{"id":107557,"date":"2025-07-30T09:07:13","date_gmt":"2025-07-30T13:07:13","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?page_id=107557"},"modified":"2025-08-01T13:00:09","modified_gmt":"2025-08-01T17:00:09","slug":"2025h1-threat-review","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/","title":{"rendered":"2025H1 Threat Review"},"content":{"rendered":"<h1>2025H1 Threat Review<\/h1>\n<h3>Vulnerabilities, Threat Actors, and Ransomware <\/h3>\n<p>Once again, Forescout Research \u2013 Vedere Labs widens its mid-year lens with a macro look at the most pressing cybersecurity risks to date. From 3,649 ransomware attacks to state-sponsored intrusions to new trends in lateral movement, here are the new threat patterns and cyber attack behavior you need to know right now.<\/p>\n<p>Get the research  get the newsletter<\/p>\n<p>\u00a0<\/p>\n<h2 class=\"c-title\">Year Over Year Increases: By the Numbers<\/h2>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/CISA-KEV-icon.svg\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n80%+<\/h3>\n<p class=\"c-stats__text\">CISA KEV additions<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/Zero-Day-icon.svg\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n46%+<\/h3>\n<p class=\"c-stats__text\">0-day exploits<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/Ransomware-icon.svg\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n36%+<\/h3>\n<p class=\"c-stats__text\">Ransomware attacks<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/Ransomware-per-Day-icon.svg\" class=\"c-stats__img\" loading=\"lazy\"><\/p>\n<h3 class=\"c-stats__numbers\">\n20\/day<\/h3>\n<p class=\"c-stats__text\">Ransomware attacks<\/p>\n<h2 style=\"text-align: center\">137 Threat Actors, Origins, and Countries Targeted<\/h2>\n<p style=\"text-align: center\">China, Russia and Iran have the highest number of threat actors. The US, India, the UK, Germany, and Australia are the countries most targeted by threat actors.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-heatmap-theat-actor-coutries-of-origin.webp\" loading=\"lazy\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-heatmap-top-targeted-countries.webp\" loading=\"lazy\"><\/p>\n<p style=\"text-align:center\"><a href=\"\/blog\/midyear-threat-report-numbers-grow-in-nearly-all-the-wrong-places\/\" title=\"read the blog\" class=\"c-btn c-btn--dblue c-btn--outline u-flex-auto u-flex-initial@sm u-justify-center u-justify-start@sm has-icon icon-arrow-right icon-position-right has-icon-animation icon-animation-fade-in\">read the blog<\/a><\/p>\n<figure class=\"video-player\">\n<\/figure>\n<h2 class=\"c-title \">Key Trends: Attackers Move Across the Network<\/h2>\n<p>What we predicted in our 2022 \u201cR4IoT\u201d research scenario is now a reality: IP cameras and BSD systems are now common targets increasingly used for lateral movement or operational impact in ransomware campaigns. These asset types often fall outside the coverage of traditional endpoint protections. <\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-your-hardware-is-destroyed.jpg\" class=\"u-size-full\" loading=\"lazy\"><\/p>\n<h2 class=\"c-title \">Key Trends: Is It Hacktivism or a State-Sponsored Attack?<\/h2>\n<p>In today\u2019s geo-political landscape, this line is increasingly blurred, often by design. Identity-shifting threat actors use this ambiguity to confuse attribution and complicate response. The image is from the group \u201cAPT Iran\u201d who has claimed many attacks against Israel and the US in 2025, but have not been independently verified.<\/p>\n<h2 class=\"c-title \">Attacks Targeting Industries<\/h2>\n<p>The most targeted industries are government, technology, financial services, telecommunications, and energy. Financial services dropped from second to third place while energy rose from eighth to fifth \u2014 reflecting increased threat activity against this sector. <\/p>\n<h2 class=\"c-title \">Exploited Zero Days by Targeted Vendor<\/h2>\n<p>In 2025H1, 63 vulnerabilities were exploited as 0-days, up from the 43 in 2024H1. These 0-days impacted products from 27 vendors: 2025 is on track to exceed the record 100 exploited 0-days from 2024.<br \/>\nIoMT devices \u2013 pump controllers, medication dispensing systems and workstations \u2013 have some of the most dangerous vulnerabilities \u2013 and highlight healthcare security risks.\n\n<h2 class=\"c-title \">Ransomware Attacks Per Industry<\/h2>\n<p>The top five industries remain in the top 5 with a minor change: Healthcare had more attacks than retail last year. Financial services: +72% more ransomware in 2025H1. Retail increased 66% YoY. Technology rose by 48%. Manufacturing increased by 24%.<\/p>\n<p><a href=\"\/resources\/2025h1-threat-review\/\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-report-cover-shadow-800x600-1.webp\" class=\"u-size-full\" alt=\"2025H1 Threat Review Report Cover Shadow\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">Dive Into the Research<\/h2>\n<p>Stay on top of this year\u2019s trends, so you can know where to focus your cybersecurity and OT defenses. Get all the data and analysis, including:<\/p>\n<ul>\n<li>What\u2019s really happening in state-sponsored activity against OT\/ICS \u2014including a deep dive on \u2018APT Iran\u2019 and shifting identities<\/li>\n<li>Threat actor trends by name, including new threat actor groups and new uses of ClickFix and initial access brokers in infostealer campaigns<\/li>\n<li>Why aggressive EDR bypass techniques are now taking over defense evasion over obfuscation<\/li>\n<li>And much more \u2026<\/li>\n<\/ul>\n<p><a href=\"\/resources\/2025h1-threat-reveiw\/\" title=\"get the report\" class=\"c-btn c-btn--yellow c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\" target=\"_blank\">get the report<\/a><\/p>\n<p><a href=\"\/resources\/2025h1-threat-review-presentation\/\" class=\"u-display-inline-block u-line-height-0\"><img decoding=\"async\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-presentation-thumb-1.jpg\" class=\"u-size-full\" loading=\"lazy\"><\/a><\/p>\n<h2 class=\"c-title \">See the Research, Share the\u00a0Presentation<\/h2>\n<p>Vedere Labs shares an overview of the research in a presentation format for you and your security team to use and share. Get all the details of this mid-year threat report, key findings, and our recommendations for mitigating risk.<\/p>\n<p><a href=\"\/resources\/2025h1-threat-reveiw-presentation\/\" title=\"get the deck\" class=\"c-btn c-btn--dblue c-btn--outline has-icon icon-duotone-triangles-down icon-position-right has-icon-animation icon-animation-fade-in\">get the deck<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This report examines the latest cyber threats of 2025 including data on ransomware attacks, cyber crime, vulnerabilities, and state-sponsored hacktivism. <\/p>\n","protected":false},"author":165,"featured_media":107560,"parent":70336,"menu_order":60,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-107557","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2025H1 Threat Review<\/title>\n<meta name=\"description\" content=\"This report examines the latest cyber threats of 2025 including data on ransomware attacks, cyber crime, vulnerabilities, and state-sponsored hacktivism.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2025H1 Threat Review\" \/>\n<meta property=\"og:description\" content=\"This report examines the latest cyber threats of 2025 including data on ransomware attacks, cyber crime, vulnerabilities, and state-sponsored hacktivism.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-01T17:00:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/\",\"url\":\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/\",\"name\":\"2025H1 Threat Review\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp\",\"datePublished\":\"2025-07-30T13:07:13+00:00\",\"dateModified\":\"2025-08-01T17:00:09+00:00\",\"description\":\"This report examines the latest cyber threats of 2025 including data on ransomware attacks, cyber crime, vulnerabilities, and state-sponsored hacktivism.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vedere Labs\",\"item\":\"https:\/\/www.forescout.com\/research-labs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2025H1 Threat Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2025H1 Threat Review","description":"This report examines the latest cyber threats of 2025 including data on ransomware attacks, cyber crime, vulnerabilities, and state-sponsored hacktivism.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/","og_locale":"en_US","og_type":"article","og_title":"2025H1 Threat Review","og_description":"This report examines the latest cyber threats of 2025 including data on ransomware attacks, cyber crime, vulnerabilities, and state-sponsored hacktivism.","og_url":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2025-08-01T17:00:09+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/","url":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/","name":"2025H1 Threat Review","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp","datePublished":"2025-07-30T13:07:13+00:00","dateModified":"2025-08-01T17:00:09+00:00","description":"This report examines the latest cyber threats of 2025 including data on ransomware attacks, cyber crime, vulnerabilities, and state-sponsored hacktivism.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/research-labs\/2025h1-threat-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Vedere Labs","item":"https:\/\/www.forescout.com\/research-labs\/"},{"@type":"ListItem","position":3,"name":"2025H1 Threat Review"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2025\/07\/VL-2025H1-Threat-Review-feature.webp","is_file":false,"excerpt_manually_set":true,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/107557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=107557"}],"version-history":[{"count":4,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/107557\/revisions"}],"predecessor-version":[{"id":107668,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/107557\/revisions\/107668"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/70336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/107560"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=107557"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=107557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}