Denis Goydenko, Head of Cybersecurity Threat Response, PT Expert Security Center, Positive Technologies
Denis Kuvshinov, Head of Threat Analysis, PT Expert Security Center, Positive Technologies
Newcomers to the cybercrime scene
In 2024, researchers at the Positive Technologies Expert Security Center uncovered five new APT groups. The catch? Many had already been operating for over a year, quietly focused on espionage and data theft. On a broader scale, global conflicts continue to fuel waves of hacktivism. During the Israeli-Palestinian conflict, 16 hacktivist groups publicly aligned with Israel, while an overwhelming 173 groups took a stand on the opposite side, amplifying the cyber battleground.
Since 2022, the PT ESC Cyberthreat Research Department has tracked 35 new hacktivist groups and 26 active APT groups, a dramatic shift from 2019 to 2021, when hacktivists barely registered as a concern. Back then, attention was squarely on 18 highly active APT groups that dominated the threat landscape.
The tactics attackers use today reveal a mix of volume and stealth. Groups like PhaseShifters, PseudoGamaredon, and Fluffy Wolf stand out for their relentless phishing campaigns aimed at data theft. On the flip side, groups such as Space Pirates, IAmTheKing, and ExCobalt have made a name for themselves by staying hidden deep within organizations' infrastructures, evading detection for extended periods and complicating mitigation efforts. It's a stark reminder that attackers aren't just evolving—they're excelling in the art of persistence and precision.
Tools adapt as cybercriminals respond to new defenses
Attackers are keeping a close eye on the headlines—and they're learning fast. Specialists at the PT Expert Security Center have noted that cybercriminals adapt their tools and methods almost immediately after researchers publish findings. Take the Hellhounds, for example. Once their activities were exposed, they scrambled to rewrite their malware code and tweak obfuscation methods to stay ahead of defenders. Then there's ExCobalt, which took things to the next level by building its own custom backdoor, GoRed, ensuring its arsenal could evolve as quickly as the threats it faces.
Positive Technologies' Incident Response experts are also seeing an uptick in attackers using tunneling utilities to burrow through compromised networks. These tools let them dodge basic security controls and stay undetected for longer, making containment a race against time.
The numbers from 2024 paint a stark picture. Out of 100 incident investigations, known APT groups had infiltrated 39% of companies. Worse still, 35% of those attacks led to encrypted or destroyed data and disrupted business processes, leaving organizations scrambling to recover.
Adding to the chaos is the rise of trusted-relationship attacks. Once rare, these breaches now account for 15% of incidents, with attackers using contractors as a backdoor into their real targets. Meanwhile, nearly half of breaches—44%—are traced back to vulnerable web applications on the network perimeter. It's a clear reminder that the weakest link often sets the stage for the biggest problems.