2025 Threatscape report
Common Information
Type Value
UUID dcab27e4-6917-4e8c-8e83-1bd4782555d9
Fingerprint b5f180999c81c719
Analysis status DONE
Considered CTI value 2
Text language
Published Dec. 12, 2024, 3:01 p.m.
Added to db Dec. 12, 2024, 3:34 p.m.
Last updated Dec. 18, 2024, 5:12 p.m.
Headline 2025 Threatscape report
Title 2025 Threatscape report
Detected Hints/Tags/Attributes 167/3/128
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 422 Inside The Lab - HarfangLab https://harfanglab.io/insidethelab/feed 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 63
cve-2024-0012
Details CVE 55
cve-2024-9474
Details Domain 6
harfanglab.io
Details Domain 27
www.gov.uk
Details Domain 51
home.treasury.gov
Details Domain 2
vsquare.org
Details Domain 10
www.foreignaffairs.com
Details Domain 5
www.sgdsn.gouv.fr
Details Domain 64
cloud.google.com
Details Domain 13
services.google.com
Details Domain 42
www.enisa.europa.eu
Details Domain 9
www.csis.org
Details Domain 5
blog.knowbe4.com
Details Domain 303
thehackernews.com
Details Domain 129
www.sentinelone.com
Details Domain 635
en.wikipedia.org
Details Domain 106
therecord.media
Details Domain 552
www.recordedfuture.com
Details Domain 1
www.newgeopolitics.org
Details Domain 28
www.forescout.com
Details Domain 240
unit42.paloaltonetworks.com
Details Domain 16
www.f5.com
Details Domain 147
research.checkpoint.com
Details Domain 2
protectai.com
Details Domain 115
www.justice.gov
Details Domain 20
cyberint.com
Details Domain 1
www.openkritis.de
Details Domain 18
www.europarl.europa.eu
Details Domain 1
mc.nato.int
Details Domain 131
www.nytimes.com
Details Domain 55
blog.cloudflare.com
Details Domain 36
www.akamai.com
Details Domain 184
www.wired.com
Details Domain 24
www.sonatype.com
Details Domain 59
www.theregister.com
Details Domain 2
blog.coinbase.com
Details Domain 1
deploy.equinix.com
Details Domain 146
www.darkreading.com
Details File 1
paris2024games_en_0.pdf
Details File 3
apt44-unearthing-sandworm.pdf
Details File 1
2024-02-28-joint-cyber-security-advisory.pdf
Details File 264
www.cs
Details File 1
north-korean-it-workers-in-western.html
Details File 1
influence-and-cyber-operations-an-update_october-2024.pdf
Details File 1
exit-scam-blackcat-ransomware-group.html
Details File 1
german_cip_infrastructure_kritis.html
Details File 2
689333_en.pdf
Details File 2
ukraine-russia-starlink.html
Details File 3
csrb_review_of_the_summer_2023_meo_intrusion_final_508c.pdf
Details Mandiant Uncategorized Groups 34
UNC5537
Details Microsoft Threat Actor Naming Taxonomy (Groups in development) 117
Storm-0558
Details Microsoft Threat Actor Naming Taxonomy (Groups in development) 1
storm-0940
Details Threat Actor Identifier - APT 149
APT40
Details Threat Actor Identifier - APT 837
APT28
Details Threat Actor Identifier - APT 27
APT44
Details Url 1
https://harfanglab.io/insidethelab/2024-cyber-threatscape-predictions
Details Url 1
https://harfanglab.io/insidethelab/doppelganger-operations-europe-us
Details Url 1
https://www.gov.uk/government/news/uk-sanctions-putins-interference-actors
Details Url 1
https://home.treasury.gov/news/press-releases/jy2195
Details Url 3
https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence
Details Url 1
https://vsquare.org/leaked-files-putin-troll-factory-russia-european-elections-factory-of-fakes
Details Url 1
https://www.foreignaffairs.com/russia/lies-russia-tells-itself
Details Url 1
https://www.sgdsn.gouv.fr/files/files/publications/20240919_np_sgdsn_viginum_summary
Details Url 3
https://blogs.microsoft.com/on-the-issues/2024/06/02/russia-cyber-bots-disinformation-2024-paris-olympics
Details Url 1
https://cloud.google.com/blog/topics/threat-intelligence/cyber-threats-2024-paris-olympics
Details Url 3
https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf
Details Url 2
https://cloud.google.com/blog/topics/threat-intelligence/global-revival-of-hacktivism
Details Url 1
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024
Details Url 1
https://blog.checkpoint.com/security/hacktivists-call-for-release-of-telegram-founder-with-freedurov-ddos-campaign
Details Url 1
https://www.verfassungsschutz.de/shareddocs/publikationen/de/cyberabwehr/2024-02-28-joint-cyber-security-advisory.pdf
Details Url 2
https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
Details Url 1
https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/apt40-advisory-prc-mss-tradecraft-in-action
Details Url 1
https://msrc.microsoft.com/blog/2024/01/microsoft-actions-following-attack-by-nation-state-actor-midnight-blizzard
Details Url 1
https://www.linkedin.com/posts/charlescarmakal_mandiant-part-of-google-cloud-just-published-activity-7244027392610955267-qw1o
Details Url 2
https://cloud.google.com/blog/topics/threat-intelligence/mitigating-dprk-it-worker-threat
Details Url 1
https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us
Details Url 1
https://thehackernews.com/2024/10/north-korean-it-workers-in-western.html
Details Url 1
https://www.dragos.com/resources/reports/intelligence-brief-impact-of-frostygoop-modbus-malware-on-connected-ot-systems
Details Url 2
https://www.sentinelone.com/labs/acidpour-new-embedded-wiper-variant-of-acidrain-appears-in-ukraine
Details Url 1
https://en.wikipedia.org/wiki/2024_lebanon_electronic_device_attacks
Details Url 1
https://therecord.media/russian-hackers-target-energy-facilities-ukraine
Details Url 1
https://www.recordedfuture.com/research/russian-sabotage-activities-escalate-amid-fraught-tensions
Details Url 1
https://en.wikipedia.org/wiki/october_2024_iranian_strikes_against_israel
Details Url 1
https://www.newgeopolitics.org/2024/06/10/ukrainian-drones-vs-russian-jamming
Details Url 1
https://www.defenseone.com/technology/2024/10/us-made-jam-resistant-drones-are-helping-ukrainians-cut-through-russia-ew/400735
Details Url 1
https://www.forescout.com/resources/2024-riskiest-connected-devices
Details Url 1
https://www.sonicwall.com/blog/sonicwall-2024-mid-year-cyber-threat-report-iot-madness-powershell-problems-and-more
Details Url 6
https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474
Details Url 1
https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network
Details Url 1
https://www.f5.com/labs/articles/threat-intelligence/2024-ddos-attack-trends
Details Url 1
https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-bug-in-60-000-exposed-eol-modems
Details Url 1
https://www.justice.gov/opa/pr/us-government-disrupts-botnet-peoples-republic-china-used-conceal-hacking-critical
Details Url 1
https://www.computerweekly.com/news/366615485/chinas-volt-typhoon-rebuilds-botnet-in-wake-of-takedown
Details Url 4
https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-botnet-controlled-russian
Details Url 1
https://harfanglab.io/insidethelab/compromised-routers-infrastructure-target-europe-caucasus
Details Url 2
https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity
Details Url 1
https://harfanglab.io/insidethelab/samecoin-malware-hamas
Details Url 1
https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling
Details Url 1
https://protectai.com/threat-research/2024-october-vulnerability-report
Details Url 1
https://cdn.openai.com/threat-intelligence-reports/influence-and-cyber-operations-an-update_october-2024.pdf
Details Url 1
https://www.trmlabs.com/post/ransomware-in-2024-latest-trends-mounting-threats-and-the-government-response
Details Url 1
https://www.justice.gov/opa/pr/us-and-uk-disrupt-lockbit-ransomware-variant
Details Url 1
https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant
Details Url 1
https://thehackernews.com/2024/03/exit-scam-blackcat-ransomware-group.html
Details Url 1
https://cyberint.com/blog/research/ransomware-trends-2024-report
Details Url 1
https://www.openkritis.de/it-sicherheitsgesetz/german_cip_infrastructure_kritis.html
Details Url 1
https://home-affairs.ec.europa.eu/news/critical-entities-resilience-directive-enters-application-ensure-protection-critical-infrastructure-2024-10-23_en
Details Url 2
https://www.europarl.europa.eu/regdata/etudes/brie/2021/689333/eprs_bri(2021)689333_en.pdf
Details Url 1
https://mc.nato.int/media-centre/news/2024/nato-officially-launches-new-nmcscui
Details Url 1
https://en.wikipedia.org/wiki/starlink_in_the_russo-ukrainian_war
Details Url 2
https://www.nytimes.com/2024/05/24/technology/ukraine-russia-starlink.html
Details Url 2
https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion
Details Url 2
https://www.cisa.gov/sites/default/files/2024-04/csrb_review_of_the_summer_2023_meo_intrusion_final_508c.pdf
Details Url 1
https://homeland.house.gov/hearing/a-cascade-of-security-failures-assessing-microsoft-corporations-cybersecurity-shortfalls-and-the-implications-for-homeland-security
Details Url 3
https://blog.cloudflare.com/cyber-attacks-in-the-israel-hamas-war
Details Url 1
https://www.akamai.com/blog/security/akamai-blocked-419-tb-of-malicious-traffic
Details Url 1
https://www.csis.org/analysis/sovereignty-and-evolution-internet-ideology
Details Url 1
https://www.csis.org/analysis/balancing-ledger-export-controls-us-chip-technology-china
Details Url 1
https://www.wired.com/story/xz-backdoor-everything-you-need-to-know
Details Url 1
https://www.sonatype.com/blog/the-curious-case-of-csrf-magic-a-case-study-in-supply-chain-poisoning
Details Url 1
https://unit42.paloaltonetworks.com/privilege-escalation-llm-model-exfil-vertex-ai
Details Url 1
https://www.theregister.com/2024/10/02/ai_agent_trashes_pc
Details Url 3
https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild
Details Url 1
https://blog.coinbase.com/celer-bridge-incident-analysis-895a9fc77e57
Details Url 1
https://blog.cloudflare.com/cloudflare-1111-incident-on-june-27-2024
Details Url 1
https://deploy.equinix.com/blog/detect-and-prevent-bgp-hijacking-best-practices
Details Url 1
https://www.darkreading.com/cyber-risk/101-why-bgp-hijacking-just-won-t-die
Details Url 1
https://www.theregister.com/2024/09/03/white_house_bgp_security