Interactive Report Summary

Q1 2025 Threat Landscape Report

Ransomware surges. VPN exploits spike. Dark web activity rebounds.
PDI’s latest threat intelligence reveals Akira ransomware’s rise, firewall vulnerabilities under fire, and a sharp uptick in infostealer market listings. Get strategic insights to protect what matters most.

Download the Report

Top Findings at a Glance

EXPLOIT

Firewall and VPN exploits spiked.

Exploitation attempts against specific firewall and VPN vulnerabilities saw dramatic increases, highlighting the continued focus of threat actors on remote access technologies.

DARK WEB

Significant activity downturn followed by sharp rebound.

This decrease was largely influenced by a 58.95% fall in Lumma Stealer-related listings compared to the previous quarter. However, dark web marketplace activity began to rebound sharply in March.

RANSOMWARE

74.71% increase in ransomware extortion in retail sector

Retail jumped from 8th most ransomware extorted to 4th. The significant rise in retail targeting indicates a shift in ransomware operator strategy.

Image

Industry Spotlight: Retail Under Siege

Ransomware attacks against the retail sector surged by nearly 75% in Q1 2025, catapulting it into the top four most targeted industries. With rich customer data, real-time operations, and complex vendor networks, retail is becoming a prime target for double-extortion tactics.

Methodology

Hover over tiles to learn more

GATHER

Collects threat intelligence and data from global sources, client devices and reputable third parties.

PROCESS

Data is analyzed by a combination of machine learning, algorithm scoring and anomaly detection.

DETECT

Using PDI’s cloud-based SIEM, log data is ingested and alerts the security operations center (SOC). The SOC then notifies the client and works with them to remediate the threat.

EVALUATE

Analysts further scrutinize the research, scoring and tracking of existing and new threats.

DISSEMINATE

Analysts leverage the insights to constantly improve the SOC, alerting, and the community through the creation of detection rules, briefs, and presentations.

JANUARY THROUGH MARCH

Q1 2025 in Review

Q1 2025 saw a sharp rise in VPN and firewall exploits, a ransomware surge in retail, and a rebound in dark web market activity.

Let's Dive Into the Data

Q1 2025 revealed a surge in VPN and firewall exploits, a spike in ransomware targeting retail, and a dip-then-rebound in dark web activity—driven by a resurgence in Lumma Stealer listings.

January
1.8
CISA Warns of Actively Exploited Vulnerabilities in Mitel MiColab and Oracle WebLogic Server
1.9
Ivanti Patches Critically Rated Zero-Day Vulnerability Affecting Connect Secure
1.14
Fortinet Releases Patches for Two Critical Vulnerabilities, One Actively Exploited
1.15
Microsoft’s Patch Tuesday Addresses 8 Zero-Days, 159 Vulnerabilities
1.24
Ransomware Groups Pose as IT Support in Microsoft Teams
February
2.3
Google Fixes Android Kernel Zero-Day Exploited in Attacks
2.4
Netgear Warns Users to Patch Critical Wi-Fi Router Vulnerabilities
2.19
CISA Releases Advisory on Ghost (Cring) Ransomware
2.22
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 Against U.S. Telecom Networks
2.25
Chinese Botnet Bypasses MFA in Microsoft 365 Attacks
March
3.19
Ransomware Group Develops Automated VPN Brute Force Framework
3.26
Veeam RCE vulnerability Allows Domain Users to Attack Backup Servers
3.28
VMware Patches Authentication Bypass Vulnerability in Windows Tools Suite

#
Activity
Average
0

Ransomware extortion publications per day

0

Total publications Q1

-0%

Change from Q4

Ransomware

#
Activity
Average
0M

Lumma-related listings in Q1

-0%

Drop in total dark web listings from Q4

-0%

Lumma listing drop before March rebound

Dark Web Activity

#
Activity
Average
0

Total Exploit Events in Q1

0

Unique Exploits Detected

-0%

Change from Q4

Exploits

Stay Vigilant

Despite the varying levels of malware, botnet and exploit activity, bear in mind that just one successful breach can significantly impact your business. It's essential to maintain a clear view of your environment to defend against potential threats. As threat actors continually update their strategies, your security measures need to adapt accordingly. Always stay on guard!
Download the Report

Meet Our Threat Intelligence Experts

Justin Heard
Justin Heard
Director of Security Operations

As PDI's Director of Security Operations, Justin Heard is at the helm of the company's key security initiatives, encompassing incident response, threat hunting and cyber intelligence. With over 16 years of experience in cybersecurity, including roles such as threat hunter, incident commander and intelligence analyst, Justin has a deep understanding of the cybersecurity domain. His leadership is instrumental in bolstering PDI’s defenses and adapting to the rapidly changing landscape of cyber threats.

Before his tenure at PDI, Justin enhanced his skill set in the defense sector, serving as a network administrator and security engineer. Justin has an associate degree in Computer Networking Systems from ITT Tech.

Josh Smith Bio
Josh Smith
Supervisor, Threat Intelligence

Josh is a supervisor of threat intelligence at PDI who works closely in organizational threat landscapes, curating threat intelligence, and authoring PDI’s Quarterly Threat Landscape Report. Josh is currently pursuing his master’s degree in Cybersecurity Technology. Previously he served with the U.S. Navy as an Operations Specialist with 14 years of service. Josh has been quoted in Forbes, CSO Online, Channel Futures, Dark Reading, and others.