Ransomware surges. VPN exploits spike. Dark web activity rebounds.
PDI’s latest threat intelligence reveals Akira ransomware’s rise, firewall vulnerabilities under fire, and a sharp uptick in infostealer market listings. Get strategic insights to protect what matters most.
Hover over tiles to learn more
JANUARY THROUGH MARCH
Q1 2025 saw a sharp rise in VPN and firewall exploits, a ransomware surge in retail, and a rebound in dark web market activity.
Ransomware extortion publications per day
Total publications Q1
Change from Q4
While there was a slight -2.83% increase in ransomware publications from Q4, the level of activity seen in Q4 (which was itself a 46% increase from Q3) appears to have continued throughout Q1 with only a minimal drop.
How to combat: Defend against ransomware with regular backups, endpoint protection, zero-trust security, and employee training. Keep systems patched and use advanced threat detection to stay ahead.
Lumma-related listings in Q1
Drop in total dark web listings from Q4
Lumma listing drop before March rebound
In Q1 2025, dark web marketplace listings dropped early in the quarter due to a slump in Lumma Stealer activity, then rebounded sharply in March. Lumma remained the dominant infostealer, driving most credential-theft listings.
How to combat: Use layered security, encrypt data, and enforce strong passwords with MFA. Monitor the dark web for exposed info, and train users to spot phishing and social engineering attacks.
Total Exploit Events in Q1
Unique Exploits Detected
Change from Q4
Q1 2025 exploit activity experienced a marginal decrease, with over 29 million events and 601 unique exploits detected—highlighting continued targeting of VPNs, firewalls, and legacy vulnerabilities.
How to combat: Reduce exploit risk by patching high-priority vulnerabilities, especially in remote access tech. Pair with active monitoring and intrusion prevention to detect and block threats early.
As PDI's Director of Security Operations, Justin Heard is at the helm of the company's key security initiatives, encompassing incident response, threat hunting and cyber intelligence. With over 16 years of experience in cybersecurity, including roles such as threat hunter, incident commander and intelligence analyst, Justin has a deep understanding of the cybersecurity domain. His leadership is instrumental in bolstering PDI’s defenses and adapting to the rapidly changing landscape of cyber threats.
Before his tenure at PDI, Justin enhanced his skill set in the defense sector, serving as a network administrator and security engineer. Justin has an associate degree in Computer Networking Systems from ITT Tech.
Josh is a supervisor of threat intelligence at PDI who works closely in organizational threat landscapes, curating threat intelligence, and authoring PDI’s Quarterly Threat Landscape Report. Josh is currently pursuing his master’s degree in Cybersecurity Technology. Previously he served with the U.S. Navy as an Operations Specialist with 14 years of service. Josh has been quoted in Forbes, CSO Online, Channel Futures, Dark Reading, and others.