Cybercriminals Target Trusted Business Partners: Insights from the Cisco Talos Report

Published:

spot_img

Cybersecurity Threats: Insights from Cisco Talos’ Q2 2025 Report

As the digital landscape evolves, so too do the strategies employed by cybercriminals. Cisco Talos, an established name in cybersecurity, has unveiled its findings in the Q2 2025 report, revealing alarming trends that organizations cannot afford to overlook. With phishing attacks on the rise, the report highlights a significant shift in tactics—criminals are increasingly leveraging compromised internal and trusted partner email accounts to launch their assaults.

The Rise of Compromised Credentials

During the second quarter of 2025, a staggering 75% of reported phishing incidents originated from compromised email accounts, whether belonging to internal employees or trusted business partners. This alarming statistic underscores how vital it is for organizations to ensure robust security measures are in place. Users were often lured into entering their credentials and multi-factor authentication (MFA) tokens on convincingly crafted fake login pages, enabling attackers to gather sensitive information with ease.

New Ransomware Threats

Ransomware continues to dominate the landscape of cyber threats, with Talos reporting that it was responsible for half of all incidents in the quarter. Notably, the report introduced two new strains—Qilin and Medusa ransomware—alongside the previously encountered Chaos ransomware. The Qilin attack showcased advanced techniques, beginning with stolen credentials and facilitating lateral movement via remote access tools.

The intricate nature of these attacks is notable; once inside the network, attackers employed a unique encryptor and novel data exfiltration methods, including the use of CyberDuck for data theft and Backblaze for command and control. Moreover, attackers demonstrated a chilling capacity for persistence, utilizing automated processes that allowed the ransomware to restart after system reboots and logins. This sophisticated approach not only wreaked havoc on systems but also necessitated extensive organizational remediation, including widespread password resets.

Among the disturbing trends emerging from the report is the exploitation of older technologies. Specifically, PowerShell v1.0—an outdated scripting language—was identified as a key tool in one-third of ransomware incidents. Its lack of security features renders it an easy target for attackers. Cisco Talos strongly advises organizations to enforce the use of PowerShell 5.0 or higher as a crucial step toward mitigating these risks.

Target Industries: Education on the Front Lines

The education sector was highlighted as the most heavily targeted industry in Q2 2025, showcasing a significant shift from previous trends. Alongside education, manufacturing, construction, and public administration also faced high levels of ransomware activity. This trend raises urgent questions about the security readiness of critical infrastructure and institutions, which often serve as gateways to broader networks.

Multi-Factor Authentication: A Non-Negotiable

Within the second quarter incidents, over 40% were tied to MFA issues—ranging from misconfigurations to outright absence or circumvention. The report drives home the importance of enabling and diligently monitoring multi-factor authentication systems. As Fady Younes, Managing Director for Cybersecurity at Cisco’s Middle East, Africa, Türkiye, Romania, and CIS regions, aptly notes, “Cybercriminals are increasingly exploiting trust, whether through compromised partner accounts, misconfigured security tools, or outdated systems."

Building Cyber Resilience: The Call to Action

The insights gleaned from Cisco Talos’ latest report serve as a stark reminder of the pressing need for organizations to bolster their cybersecurity frameworks. As Younes emphasizes, the onus is on companies not just to enable multifactor authentication but to continually validate its effectiveness. A proactive approach—where people, processes, and technologies converge—can substantially minimize risks and fortify defenses against evolving threats.

In a time when cyber threats loom larger than ever, the imperative for organizations to enhance their cyber resilience is undeniable. The path forward demands vigilance and adaptability in the face of ever-changing attack vectors. To combat these growing challenges, collaboration and prevention strategies must become foundational elements of every organization’s digital security posture.

spot_img

Related articles

Recent articles

CISA Quietly Refreshes List of Ransomware Exploited Vulnerabilities

Understanding the Dynamics of Ransomware Exploitation: Insights from the CISA KEV Catalog The cybersecurity landscape is constantly evolving, particularly as ransomware groups exhibit increasingly sophisticated...

Ransomware Attacks Surge 30% Recently

Escalating Ransomware Attacks: A 30% Surge in 2026 Ransomware has become a pressing concern in today’s digital landscape, with attacks increasing by 30% since late...

Researchers Link Notepad++ Supply Chain Breach to Hosting Compromise

A Hidden Threat: The Notepad++ Update Compromise Understanding the Breach For over six months, a routine update process for Notepad++, one of the world’s leading text...

UIDAI Deactivates Aadhaar Numbers of 25 Million Deceased to Combat Fraud

New Delhi's Initiative to Deactivate Deceased Aadhaar Numbers In a significant move to enhance the accuracy and reliability of the Aadhaar database, the Unique Identification...