Self Assessment

CYFIRMA RESEARCH : MONTHLY THREAT ASSESSMENT REPORT

Published On : 2025-10-27
Share :
CYFIRMA RESEARCH : MONTHLY THREAT ASSESSMENT REPORT

EXECUTIVE SUMMARY

In September 2025, the global cyber threat environment remained guarded yet volatile, marked by a steady cadence of state-sponsored espionage, ransomware evolution, and geopolitical cyber manoeuvring. China and Russia intensified espionage and hybrid operations across Europe and Asia, while Iran and North Korea sustained financially and politically motivated campaigns targeting defense, finance, and infrastructure sectors. Manufacturing emerged as the month’s most targeted industry, with ransomware groups like Play and Akira driving disruptive attacks and exploiting third-party dependencies. Dark Web chatter shifted toward AI-enhanced phishing, Initial Access Broker collaboration, and pre-positioning for Q4 campaigns, highlighting the convergence of criminal and state ecosystems. Simultaneously, vulnerability exploitation accelerated, with active abuse of Fortinet and Apache flaws and weaponization timelines shrinking to mere days. Amid rising AI weaponization, supply-chain infiltration, and geopolitical tensions, organizations face a complex and adaptive threat landscape demanding sustained vigilance, rapid patching discipline, and intelligence-led defense strategies.

RISK INTELLIGENCE SUMMARY

The Global threat level remains at GUARDED. While activity across APT, ransomware, and hacktivist fronts persists, no strategically significant escalation warrants an increase. Cross-domain coordination between state and criminal ecosystems is rising, suggesting elevated vigilance heading into Q4.

APT LANDSCAPE ASSESSMENT

  • China-nexus groups (Stately Taurus, APT41) continue espionage in APAC and Europe.
  • Russia-linked actors (APT28, Sandworm) sustain hybrid attacks on energy and logistics.
  • Iran focuses on regional wiper-style operations; North Korea (Lazarus, BlueNoroff) targets crypto and defense.

VULNERABILITY INTELLIGENCE ASSESSMENT

Unlike earlier months dominated by Microsoft, September’s KEVs span Cisco, Linux, Sitecore, TP-Link, Meta, Git, Citrix, and Trend Micro. This diversification signals a broadening threat surface targeting network appliances, web platforms, and developer tools.

RANSOMWARE ACTIVITY ASSESSMENT

Remains elevated. Qilin and Play exploit RMM/VPN flaws; Fog leverages Google GC2 for persistence; SafePay and Anubis pivot to data-first extortion and destructive payloads.

GEOPOLITICAL ASSESSMENT

The Israel–Iran conflict fuels DDoS and data leaks, but has a limited infrastructure impact. Europe’s digital sovereignty shift introduces temporary exposure, while Russia’s hybrid warfare continues to shape global cyber posture.

DARK WEB CHATTER ASSESSMENT

Increased IAB collaboration and AI-powered phishing discussions. Surge in Southeast Asia network access sales and ransomware affiliate recruitment.

GLOBAL THREAT ASSESSMENT

Global cyber activity remains volatile but stable. Ransomware, AI weaponization, and state-aligned espionage sustain a GUARDED posture, with heightened monitoring recommended through year-end.

MONTHLY INDUSTRY HIGHLIGHT MANUFACTURING

Adversaries aggressively target manufacturing because the consequences extend beyond data loss to physical disruption and economic devastation. Motivations center on crippling critical production and stealing proprietary advantage.

APT ACTIVITY

We observed evidence of Chinese state-sponsored activity focusing on the sector in Asia. A new variant of the PlugX backdoor, attributed with medium confidence to the Naikon cyber espionage group, was identified targeting the manufacturing and telecommunications sectors in Central and South Asian countries. This activity seeks to compromise systems for intellectual property theft.

NOTABLE INCIDENTS & DISRUPTIONS

September was defined by high-impact operational incidents across the automotive and industrial base:

  • Jaguar Land Rover (JLR): The attack, claimed by Scattered Lapsus$ Hunters (linked to Scattered Spider), forced the complete shutdown of global production since late August, extending throughout September. This massive disruption put thousands of jobs and UK goods exports at risk.
  • Stellantis: The automaker confirmed a data breach resulting from a Salesforce compromise originating in the Salesloft/Drift third-party supply chain incident. Exposed data included internal emails and personal data of employees, suppliers, customers, and dealers.
  • Bridgestone & Asahi: Bridgestone confirmed a cyber attack disrupted its North American manufacturing facilities. Japanese brewing giant Asahi Group Holdings was also hit by a cyber attack in late September.

RANSOMWARE ACTIVITY

The manufacturing industry remains the hardest hit business sector for ransomware. September saw 66 confirmed incidents globally, reflecting an elevated threat level.

  • Group Activity: Play surged to lead sector targeting with 14 attacks (a sharp escalation), followed closely by Akira (11 attacks). The aggressive new group, The Gentlemen, launched 6 attacks in the sector.
  • Regional Focus: The United States accounted for the majority of observed manufacturing activity (37 incidents), with notable activity also recorded in Switzerland, France, and Germany (3 incidents each).

OTHER DEVELOPMENTS

Third-Party and Supply Chain Risk: Attacks continue to exploit weaknesses in the software supply chain. The Salesforce/Salesloft/Drift compromise (attributed to ShinyHunters/UNC6395) impacted multiple organizations, including Stellantis, demonstrating how external SaaS vendors are exploited to reach major manufacturers. Additionally, the ransomware attack that crippled Collins Aerospace’s check-in system caused major delays at European airports, highlighting risks to the broader industrial supply base.

ERP/Zero-Day Extortion: Threat actors affiliated with CL0P initiated a large-scale extortion campaign targeting executives regarding alleged data theft from Oracle E-Business Suite (EBS) environments. EBS systems are critical to manufacturing operations (ERP systems), and the zero-day exploitation likely began in August 2025.

Lack of Insurance: Critically, JLR reportedly had no active cyber insurance coverage at the time of its devastating attack, necessitating an unprecedented £1.5 billion UK government loan guarantee to manage the crisis.

ADVANCED PERSISTENT THREAT ASSESSMENT

ASSESSMENT

As of late 2025, global APT activity remains elevated, driven by intensifying geopolitical tensions and rapid cyber-capability expansion among major powers. China-aligned actors continue wide-scale espionage across government, telecom, and critical infrastructure, increasingly targeting Europe and APAC. Russia-linked groups sustain aggressive campaigns in Ukraine and Europe, mixing cyber-sabotage with disinformation and credential theft. Iranian operators focus on Israel and Western assets, conducting espionage and influence operations, while North Korea pursues financially motivated and espionage-driven attacks using supply-chain infiltration and malware implants. The Middle East and Asia-Pacific remain hotspots, with critical infrastructure, defense, and research sectors facing persistent intrusion attempts. Overall, APT operations are becoming more coordinated, stealthy, and hybrid, blurring lines between espionage, crime, and warfare, and posing ongoing risks to global digital stability.

CHINA

China continues to leverage zero-day and n-day vulnerabilities for intelligence collection and strategic espionage, maintaining persistent access to government and critical infrastructure networks.

  • China-nexus APT groups, including Stately Taurus (Mustang Panda) and Mission2025 (APT41), were observed conducting large-scale campaigns across Asia and Europe, focusing on diplomatic and defense entities.
  • PlushDaemon conducted a supply-chain compromise via a South Korean VPN installer to deliver the SlowStepper backdoor, later used for credential theft and reconnaissance.
  • Chinese APTs demonstrated hybrid intrusion tactics combining supply chain attacks, malware obfuscation, and living-off-the-land binaries (LOLBins) to evade detection and maintain long-term intelligence collection capabilities.

NORTH KOREA

North Korean APT groups maintained a dual focus on cyber espionage and financial theft, sustaining a key funding channel for the regime’s strategic programs.

  • Kimsuky expanded intelligence collection targeting policy think tanks and nuclear research bodies using customized spear-phishing documents.
  • BlueNoroff executed Operation CashTunnel, laundering stolen crypto through a network of DeFi mixers and exchanges.
  • North Korean operations showcased sophisticated social engineering, rapid infrastructure rotation, and use of legitimate cloud services for C2 obfuscation.

RUSSIA

Russia-linked threat actors sustained hybrid cyber operations blending espionage, sabotage, and influence campaigns, primarily targeting Europe and NATO-aligned nations.

  • APT28 (Fancy Bear) and Sandworm continued exploiting vulnerabilities in Microsoft Exchange and WinRAR to deliver infostealers and wipers within energy and logistics sectors.
  • A new campaign dubbed Operation FrostStrike leveraged malware-laced PDFs masquerading as EU defense reports to compromise policy institutes.
  • Callisto Group was observed expanding credential theft operations against diplomatic entities in Eastern Europe and the Baltics.

IRAN

  • Iranian APTs intensified regional espionage and disruptive operations, focusing on Israel, the Gulf states, and Western defense contractors.
  • Charming Kitten (APT35) launched phishing and credential harvesting campaigns using fake security advisories and journalist personas.
  • Several Iranian clusters were linked to cyber-enabled influence operations, spreading propaganda aligned with Tehran’s regional objectives.

APT SPOTLIGHT

NORTH KOREA

CURRENT THREAT POSTURE

  • BlueNoroff executed large-scale cryptocurrency theft under Operation CashTunnel, exploiting DeFi platforms and laundering assets through mixers and privacy coins.
  • Kimsuky expanded espionage activity against South Korean ministries and nuclear policy think tanks, using malicious Word documents for credential harvesting.
  • North Korean APTs were also linked to malware-laden npm packages, spreading via open-source software repositories to collect system reconnaissance data.
  • Andariel was observed exploiting Apache ActiveMQ vulnerabilities for persistence within telecom and defense supply chains.
  • Lazarus Group conducted spear-phishing campaigns targeting Japanese defense contractors

STATE-LINKED THREAT CLUSTERS

  • Lazarus Group (APT38): Core DPRK cyber unit responsible for espionage, crypto theft, and disruptive ops.
  • Kimsuky (APT43): Espionage-focused actor targeting policy institutes, academics, and governments.
  • BlueNoroff: Sub-cluster of Lazarus focused on financial theft and cryptocurrency exchange attacks.
  • Andariel: Conducts intrusions in defense and critical infrastructure for access and persistence.
  • UNC4736 (TraderTraitor): Engages in social engineering campaigns targeting blockchain developers.

Victim Industry Landscape
Financial Services,
Defense and Aerospace,
Government and Policy Institutes,
Telecommunications,
Cryptocurrency Exchanges

Target Area
Sensitive Data, Credentials, Endpoints.

Operational Drivers
Financial Gain (crypto theft, ransomware),
Intelligence Collection (espionage on defense and policy entities),
Geopolitical Influence and Strategic Advantage.

Tooling and Infrastructure
North Korean groups maintain high operational discipline, combining custom malware development, social engineering, and supply-chain infiltration. They display adaptive TTPs with a strong focus on financial gain to support state programs.

Recent Intrusions of Note
Espionage operations observed against the Japanese Defense Intelligence Headquarters and the South Korean MoD, over $45M in cryptocurrency losses linked to Lazarus and BlueNoroff campaigns in Q3 2025.

IRAN

CURRENT THREAT POSTURE

  • A pro-Iran hacktivist cluster claimed responsibility for disruptive campaigns against Israeli payment gateways and media outlets; some incidents involved data leaks and DDoS.
  • Iranian-linked actors intensified phishing and credential-harvesting campaigns against Israeli journalists, security researchers, and government personnel using fake conferencing and cloud-service prompts.
  • Iranian operators exploited exposed CCTV/IoT systems to collect real-time intelligence in areas of interest.
  • Financially-motivated compromises targeted regional banking and payment infrastructure, with subsequent data exposure and extortion attempts reported.
  • Multiple campaigns were observed delivering wiper-style malware disguised as ransomware against infrastructure and private sector targets in the region.

STATE-LINKED THREAT CLUSTERS

  • APT33 / Elfin: Aviation and energy sector targeting; opportunistic exploitation of n-day vulnerabilities.
  • APT42: Aggressive campaigner against Israeli tech and media targets; conducts credential harvesting and targeted intrusion.
  • MuddyWater / Domestic Clusters: Operational groups conducting targeted intrusions and lateral movement in government and telecom networks.
  • Charming Kitten (APT35): Long-running espionage cluster focused on credential theft, influence, and targeting dissidents/journalists.

Victim Industry Landscape
Financial Services,
Defense and Aerospace,
Government and Policy Institutes,
Telecommunications,
Cryptocurrency Exchanges

Target Area
Sensitive Data, Credentials, Endpoints.

Operational Drivers
Strategic Intelligence Collection, Regional Political/Ideological Objectives, Disruption & Denial,
Financial Gain / Fundraising.

Tooling and Infrastructure
Iranian groups demonstrate
moderate-to-high operational capability: proficient in social engineering, custom and commodity malware, wiper and extortion tooling, and exploitation of internet-exposed devices.

Recent Intrusions of Note
Multiple credential-harvesting campaigns targeting Israeli media and cybersecurity professionals, reported compromises of regional payment processors and associated data exposures.

RANSOMWARE THREAT ASSESSMENT: SEPTEMBER 2025

STEADY ACTIVITY, SHARPER PRECISION
Ransomware volumes held steady through September, but the operational profile shifted to fewer opportunistic hits, more targeted, high-value breaches emphasizing disruption over scale.

SECTOR EXPANSION BEYOND MANUFACTURING
Manufacturing remains the year’s most affected sector, but September saw growth in attacks on government, business services, retail, and healthcare, signaling a pivot toward sectors with sensitive data and weaker segmentation controls.

ACCESS AND PERSISTENCE AT THE CORE
VPNs, identity services, and hypervisors are the dominant entry points. The shift toward MFA theft and ESXi exploitation highlights the erosion of perimeter-based defenses and the growing importance of identity and virtualization security.

GEOPOLITICAL AND REGIONAL FOCUS
Europe (Germany, France, UK, Spain, Italy) remained the main theater of activity, with sustained secondary targeting in South Korea, Australia, and the Middle East, reflecting both economic incentives and affiliate reach.

Evolving Tradecraft and Innovation
Major groups demonstrated technical escalation:

  • Akira exploited MFA bypasses via OTP seed theft.
  • Scattered Spider merged AI-assisted vishing with Azure AD abuse.
  • MalTerminal debuted AI-generated dynamic payloads, erasing static detection.
  • HybridPetya weaponized firmware-level (UEFI) encryption, making recovery nearly impossible.

Strategic Implication
The ransomware ecosystem is professionalizing, adopting AI-assisted payload generation, firmware persistence, and modular loaders. Organizations must evolve beyond patching cycles to integrate identity resilience, hardware integrity checks, and rapid recovery readiness as core business risk controls.

Monthly Ransomware Trends: 2025

Ransomware Victims Industry Trend

UNDERGROUND & DARK WEB CHATTER ASSESSMENT SEPTEMBER 2025

SHIFT FROM “ATTACKS” TO “ACCESS AND MONETIZATION.”
Mentions of data breaches and leaks surged (up 58% since July), while overt attack chatter like ransomware promotions, claimed hacks, and web exploits declined. Threat actors are moving toward quiet data monetization, signaling a maturing, profit-driven underground economy.

FINANCE AND TELECOMMUNICATIONS REMAIN PRIME TARGETS.
Chatter around Finance (4,189 posts) and Telecom & Media (4,900) continued rising—reflecting sustained targeting of data-rich, high-interconnectivity sectors. Both are essential entry points for lateral attacks across partner ecosystems.

RANSOMWARE NARRATIVES PERSIST BUT ARE MORE COVERT.
Ransomware mentions persist, yet most discussions now occur within data sale and negotiation threads instead of public leak sites—evidence of a shift to private extortion models emphasizing stealth and operational discretion.

INITIAL ACCESS BROKERS (IABS) DOMINATE ECOSYSTEM CHATTER.
The growth in breach/leak discussions corresponds with increased IAB activity selling VPN, SSO, and RDP access across critical sectors. This is a leading indicator of future ransomware and espionage campaigns, often preceding attacks by weeks.

Strategic Implication
Cybercriminal operations are transitioning from “public disruption” to data commoditization and stealth access trade. Organizations must strengthen identity governance, data loss monitoring, and third-party oversight, treating Dark Web chatter as an early-warning signal, not an after-incident reflection.

Underground & Dark Web Chatter by Industry

Underground & Dark Web Chatter by Categories

GEOPOLITICAL ASSESSMENT

POLITICAL
NATO strengthens defenses on satellites, cables, and supply chains. Adversaries will shift to targeting human systems, zero-days, cloud, and third-party services. As NATO moves more assertively in cyber (or treats cyber as warfare), adversaries may respond more aggressively, increasing state-on-state cyber conflict. The increase in investment in cyberspace could cause economic strains on smaller allies, which could delay implementations, creating temporary vulnerabilities.

World Economic Forum’s report, influenced by international dialogues at Davos, highlights geopolitical turmoil as a driver for cyber risks, with one-third of CEOs citing espionage as a top concern. Drives regulatory harmonization, expanding cyberspace governance, but complicating compliance for global firms. If unaddressed, it could lead to a 35% rise in cyber claims as predicted by insurers, fueling a broader “cyber arms build-up.”

TECHNOLOGICAL
Europe’s push for digital sovereignty continues to accelerate amid escalating US-EU trade tensions under the Trump administration, including 145% tariffs on Chinese imports affecting global supply chains and heightened fears of US data access via laws like the CLOUD Act. Several EU entities and coalitions are advancing divestment from U.S. hyperscalers (Microsoft Azure, AWS, Google Cloud) toward open-source and European-native alternatives. Adversaries may try to exploit gaps during transition, target open-source tools for zero-day exploits, and increase reconnaissance.

Widespread adoption of LLMs and agentic AI frameworks (e.g., multi-tool orchestrators, like elizaOS) continues to transform both enterprise automation and threat actor operations. Ransomware groups, including Akira, BlackCat, and LockBit, increasingly deploy LLM-assisted negotiation bots, phishing generators, and data-leak extortion scripts to enhance efficiency in double-extortion campaigns.

U.S. Rotations: October 10, 2025, marks a pivotal day in global conflicts, with a U.S.-brokered ceasefire in Gaza triggering Israeli troop withdrawals and U.S. deployments, while Russia’s drone-missile barrage on Ukraine escalates hybrid warfare. These movements—de-escalatory in the Middle East but intensifying in Eastern Europe—amplify cyber threats by straining logistics, exposing C4ISR systems, and fueling state-sponsored hacktivism. Globally, insured cyber claims linked to these theaters rose 28% YoY in Q3 2025, driven by supply chain vulnerabilities and disinformation ops.

Proxy and Hacktivist Surges: Iranian/Ukrainian proxies exploit movements for DDoS/ICS hits; EU data sovereignty push (Sep Data Act) fragments defences.

VULNERABILITY INTELLIGENCE ASSESSMENT

THREAT VOLUME STABLE, SEVERITY ELEVATED
While the number of exploited vulnerabilities dropped to 16 in September (below the annual average), nearly half were rated high to critical (CVSS ≥8.0). Attackers are focusing on high-impact, easily automated flaws rather than volume.

DIVERSIFIED VENDOR EXPOSURE
Unlike earlier months dominated by Microsoft, September’s KEVs span Cisco, Linux, Sitecore, TP-Link, Meta, Git, Citrix, and Trend Micro. This diversification signals a broadening threat surface targeting network appliances, web platforms, and developer tools.

RECURRING WEAKNESS PATTERNS
Exploited CVEs clustered around four persistent classes: Missing/Incorrect Authorization (CWE-862/863), Command Injection (CWE-78), Deserialization (CWE-502), and Race Conditions/Link Resolution flaws (CWE-367/436). These remain the most reliable and reusable exploit vectors across industries.

EDGE AND WEB INFRASTRUCTURE AT HIGH RISK
KEVs tied to TP-Link, Citrix, and Sitecore highlight ongoing exploitation of perimeter and web application layers, key enablers of lateral movement, data theft, and ransomware staging.

LEGACY AND SUPPLY-CHAIN EXPOSURE PERSIST
The reappearance of a 2007 Microsoft CVE and newly exploited Git and Linux flaws emphasize the need to manage legacy systems and developer environments as active attack surfaces, not background noise.

Strategic Implication:
Patch velocity, particularly for internet-facing and development infrastructure, remains the single most effective control. September’s KEVs confirm that attackers are refining exploitation of familiar weaknesses faster than defenders are patching them.

VULNERABILITY INTELLIGENCE ASSESSMENT

Known Exploited Vulnerabilities Trends : 2025

Top Targeted Products: 2025

CYFIRMA TERMINOLOGY FRAMEWORK

CYFIRMA applies a five-tier model to assess the likelihood and potential impact of threat activity. Each level reflects a fusion of actor intent, capability, and exploitation opportunity, assessed through multi-source intelligence correlation and vulnerability telemetry.