#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

40 C
Dubai
Tuesday, August 5, 2025
HomeTopics 4National SecurityCybercrime Surge, State-Sponsored Faketivists, and Evolving OT Threats: Key Insights from 2025H1

Cybercrime Surge, State-Sponsored Faketivists, and Evolving OT Threats: Key Insights from 2025H1

Date:

Related stories

TikTok Shop Scam “ClickTok” Unleashes SparkKitty Spyware in Global Phishing Blitz

A massive cybersecurity campaign dubbed ClickTok is targeting TikTok Shop users...

CVE‑2025‑7847: Arbitrary File Upload in AI Engine Puts 100K+ WordPress Sites at Risk of RCE

On 18 July 2025, researchers at Wordfence disclosed CVE‑2025‑7847, a high-severity...

Jordan’s Cyber Incidents Soar: NCC Reports 6,758 Attacks in 2024

On 31 July 2025, Jordan’s National Cybersecurity Center (NCC) revealed that...

Russian FSB‑Linked “Secret Blizzard” Launches ISP‑Level AiTM Campaign Against Moscow Embassies

Microsoft Threat Intelligence has uncovered an advanced cyberespionage campaign...
spot_imgspot_imgspot_imgspot_img

Forescout’s newly released 2025H1 Threat Review (5 August 2025) reveals an alarming escalation in cybersecurity threats, including advanced ransomware operations, infostealer tactics like ClickFix, and a sophisticated Iranian state-linked campaign targeting OT/ICS environments. The report warns that legacy vulnerabilities and growing geopolitical tensions are fuelling highly disruptive cyber activity worldwide, with critical infrastructure in the crosshairs.

According to Forescout, between 1 January and 30 June 2025, ransomware attacks surged to 3,649 cases globally – a 36% year-over-year increase from H1 2024. The U.S. remains the top target, now accounting for 53% of global ransomware incidents. Cl0p surpassed LockBit to become the most active ransomware group, while LockBit dropped to 19th after a takedown in early 2024.

BSD and IP Cameras in the Crosshairs

Threat actors are targeting unconventional devices to bypass EDR systems. Notably, Akira ransomware was deployed via a compromised IP camera in March, and the VanHelsing group introduced a BSD-compatible encryptor – signaling a pivot toward less-defended systems.

Healthcare Under Siege: Ransomware, Infostealers, and Real-World Harm

In the first half of 2025:

  • 341 breaches hit healthcare organizations, impacting 29.8 million individuals.
  • 76% of breaches stemmed from hacking or IT incidents.
  • One ransomware-linked delay in a UK blood test reportedly contributed to a patient’s death.

The Interlock ransomware group claimed responsibility for major U.S. attacks, including one breach involving 732,490 files and requiring three weeks for recovery.

Meanwhile, infostealer campaigns – particularly those using ClickFix social engineering techniques – spread rapidly in 2025, often via GitHub, SEO poisoning, Telegram bots, and cracked software sites.

OT/ICS Under Attack: Faketivist Fronts and Iranian Playbooks

The Rise of APT IRAN and the “Faketivist” Ecosystem

Forescout’s detailed analysis reveals a continuum of Iranian personas – ICTUS TEAM, CyberAv3ngers, and now APT IRAN – targeting Western OT/ICS systems under rotating identities to obfuscate attribution and stay ahead of sanctions.

Iranian actors executed verified attacks on Unitronics PLCs (Programmable Logic Controllers), defacing them across multiple U.S. water utilities. CyberAv3ngers was directly sanctioned by the U.S. in February 2024. Now, APT IRAN has emerged with similar tactics – including ransomware deployment for disruption, not ransom – and coordinated propaganda.

“These personas offer operational advantages to the IRGC. They can be activated or de-activated at will, allowing for staged exits, rebranding and resurrection during periods of heightened tension,” notes Forescout’s analysis.

Global & Regional Impact

Exploited Legacy Vulnerabilities a Persistent Risk

Nearly half of exploited CVEs in 2025H1 were published before 2025. Of the 132 CVEs added to the CISA KEV catalog, 21% targeted perimeter infrastructure like routers and firewalls.

Top sectors impacted:

  • Services
  • Manufacturing
  • Technology
  • Retail
  • Healthcare

Top targeted countries:

  • United States
  • Canada
  • India
  • UK
  • France

MEA Observations (Where Applicable)

While the report doesn’t explicitly highlight new MEA-specific campaigns, Iran’s cyber activities and rising Middle East tensions add weight to regional cyber risk, especially for OT operators in energy, oil & gas, and utilities sectors. The Middle East’s high dependency on OT infrastructure makes it a likely future battleground.

Expert Insight

“Threat actors are increasingly willing to exploit any exposed system regardless of sector or sensitivity,” the report warns, citing findings from honeypots mimicking water treatment environments, which received over 1.4 million requests in just three months.

“The blending of hacktivist branding with APT-grade capabilities is no accident – it’s part of a strategic evolution in psychological and infrastructure warfare,” stated Forescout Vedere Labs researchers.

Actionable Takeaways for CISOs and Defenders

  1. Patch all perimeter-facing assets, including VPNs, firewalls, and routers.
  2. Disable unused services and rotate credentials for internet-exposed devices.
  3. Segment networks to separate IT, OT, and IoT infrastructure.
  4. Block suspicious TLDs (.shop, .top, .club, .run) linked to infostealer C2s.
  5. Harden OT interfaces – ensure all PLC web interfaces require strong authentication.
  6. Use agentless asset discovery tools for visibility into unmanaged or legacy devices.
  7. Enable PowerShell and driver-level logging for advanced detection.
  8. Monitor for ClickFix-style social engineering, and train staff accordingly.
  9. Encrypt PII/PHI at rest and in transit, especially in healthcare environments.
  10. Detect lateral movement attempts across diverse device types including IP cameras, BSD systems, and IoT.

Conclusion: What’s Next?

The first half of 2025 has confirmed what defenders feared: nation-states are merging with hacktivists, ransomware groups are shifting toward unconventional devices, and vulnerabilities — even old ones — remain open doors. OT and healthcare systems are proving easy prey for adversaries seeking visibility, impact, or geopolitical leverage. The cybersecurity community must evolve beyond traditional silos, adopting full-spectrum visibility and detection across every device class — or risk losing control of the infrastructure that keeps society running.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here