BlogNews
5 JAN, 2026

2025 Cybersecurity Year in Review: Ransomware, Identity Attacks, and Key Lessons

Case Study Featured Image

2025 was a pivotal year for cybersecurity, marked by a resurgence of high-impact ransomware and the collapse of the traditional network perimeter. Major attacks disrupted operations from automotive manufacturing to airlines, as threat actors shifted tactics to exploit identity systems and software supply chains. Both new and old vulnerabilities were weaponized, proving that unpatched systems remained an Achilles’ heel for many organizations.

At the same time, defenders adapted in meaningful ways. Companies embraced strategies like zero trust architecture and identity-first security to counteract the failing perimeter. Advances in AI cut both ways—enabling new defensive automation but also equipping attackers with tools like “WormGPT” for malicious ends. Economic pressures forced security teams to prioritize ruthlessly, consolidating platforms and focusing on cost-effective resilience. The following sections break down 2025’s major cyber trends, case studies, and lessons learned, providing a concise analysis of what happened and how organizations can respond.

Ransomware Resurgence Shakes Industries

Ransomware made a fierce comeback in 2025, both in frequency and impact. Well-organized criminal gangs launched waves of extortion attacks that crippled businesses and critical infrastructure. Unlike the targeted ransomware campaigns of previous years, 2025 saw a broader range of groups in play – leading to a “big game hunting” frenzy across sectors. Attackers continued to employ double-extortion tactics, encrypting data while also stealing sensitive information to pressure victims. In some instances, they even skipped encryption entirely, relying on data theft and extortion to avoid detection by traditional defenses.

One of the most significant incidents was the attack on Jaguar Land Rover (JLR) in late August 2025. The ransomware forced JLR to halt vehicle production for nearly a month, becoming one of the costliest cyber incidents in UK history. The attack idled thousands of workers and stalled hundreds of suppliers. Estimates put the economic damage at around £1.9 billion as JLR and its supply chain ground to a standstill. Attackers had infiltrated JLR’s network and deployed malware that encrypted critical systems, illustrating how modern ransomware can disrupt not just one company but an entire ecosystem of partners. This case underscored the need for robust incident response plans and business continuity preparation to withstand such an attack.

Ransomware crews also struck healthcare providers, financial services, and especially the aviation sector. Some attacks even focused on virtual infrastructure to maximize disruption. The resurgence of ransomware in 2025 delivered a harsh lesson: organizations must assume they will be targeted and ensure they can recover quickly. Regular offline backups, network segmentation to contain malware spread, and practiced recovery drills often made the difference between a brief outage and a prolonged crisis.

Collapse of Perimeter Defenses

Traditional perimeter defenses – the firewalls, VPNs, and gateway appliances that once defined corporate security – continued to lose effectiveness in 2025. With cloud-first architectures and remote work now the norm, attackers found it easy to bypass the network edge entirely. Many breaches began with phishing emails or web application exploits that rendered the idea of an “inside” vs. “outside” network obsolete. Once a single user’s device was compromised, threat actors could operate as if they were insiders, often evading legacy perimeter-based detection.

In fact, some supposed perimeter safeguards became liabilities themselves. A critical vulnerability in Ivanti’s VPN and zero-trust gateway software was discovered and promptly exploited in mid-2025, allowing attackers to remotely seize control of that network entry point. Likewise, flaws in other edge devices and VPN software gave attackers direct avenues into corporate networks. These incidents highlighted that relying on a hardened network boundary is no longer sufficient – especially when the boundary itself can be broken. The collapse of perimeter-centric security drove many organizations toward a zero trust model, where every user and system request is continuously authenticated and monitored, even if it originates from “inside” the network.

Identity-Focused Attacks Surge

With perimeter walls crumbling, threat actors doubled down on attacking identity systems and user credentials. Many high-profile breaches in 2025 did not involve custom malware or open ports, but rather the abuse of authentication and access. Phishing campaigns, social engineering, and token theft became primary pathways for intrusions, targeting the identity and access management (IAM) layer that organizations rely on.

A prominent example was the hacker group Scattered Spider (also known as Octo Tempest), which orchestrated a series of attacks on major airlines and hospitality firms. Scattered Spider’s tactics involved impersonating employees in helpdesk calls, tricking staff into resetting multifactor authentication, and using stolen credentials to burrow into systems. In several airline breaches attributed to this group, the attackers gained initial access through convincing phishing and phone-based social engineering, then escalated privileges deep into the IT environment. These incidents were serious enough to prompt government warnings, reinforcing that even well-defended organizations can be compromised if an attacker can hijack legitimate user accounts.

Another major identity-related breach hit the software-as-a-service realm: the Salesforce/Drift integration compromise. In August 2025, attackers stole OAuth tokens associated with a popular third-party chatbot integration (Drift) used in Salesforce CRM. Using these tokens, the adversaries accessed hundreds of companies’ Salesforce records via the trusted app connection. They exfiltrated sensitive customer information from numerous organizations by abusing valid credentials of a third-party app, without breaching those companies directly. The tokens were swiftly revoked and the integration disabled, but not before significant data was stolen. This incident was a wake-up call that identity extends beyond users – it includes the credentials and tokens of applications and partners, all of which need to be protected and monitored.

The surge in identity-focused attacks showcased the importance of an identity-first security posture. Techniques like phishing-resistant multifactor authentication (for example, hardware security keys), strict privilege controls, user-behavior analytics, and rapid detection of suspicious login patterns became increasingly vital. When attackers are essentially “logging in” with stolen credentials rather than breaking in by force, security teams must have the visibility to spot abnormal identity usage before major damage is done.

Notable Vulnerabilities Exploited

If 2025 proved anything, it’s that unpatched vulnerabilities remain one of the easiest paths for attackers. Several major exploits this year drove home the importance of timely updates and vigilant monitoring for signs of compromise. Critical flaws in widely used enterprise software were leveraged in broad attacks just days (or even hours) after they became public – including a few zero-day exploits with no immediate patches available.

One headline example was a zero-day vulnerability in Oracle’s E-Business Suite (EBS) – a popular enterprise resource planning platform – disclosed in August 2025. This bug (CVE-2025-61882) allowed unauthenticated remote code execution on Oracle EBS servers. A ransomware-affiliated group (identified in reports as the Cl0p gang) quickly weaponized the exploit, mass-scanning for exposed Oracle EBS systems. Within weeks, they had compromised numerous organizations by exploiting the flaw, stealing data from ERP databases and extorting victims. Oracle scrambled to release an emergency patch and governments issued alerts about the active attacks, but the episode revealed how fast threat actors now seize on enterprise vulnerabilities to conduct widespread campaigns.

Even the infamous Log4j “Log4Shell” flaw from 2021 reappeared in attacks, showing that years-old critical bugs remained a problem in some unpatched systems. Beyond this, vulnerabilities in products like Progress MOVEit Transfer (file transfer software) and various network appliances were also exploited in the wild. For example, the MOVEit file transfer bug (similar to a high-profile incident in 2023) was used by cybercriminals to steal large amounts of data from organizations that hadn’t patched quickly enough. The common thread in all these cases is speed: attackers often begin scanning for newly disclosed vulnerabilities within hours. A robust vulnerability management process – rapid patching, temporary workarounds, and isolating vulnerable systems – was essential to avoid becoming another statistic. Organizations with mature patch and asset management were far less likely to find themselves in the headlines.

AI: A Double-Edged Sword for Security

Artificial intelligence took center stage in cybersecurity in 2025, acting as both an accelerator for defense and a force-multiplier for attackers. On the defensive side, organizations deployed more AI-driven tools for threat detection, incident response, and vulnerability management. Machine learning models sifted through network traffic and logs to flag anomalies faster than human analysts. Some companies used AI assistants to automate routine security tasks or to analyze new malware swiftly, reducing response times. In an era of alert fatigue and limited staff, these AI-enhanced defenses provided a much-needed boost in efficiency.

Yet the same advancements benefited cyber adversaries. A striking development was the rise of custom malicious AI tools such as “WormGPT” – underground AI models tailored to assist cybercriminals. WormGPT and similar systems enabled even less-skilled attackers to generate convincing phishing lures, write malware code, and automate parts of their attack playbooks. In effect, AI lowered the barrier to entry for crafting sophisticated attacks by providing on-demand expertise in social engineering and coding. Security teams accordingly began encountering more phishing emails and scams that were clearly AI-written: grammatically flawless, contextually savvy, and harder for traditional filters to detect.

Additionally, inadvertent data leakage via AI became a growing internal risk. Multiple organizations discovered employees had been inputting sensitive internal data into public AI chatbots (to get help with coding or document drafts), not realizing that those queries could be stored or used to train the AI. This raised the possibility of confidential information unintentionally escaping into the wild. Companies responded by instituting stricter policies and technical controls to prevent feeding sensitive data into external AI tools. The takeaway from 2025 is that AI in cybersecurity truly cuts both ways: defenders must harness AI for good while guarding against AI-powered threats and accidental leaks facilitated by AI usage.

Supply Chain Attacks and Third-Party Risks

Attacks on the software supply chain continued to proliferate in 2025, as threat actors looked for indirect paths into well-protected organizations. Rather than assaulting a large enterprise head-on, attackers increasingly targeted weaker links: third-party software components, libraries, and service providers that big companies rely on. By compromising one vendor or open-source project, an adversary could potentially gain a foothold in hundreds or thousands of downstream customer environments.

One of the most alarming supply chain incidents this year was a widespread compromise of popular open-source packages in the npm ecosystem (the Node.js package manager). In September 2025, researchers discovered that dozens of widely used npm libraries had been quietly modified to include malware. Attackers had compromised maintainer accounts via phishing and inserted malicious code that stole developers’ credentials and data from any system building those packages. Because these libraries were embedded as dependencies in countless applications, the malicious updates potentially spread to an enormous number of downstream systems before the issue was caught and the packages were pulled. This incident highlighted how a single tampered dependency can cascade into a massive breach, renewing calls for stricter controls and auditing of software components.

As noted earlier, the Salesforce/Drift OAuth token theft was another form of supply chain attack – exploiting trust in a third-party SaaS integration to access data from hundreds of companies. Similarly, attackers continued to abuse public code repositories like PyPI (Python’s package index) by uploading trojanized libraries, and planted backdoors in open-source tools that unsuspecting organizations downloaded. The lesson from 2025’s supply chain woes is that organizations must scrutinize the security of their vendors and code dependencies as closely as their own systems. Steps like vetting software suppliers, restricting unvetted open-source components, and monitoring third-party access tokens can help reduce the blast radius if a partner or component is compromised. Supply chain security is now an essential part of cybersecurity, since an attack can just as easily arrive through the very tools and services companies trust.

Defensive Strategies Proving Effective

Not all news was grim this year – several defensive approaches demonstrated real success in mitigating threats. Organizations that invested in certain best practices found they could limit damage or even fend off attacks entirely. Key strategies that proved their worth in 2025 included:

  • Zero Trust Architecture: Companies implementing zero trust (never implicitly trusting any connection, always verifying) were better positioned to intercept intrusions. Continuous verification of users and devices helped stop attackers who had stolen credentials, and internal segmentation meant a single compromised account didn’t grant access to everything.
  • Identity-First Security: Prioritizing identity protection became essential. Firms that rolled out phishing-resistant multi-factor authentication (such as hardware security keys), tightened identity governance (ensuring users only have needed access), and actively monitored login behavior were far more successful at blocking the rampant identity attacks of 2025.
  • Memory-Based Threat Detection: Advanced endpoint security tools that inspect running processes and memory for malicious patterns paid dividends. Many modern malware and ransomware strains operate filelessly or hide in memory. Solutions capable of spotting abnormal code execution or in-memory injections caught threats that signature-based antivirus missed.
  • Network Segmentation: Organizations with strong network segmentation and micro-segmentation contained incidents much more effectively. By isolating critical systems and dividing networks into smaller zones, they limited how far ransomware or an intruder could spread. An infected device in one segment could not easily reach crown-jewel databases or disrupt entire networks.

These measures – combined with fundamentals like robust data backups, user security training, and endpoint detection and response (EDR) – made a tangible difference. Companies with layered defenses and an “assume breach” mindset were often able to detect incidents early and avoid catastrophic fallout.

Budget Pressures and Platform Consolidation

Economic headwinds in 2025 put many security teams under pressure to do more with less. Flat or shrinking budgets, combined with a relentless threat environment, drove a trend toward consolidation and efficiency. Instead of maintaining a patchwork of point solutions, organizations increasingly looked to consolidate security tools and vendors. Many embraced extended detection and response (XDR) platforms that unify capabilities – endpoint, network, cloud, and identity protection – under one roof, simplifying management and potentially lowering costs.

This consolidation extended to vendor relationships as well. Security leaders negotiated broader contracts with fewer providers, seeking integrated solutions and volume discounts. Some enterprises leaned more on built-in cloud platform security features (reducing the need for third-party tools) to save on licensing and staffing costs. While concentrating on a single ecosystem can introduce its own risks, in 2025 the need to streamline and cut costs often prevailed. Ultimately, teams found ways to prioritize investments that delivered the most risk reduction for the dollar – whether through automation that reduced manual workloads or managed services that augmented limited in-house staff.

Conclusion

The tumultuous events of 2025 have redefined cybersecurity priorities as we head into 2026. The year’s resurgence of ransomware, identity-driven breaches, and supply chain compromises highlighted that no organization is immune to modern cyber threats. Yet we also saw that certain defensive strategies can significantly blunt the impact. Companies that treat security as a continuous process – patching diligently, verifying identities relentlessly, segmenting networks, and planning for failure – tend to emerge from incidents with far less damage.

The key lessons from 2025 are clear. First, assume attackers will find a way in – whether through a stolen credential or an unpatched system – and build your security architecture to minimize the blast radius. Second, double down on identity and access management as the frontline of defense, since trust must be continually earned rather than assumed. Third, be proactive about third-party and supply chain risk; your security is only as strong as the weakest link among your partners and software dependencies. Finally, leverage innovative tools like AI and automation that can tilt the balance in favor of defenders, while staying mindful of the new risks they introduce. By applying the hard lessons of 2025, organizations can forge a more resilient cybersecurity posture for the years ahead.

Share

We Also Recommend to See:

EtherLast™
The versatile platform that allows you to promptly detect complex threats, analyse and respond to them from a single pane of glass.
Dreamlab
CyBourn's DreamLab pushes the boundaries of innovation in the cyberspace.

Tell us about your Cybersecurity needs

We are strategists, engineers, analysts, and governance experts embedded in the world’s biggest cyber missions and trusted to advance them. Let us help you today.