Threat Brief: Ransomware Surge, State-Sponsored Espionage, and Evolving Malware Tactics
The x63 Unit, Cipher’s global cyber intelligence team, has been closely tracking a surge in ransomware activity and the growing role of nation-state actors in cyber espionage.

Table of contents:
- Ransomware Resurgence Hits Critical Sectors
- BigTech and Government Also Under Fire
- Supply Chain Compromise and Extortion
- Critical Vulnerabilities: Spotlight on Ivanti CVE-2025-22457
- Threat Actor Intel: Malware, Hacktivism, and Ransomware-as-a-Service
- xMDR by Cipher: Built for the Threats of Tomorrow
- Bringing It All Together
As threat actors evolve, so must defense strategies. This week’s update dives into the latest attack vectors, targeted sectors, and what organizations can do to stay one step ahead.
Ransomware Resurgence Hits Critical Sectors
Ransomware remains one of the most disruptive tactics used by cybercriminals—and 2025 is already proving that trend isn’t slowing. High-profile groups like PLAY, Qilin, Sarcoma, and SpaceBears are targeting from infrastructure to healthcare and education. Among the most notable:
- PLAY ransomware attacked Baltimore Steel Erectors, highlighting the risk to critical infrastructure.
- Sarcoma breached FUJIFILM, illustrating that no industry is immune.
- Loretto Hospital and Vitenas Cosmetic Surgery were hit, disrupting essential healthcare services.
- Highline Public Schools and Cheroke County School District faced data exposure, amplifying the need for better cybersecurity in education.
These attacks are more than data breaches—they’re operational disruptions with real-world impacts.
BigTech and Government Also Under Fire
- Oracle suffered a cloud breach after initially denying the incident, showing even tech giants aren’t invincible.
- Hacktivist collectives Sylhet Gang-SG and DarkStorm Team targeted the FBI’s Criminal Justice Information Services (CJIS) division—pointing to the rise of politically motivated cyber warfare.
Meanwhile, the Port of Seattle incident exposed 90,000 individuals, and attacks on vulnerable communities, such as the Minnesota Tribe, demonstrate how ransomware can cripple digital infrastructure and erode trust.
Supply Chain Compromise and Extortion
- A sophisticated GitHub token compromise serves as a reminder that the software supply chain is a growing attack surface
- Threat groups like Hunters International are pivoting to extortion-only models, leaking stolen data via dark web forums.
These shifts underscore the importance of zero trust architectures, attack surface management, and continuous monitoring.
Critical Vulnerabilities: Spotlight on Ivanti CVE-2025-22457
A newly discovered vulnerability, CVE-2025-22457, in Ivanti Connect Secure, Policy Secure, and ZTA Gateways, allows remote code execution via a stack-based buffer overflow. Exploits are active in the wild, but no patch is available yet.
Mitigation is critical. Organizations should follow vendor guidance, restrict access, and monitor for signs of compromise.
Threat Actor Intel: Malware, Hacktivism, and Ransomware-as-a-Service
Cipher’s x63 Unit continues to map global threat activity and actor behavior. Here’s what’s on our radar:
- Ransomware families like LockBit, Clop, BlackCat, and PLAY remain dominant.
- RansomHub exemplifies the rise of ransomware-as-a-service (RaaS)—lowering the barrier to entry for cybercriminals.
- Websheels, backdoors, botnets, and DDoS malware are being deployed for persistent access and mass disruption.
- Nation-state actors, such as Russia-linked Storm-0501 and Storm-1567, are escalating attacks on critical infrastructure.
- Emerging malware strains like Lynx, Chaos, and AI-generated payloads reveal increasing sophistication in adversarial techniques.
Cybercrime is evolving faster than ever—and understanding the players is the first step in mitigating their impact.
xMDR by Cipher: Built for the Threats of Tomorrow
Cipher’s Extended Managed Detection and Response (xMDR) platform is designed to meet today’s threats with tomorrow’s technology. With:
- 70+ adaptive rules informed by real-world threat intel
- Coverage across MITRE ATT&CK tactics like Lateral Movement, Execution, and Defense Evasion
- Automated, analyst-backed threat response from our 24/7 Security Operations Center (SOC)
Cipher xMDR enables organizations to detect, analyze, and respond to advanced threats with confidence and speed.
Bringing It All Together
Cybersecurity isn’t just a technical issue—it’s a strategic priority. From ransomware to rogue nations, today’s adversaries are bold, persistent, and increasingly innovative.
Cipher’s x63 Unit remains committed to providing threat intelligence that empowers you to act decisively.
Want to learn more about how Cipher’s xMDR platform protects against advanced cyber threats?