H1 2025 Malware and Vulnerability Trends

H1 2025 Malware and Vulnerability Trends

H1 2025 saw a 16% rise in disclosed CVEs with 161 actively exploited vulnerabilities, many targeting Microsoft and edge/gateway appliances and frequently used to deploy backdoors, RATs, and ransomware. Legacy malware like Sality and Tofsee resurfaced while RATs (AsyncRAT, XWorm, Remcos) and mobile threats (SuperCard X, GodFather) grew prominent, and ransomware groups evolved affiliate models and novel evasion techniques. #Sality #AsyncRAT

Keypoints

  • Total CVEs rose 16% in H1 2025 (23,667 disclosed); 161 vulnerabilities were exploited in the wild, 42% with public PoCs, 69% requiring no authentication, and 30% enabling RCE.
  • Microsoft and edge/gateway security appliances (SSL‑VPNs, next‑gen firewalls) were the top exploited targets (each ~17%), with many attacks enabling privileged network access and lateral movement.
  • Command and Control (TA0011) dominated malware telemetry (over 194,000 detections); commonly observed techniques included data encryption for impact (T1486), valid accounts (T1078), and data from local system (T1005).
  • Legacy malware resurgence (Sality, Tofsee) and increased RAT activity (AsyncRAT, XWorm, Remcos) signaled a shift from infostealer dominance to more persistent, hands‑on tools for data theft and post‑compromise operations.
  • Mobile malware expanded with at least eleven new strains and innovations like virtualization‑based overlays (GodFather) and NFC relay fraud platforms (SuperCard X) targeting contactless payments.
  • Ransomware actors refined affiliate models (DragonForce “cartel”, Anubis tiered offerings) and adopted new TTPs including ClickFix social engineering, BYOI EDR evasion, JIT hooking/memory injection, and use of dual‑use legitimate tools (AnyDesk, Syteca, GC2).
  • Magecart skimming remained prevalent with modular, stealthy chains abusing GTM, obscure HTML/CSS techniques, and WebSocket exfiltration to evade CSPs and target multiple e‑commerce platforms.

MITRE Techniques

  • [T0011 ] Command and Control – Identified as the most frequently observed malware tactic with “over 194,000 detections” illustrating heavy use of C2 for post‑compromise operations.
  • [T1486 ] Data Encrypted for Impact – Used by ransomware actors; report notes “data encrypted for impact (T1486)” highlighting widespread ransomware deployments.
  • [T1078 ] Valid Accounts – Employed as an Initial Access and persistence vector: report references “Valid Accounts (T1078)” indicating credential theft and reuse for access.
  • [T1005 ] Data from Local System – Observed as a common technique for data theft: report lists “data from local systems (T1005)” among top techniques.
  • [T1190 ] Exploit Public‑Facing Application – Most frequent technique for exploited CVEs: “Exploit Public‑Facing Application (T1190), observed in 73% of actively exploited vulnerabilities.”
  • [T1203 ] Exploitation for Client Execution – Noted as a top technique: “Exploitation for Client Execution (T1203)” indicating attacks requiring user interaction or client‑side exploits.
  • [T1068 ] Exploitation for Privilege Escalation – Listed among top techniques: “Exploitation for Privilege Escalation (T1068)” used to gain higher system privileges post‑exploit.
  • [T1586 ] Compromise Accounts – Observed in malware TTPs: report references “Compromise Accounts (T1586)” showing account takeover activity supporting persistence and access.
  • [T1133 ] External Remote Services – Highlighted as an Initial Access and persistence technique: “External Remote Services (T1133)” used to leverage stolen credentials and remote access portals.
  • [T1021 ] Remote Services – Mapped to lateral movement/persistence: report mentions “Remote Services (T1021)” as supporting lateral activities across networks.

Indicators of Compromise

  • [File names / Malware families ] context – examples include Sality, LummaC2, and Remcos (malware families referenced in C2 detections and post‑exploitation telemetry).
  • [CVE identifiers ] context – examples include CVE‑2025‑0282 (Ivanti Connect Secure), CVE‑2025‑22457 (Ivanti Policy Secure), CVE‑2025‑4428 (Ivanti EPMM), and CVE‑2025‑24813 (Apache Tomcat).
  • [Domains / Hosting providers ] context – example: LummaC2 infrastructure with “over 2,300 domains” seized and later reconstituted using Cloudflare‑backed C2 domains (Cloudflare IPs observed).
  • [Tool names ] context – examples include Cobalt Strike and GC2 (used as post‑exploitation C2 frameworks or cloud‑based C2 channels), and NETXLOADER (custom .NET loader used by Qilin ransomware).
  • [Mobile app identifiers / APKs ] context – examples include GodFather and SuperCard X (mobile malware and MaaS platform used for virtualization overlays and NFC relay fraud), and Android.Spy.1292.origin (targeted APK lure).


Read more: https://www.recordedfuture.com/research/h1-2025-malware-and-vulnerability-trends