According to research by Positive Technologies, Russia was one of the three most frequently targeted countries for cyberattacks in 2025, alongside the United States and China. Researchers recorded the activity of 57 cybercrime groups targeting CIS nations. The primary objectives of these threat actors remained data exfiltration, industrial espionage, sabotage, and financial gain. Furthermore, cybercriminals actively leveraged artificial intelligence and unconventional tools to generate phishing campaigns and deepfakes during their attacks.
The majority of all cyberattacks in the CIS region targeted three countries: Russia (46%), Belarus (11%), and Kazakhstan (8%). Experts attribute this concentration to regional geopolitical dynamics, the scale of economic activity, and population size. Advanced persistent threat (APT) groups were the most frequent attackers in the CIS, with hacktivists accounting for just 19% of the region's incidents. This distribution occurs because politically motivated threat actors are often either subordinated to state-sponsored groups or displaced by them, effectively acting as proxies.
In 2025, Positive Technologies experts tracked 123 cybercrime groups operating across the CIS region, 57 of which were active in Russia. The most prolific threat actors included Rare Werewolf, Lifting Zmiy, PhantomCore, Cyber Partisans, Silent Crow, and TA558. Their primary targets were industrial enterprises, government agencies, and financial institutions, with these three sectors accounting for nearly 50% of all attacks. Notably, the industrial sector was targeted by the majority of the active groups. The impact of these cybercrimes varied widely, ranging from massive data breaches to the direct disruption of critical infrastructure.