impacts,
but increase the confidence of a successful
authentication transaction correlating to an
authorized and expected activity.

Cybersecurity Forecast 2025 10


Maturing Security Criticality Drives More
Operations in the Cloud Regulations for Cloud
Providers
In 2025, we expect to see more widespread adoption
of cloud-native security information and event We expect that as more critical infrastructure moves
management (SIEM) solutions. Scalability and cost- onto hyperscale cloud services, more and more
effectiveness will drive mass adoption, even by regulators will be directly targeting cloud providers
those hesitating to move away from on-premises around the world rather than just coming through
deployments. We expect SIEM to reemerge as the customers to drive the expected levels of control and
central nervous system to the security operations resilience on the cloud. In 2025, cloud providers are
center (SOC), ingesting everything from cloud going to be dealing with more regulation, and also
logs to endpoint telemetry. Security orchestration, increased expectations. This is appropriate given
automation, and response (SOAR), usually a part the extent of their criticality, and how in general an
of SIEM, will likely move beyond basic playbook increasing number of services have been moving on
execution to handle more complex incident response. to hyperscale cloud, including Google Cloud.
This includes automated malware analysis, phishing
takedowns, and even patching of vulnerabilities
before they’re exploited. Additionally, cloud-specific
More Interest in Web3
risks such as identity and access management (IAM) and Crypto Heists
misconfigurations, serverless vulnerabilities, and
container escapes will be better tackled head-on As Web3 and cryptocurrency organizations continue
with purpose-built tools and strategies. to grow into 2025 and beyond, we expect that
attackers will continue targeting smart contract
vulnerabilities and private key theft to conduct
heists. Web3 organizations are high-value targets for
attackers. Since 2020, there have been hundreds of
Web3 heists reported, which has resulted in over $12
billion in stolen digital assets.

We anticipate Democratic People’s Republic of


Korea (DPRK) threat actors will continue to leverage
social engineering tactics when targeting Web3
organizations, as well as targeting the supply chain
to gain an initial foothold. Web3 companies will
need to invest in enhanced security controls and
24x7 monitoring to help detect attacks earlier in the
lifecycle to help prevent heists.

Cybersecurity Forecast 2025 11


Faster Exploitation and Preparing for an Age
More Vendors Targeted of Post-Quantum
In our 2024 analysis of exploited vulnerabilities
Cryptography
disclosed in 2023, the average time-to-exploit (TTE), Many organizations in 2025 will be starting their
which we define as the time between disclosure and journeys towards adopting new post-quantum
exploitation of a vulnerability, was five days, down cryptography standards finalized by the National
significantly from our previous analysis’ average Institute of Standards and Technology (NIST) in 2024.
of 32 days. This pace of exploitation is expected to The latest guidance from NIST on quantum-safe
continue, if not quicken, in 2025 and beyond. This encryption/key transport and cryptographic signing
average continues to be driven by both n-day and is designed to help mitigate attacks by adversaries
zero-day usage, as both remain lucrative to threat with large-scale quantum computers. These attacks
actors. Even when n-day exploitation timelines are could potentially break encryption, and ultimately
observed alone, we still see faster exploitation, as compromise sensitive data.
seen by the drop from 23 n-days first exploited after
six months in 2021-2022, to only two first exploited Although quantum threats likely won’t have a
after six months in 2023. widespread impact next year, organizations in 2025
will need to start understanding the risks posed by
Additionally, the number and variety of targeted quantum computing, planning their transitions to
vendors in these attacks is expected to continue quantum-resistant solutions, inventorying where they
growing in 2025 and beyond, as we have seen are using cryptography, regularly rotating encryption
increases in the number of vendors targeted for keys, and generally staying informed of quantum
exploitation almost every year since 2018. The developments using threat intelligence and
number of targeted vendors reached an all-time high other guidance.
of 56 in 2023, over double the 25 observed in 2018.
We expect that the number of targeted vendors will
continue expanding beyond historically observed
targets, requiring more awareness around attack
surfaces and their components.

Cybersecurity Forecast 2025 12


EMEA
Forecasts
A Pivotal Year for Compliance
NIS2, the updated Network and Information Security Directive, will
significantly reshape cybersecurity practices across EMEA in 2025. It
introduces stricter security requirements, and expands its scope to
include a wider range of sectors and organizations, including essential and
important entities. This means more businesses will need to implement
robust security measures, conduct risk assessments, and report incidents
promptly. NIS2 emphasizes risk management, incident response, and
supply chain security, forcing organizations to adopt a more proactive and
comprehensive approach. Increased oversight and enforcement will lead to
greater accountability for cybersecurity failures. Organizations will need to
invest in staff training, security technologies, and incident response planning
to comply with NIS2. The directive promotes collaboration and information
sharing, fostering a stronger cybersecurity ecosystem in EMEA. NIS2 aims to
harmonize cybersecurity standards across member states, improving overall
resilience against cyber threats. By setting a higher bar for security practices,
NIS2 will drive significant improvements in cybersecurity posture across the
EMEA region.

Cybersecurity Forecast 2025 13


Geopolitical Conflicts More Focus on
Drive Threat Activity Cloud Security
Geopolitical conflicts will continue to be a major In 2025, cloud security will be paramount for EMEA
driver of 2025 threat activity in EMEA, impacting enterprises. While cloud security is a global concern,
entities all across the region. The ongoing conflict Mandiant incident response teams have observed
in Ukraine and the persistent tensions in the Middle a significant increase in EMEA investigations
East are key factors contributing to this trend, and stemming from misconfigurations, inadequate
so long as they continue into next year, organizations monitoring, credential reuse, and weak security
and countries in the region will feel direct and practices within unmanaged cloud environments.
indirect effects. This trend is expected to continue next year.
Organizations in the EMEA region are experiencing
While private entities and individuals have limited
rapid cloud adoption, and the division of
direct influence over geopolitical challenges,
responsibilities between business owners, DevOps,
countries that align themselves with one side or
and SecOps teams have a tendency to exacerbate
another in conflicts can face consequences. One
these issues and challenges. Organizations in the
of the ways we see this is through the targeting
EMEA region will have to prioritize cloud security
of digital services and infrastructure. Increasing
to protect sensitive data and maintain customer
reliance on these technologies has made them more
trust. They will also need to invest in robust security
attractive targets to opposition, and consequently
solutions, implement stricter access controls, and
more vulnerable to disruption.
enhance monitoring capabilities.
There is no evidence to suggest this trend will
decrease in 2025. We anticipate more targeting of
digital services by opposing patriotic forces, such as
hacktivists or state-sponsored campaigns that disrupt
or compromise digital infrastructure. Therefore,
organizations must prioritize understanding and
staying informed about geopolitical events as they
unfold in the cyber domain.

Cybersecurity Forecast 2025 14


JAPAC
Forecasts
North Korea Threat Actors Setting Their
Sights on JAPAC
As cryptocurrency investments continue to grow in the JAPAC region, we
expect to see increased targeting of cryptocurrency exchanges, particularly
from North Korean threat actors. Throughout 2024, North Korea has
continued its attacks against cryptocurrency exchanges, and in September
2024 the FBI issued an alert on the problem. JAPAC has among the highest
adoption and growth rates for cryptocurrencies, and this past year there
were reports of significant cryptocurrency breaches in the region—including
theft of tens and hundreds of millions of dollars worth of digital assets.

One of the ways North Korea is targeting JAPAC countries is by


impersonating remote IT workers. The U.S. Department of Justice
and other agencies warned “of attempts by Democratic People’s Republic
of Korea (DPRK, a.k.a. North Korea) information technology (IT) workers to
obtain employment while posing as non-North Korean nationals”. As part
of these operations, some of the fake IT workers worked for organizations
located in JAPAC countries.

Cybersecurity Forecast 2025 15


Chinese-Controlled Cyber Criminals in Southeast
Websites Posing as Local Asia Continue to Innovate
News Outlets Target In 2025, we anticipate seeing continued innovation
Global Audiences with by Southeast Asia cyber criminals. A new report by
Pro-Beijing Content the United Nations Office on Drugs and Crime found
that Asian crime syndicates are now integrating new
In 2022, we exposed the HaiEnergy campaign, service-based business models and technologies—
which consisted of a network of 72 suspected including malware, gen AI, and deepfakes—into their
inauthentic news sites and a number of suspected operations, while establishing new underground
inauthentic social media assets, used to markets and cryptocurrency solutions for their
disseminate content strategically aligned with the money laundering needs. According to the report,
political interests of the People’s Republic of China organized cyber crime in the region is evolving
(PRC). The sites published content in 11 languages. rapidly, and this trend will likely lead to an escalation
Since then, we have uncovered at least two other of activity in the JAPAC region. It is critical for
campaigns where third-party companies or PR governments and enterprises to formalize regular
firms have been hired to promote government intelligence-sharing to understand these tactics,
narratives via fictitious “Local News” outlets. techniques and procedures in greater detail, and to
be able to trace it to illicit financial flows.
This threat poses a heightened risk of inadvertent
amplification by other local media outlets owing
to a lack of due diligence or readers who chance
upon these fake “Local News” outlets. Even though
these campaigns have not been very effective in
changing the global perception towards China in
2024, we believe these campaigns will persist into
2025, and it is crucial that we continue to uncover
and track these fake news outlets to educate
global readers. Therefore, organizations must
prioritize understanding and staying informed
about geopolitical events as they unfold in the
cyber domain.

Cybersecurity Forecast 2025 16


Conclusion SPECIAL REPORT: MANDIANT M-TRENDS 2023 17

GO
“2025 is going to be the In 2025, the cybersecurity industry will continue to innovate,
year when AI moves from while organizations will face evolving challenges across the
pilots and prototypes into
large-scale adoption.”
vast threat landscape.

Phil Venables. Rapid advancements in technology, particularly in artificial


VP, TI Security & CISO, intelligence, are reshaping tactics for both defenders and
Google Cloud adversaries. While AI is rapidly bringing new tools for threat
detection and response, it also provides malicious actors with
powerful capabilities for social engineering, disinformation,

R and other attacks.

We will continue to see activity from The Big Four—Russia,


China, Iran, and North Korea—who will pursue their respective
geopolitical goals through cyber espionage, disruption, and
BA
influence operations. Additionally, ransomware and multifaceted
extortion, as well as the proliferation of infostealer malware,
pose significant risks to organizations worldwide.

In 2025, organizations must prioritize a proactive and


comprehensive approach to cybersecurity. This includes
adopting cloud-native security solutions, implementing robust
identity and access management controls, and staying ahead
of emerging threats through continuous monitoring and threat
intelligence. It also means preparing for the post-quantum
EM

cryptography era, and complying with evolving regulations.

The Cybersecurity Forecast 2025 report aims to equip


organizations with the insights and knowledge they need to
navigate this complex landscape. By understanding evolving
trends and potential threats, organizations can strengthen their
defenses, and build a more resilient future.

Cybersecurity Forecast 2025 17


Contributors
The Cybersecurity Forecast 2025 Many other security experts
report features insights from our contributed to the report:
security leaders:
Tufail Ahmed
Charles Carmakal Dan Black
Mandiant CTO, Google Cloud
Sarah Bock
Sandra Joyce Michelle Cantos
VP of Google Threat Intelligence
Casey Charrier
at Google Cloud
Anton Chuvakin
Sunil Potti
VP/GM, Google Cloud Security Jamie Collier
Jennifer Fernick
Phil Venables
VP, TI Security & CISO, Google Cloud Felix Gröbert
David Grout
Adrian Hernandez
Cris Brafman Kittner
Steve Ledzian
Yihao Lim
Keith Lunden
David Mainor
John McGuiness
Luke McNamara
Matthew McWhirt
Jens Monrad
Mathew Potaczek
Mike Raggi
Kelli Vanderlee
Alden Wahlstrom
Robert Wallace
Jess Xia

Cybersecurity Forecast 2025 18


SPECIAL REPORT: MANDIANT M-TRENDS 2023 19

GO
R
BA
EM

For more information, visit cloud.google.com

You might also like