Thursday, May 8, 2025
Homecyber securityGoogle Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of threat actors, particularly China-nexus groups.

These adversaries are deploying custom malware ecosystems, exploiting zero-day vulnerabilities in security appliances, and utilizing proxy networks resembling botnets to evade detection.

Their tactics also include targeting edge devices lacking endpoint detection and response (EDR) capabilities and employing bespoke obfuscation techniques in malware.

- Advertisement - Google News

This concerted effort to bypass traditional defenses enables prolonged persistence within compromised systems, posing significant challenges to cybersecurity teams worldwide.

Diverse Attack Vectors and Opportunistic Exploits

While high-complexity attacks are on the rise, Mandiant’s findings reveal that many successful breaches stem from simpler, opportunistic methods.

Stolen credentials, often harvested through infostealer operations, have surged to become the second most common initial infection vector, accounting for 16% of investigated incidents in 2024, trailing only exploits at 33%.

Additionally, attackers are capitalizing on missteps during cloud migrations and targeting unsecured data repositories to pilfer sensitive information.

The report also notes a steady increase in financially motivated threat groups, comprising 55% of active actors in 2024, while espionage-driven groups account for 8%.

Key industries under siege include financial services (17.4%), business and professional services (11.1%), and high tech (10.6%), underscoring the broad scope of these threats.

The M-Trends 2025 report, based on over 450,000 hours of incident response investigations from January to December 2024, uncovers other alarming trends.

Global median dwell time for adversaries has risen to 11 days from 10 in 2023, with longer durations (26 days) when external notifications trigger detection compared to a mere 5 days in ransomware cases where adversaries self-disclose.

Emerging threats include DPRK operatives posing as remote IT contractors to fund national agendas, Iran-nexus actors intensifying operations against Israeli targets, and increased exploitation of cloud-based single sign-on portals for widespread access.

Additionally, Web3 technologies like cryptocurrencies are becoming prime targets for theft and illicit financing.

Mandiant urges organizations to adopt a multi-layered security posture to counter these evolving threats.

Prioritizing fundamentals such as vulnerability management, least privilege principles, and system hardening is critical.

Implementing FIDO2-compliant multi-factor authentication for all accounts, especially privileged ones, can thwart credential theft.

Organizations should also bolster detection with advanced technologies, enhance logging and monitoring to shrink dwell times, and conduct threat hunting to uncover hidden compromises.

Cloud environments demand rigorous audits to address misconfigurations, while insider risks require stringent vetting and access controls, particularly for remote workers.

Staying abreast of threat intelligence and regularly updating security policies are equally vital to adapt to this dynamic landscape.

With these insights from the frontlines, Mandiant’s M-Trends 2025 serves as a crucial guide for defenders aiming to stay one step ahead of increasingly sophisticated adversaries.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...