The Cyberint Europe Threat Landscape 2024-2025 report sheds light on the increasingly complex and evolving cyber threat environment affecting organizations across Europe and the UK. Leveraging data from Cyberint—which monitors threats like phishing, malware, and supply chain vulnerabilities—the report highlights a surge in malicious activities driven by global conflicts, technological shifts, and the growing use of generative AI in cybercrime.
Key trends in 2024 include a notable increase in ransomware attacks, which have become more aggressive, often involving multiple extortion methods. Malware infections, fueled by the rise of Malware-as-a-Service (MaaS), have targeted industries across the board, while phishing campaigns, increasingly powered by AI, have become more convincing and harder to detect. Additionally, DDoS attacks have intensified, likely influenced by nation-state conflicts, disrupting industries from finance to transportation.
Cyberint Attack Surface Management through Argos has identified significant increases in exploitable network ports and misconfigured email security, exacerbated by the complexity of hybrid work environments and cloud-based infrastructures. Data leakage remains a growing concern, with compromised credentials and payment cards leading the charge, while fraud schemes like coupon fraud and mule operations continue to adapt and target retail and financial sectors.

Looking ahead to 2025, organizations will face a heightened risk landscape, driven by the following emerging trends:
Organizations must strengthen their cybersecurity postures, focusing on multi-layered defenses, real-time threat detection, and rigorous employee training to mitigate these growing risks. The integration of AI in both defensive and offensive capabilities will be key to staying ahead of the evolving threat landscape in 2025.
Cyberint’s Europe Threat Landscape Report 2024-2025 is built on a multi-faceted intelligence approach that integrates both proprietary and public data sources. We sourced intelligence derived from our own Cyberint solution, which monitors a wide range of threat vectors through modules such as Attack Surface Management, Darkweb Threat Intelligence, Supply Chain Intelligence, Malware Intelligence, Phishing Detection, Social Media Monitoring and more.
Cyberint provides critical alerts and indicators that inform our analysis, allowing us to offer an intelligence-focused overview of the cybersecurity threat landscape of Europe and the United Kingdom. Cyberint-sourced information in this report is from a sample of approximately 140,000 intelligence alerts, from October 1, 2021 to October 1, 2024, from 40 companies in Europe and the UK, in the following industries:

We also leverage open-source intelligence (OSINT), including threat feeds, news articles, and research publications from cybersecurity experts and regulatory bodies. Additionally, we give credit to the following agencies, whose threat landscape and state of security analyses supplemented our 2024 Threat Landscape Overview (see citations):
1. European Union Agency for Cybersecurity (ENISA). ENIS
A Threat Landscape 2024. September 2024. Available at:https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024.
2. Cloudflare. Shielding the Future: Europe’s Cyber Threat Landscape. March 2024. Available at: https://www.cloudflare.com/shielding-the-future.
3. Splunk. State of Security 2024: The Race to Harness AI. 2024. Available at: https://www.splunk.com/state-of-security-2024.
We then apply advanced analytics and threat modeling to identify patterns and predict emerging cyber trends for 2025, particularly key threats and vulnerabilities that European organizations should prepare for.
This report does not go deep into ransomware–Cyberint’s Research Team produces quarterly and annual ransomware reports separately
Ransomware continues to be one of the most significant threats, evolving with more sophisticated tactics such as double and triple extortion, where data is encrypted, stolen, and threatened to be released unless a ransom is paid. This has been highlighted in the ENISA Threat Landscape report, where ransomware consistently ranks as a top threat.¹ In Europe, ransomware attacks continue to cause substantial financial damage, with many organizations experiencing repeated attacks.² Additionally, the increasing use of AI to
create more complex ransomware variants adds to the challenge.³
Malware remains a broad threat category that includes everything from trojans and viruses to spyware and worms. ENISA reports a rise in Malware-as-a-Service (MaaS), allowing less-skilled attackers to deploy sophisticated malware.¹ This threat is prevalent across industries, particularly in technology and financial services.² Splunk’s State of Security report emphasizes that AI is enhancing malware’s adaptability, making detection and response even more challenging.³
Phishing, spear-phishing, and business email compromise (BEC) continue to be highly effective attack vectors. ENISA highlights social engineering techniques as a major means for attackers to gain unauthorized access.¹ Phishing remains the most common form of attack, particularly in sectors like IT, education, and healthcare.² With the advent of AI-generated phishing scams, these attacks are becoming more convincing and harder to detect.³
DDoS attacks, which aim to overwhelm systems and disrupt services, remain a key threat. ENISA notes the increasing availability of DDoS-for-hire services, making it easier for attackers to launch large-scale attacks.¹ Cyberint observes its prevalence may highly likely be due to the ongoing conflicts, where nation-states are leveraging cyber warfare as part of their strategy, such as in the Russia-Ukraine conflict, and the Israel-Hamas conflict. DDoS attacks frequently target high-traffic industries such as transport, IT, and finance,² and their complexity has been increasing, making mitigation more difficult.³
Supply chain attacks target vulnerabilities in third-party software, vendors, or partners, which can lead to widespread compromise. ENISA highlights the growing concern around supply chain risks, noting that these attacks are difficult to detect and have far-reaching consequences.¹ Many organizations remain unprepared for supply chain risks, with incidents affecting sectors like energy, healthcare, and finance.² The increased reliance on cloud services and complex supply chains heightens the vulnerability.³
The rapid adoption of generative AI brings new risks, as threat actors leverage AI to enhance their attacks. ENISA and other reports have observed that AI can be used to create more convincing phishing attacks, automate vulnerability discovery, and even generate malicious code.¹² Splunk’s State of Security report stresses that both defenders and attackers are racing to harness AI, with 45% of security professionals fearing that AI will benefit attackers more.³ As organizations increasingly rely on AI, the potential for
AI-powered attacks to outpace defenses is a growing concern.

Throughout the past year, Cyberint has provided a comprehensive view of the cyber threat landscape across various sectors in Europe, capturing key insights through its threat intelligence modules.
Our alert data highlights distinct trends across multiple threat categories, from malware and phishing to more sophisticated attacks such as supply chain compromises.
While the raw numbers reveal an uptick in threat activity, it is important to contextualize this growth. The expansion of our client base throughout the year has contributed to an overall increase in the number of detected instances. This upward trend reflects not only the rising volume of threats but also the broader reach of our intelligence capabilities as we onboarded more organizations across different industries. Each data point represents more than just a figure; it offers critical insights into the evolving tactics of adversaries and the shifting nature of cyber risks that businesses must address.

Cyberint Attack Surface Monitoring & Management provides automatic and full visibility into your digital presence – uncovering security issues and vulnerabilities that can be exploited by potential adversaries.

The number of exploitable ports in 2024 saw a two-fold increase compared to 2023.

Companies may use different domains or subdomains for different brands, subsidiaries, or regions. They also often use third-party platforms for email marketing and customer service.
It is crucial to configure SPF, DKIM, and DMARC for each sending domain to prevent misuse, such as phishing and spoofing.
Cloud security was a major issue post-COVID, and was still significant in 2023-2024, albeit to a lesser extent. According to ENISA, 82% of data breaches involved data stored in public and private clouds. However, data breaches are often the result of exploiting human factors, such as social engineering, phishing, or user error.
Cyberint detected zero cases of unsecured cloud storage for the past two years, which could be attributed to increased awareness and training, and the improvement of cloud security design by cloud providers.


Cyberint helps access top-tier sources in the dark web. We collect and analyze data from elusive web sources that most other companies cannot penetrate, and enrich our automated collection with a human approach, through research and analysis of our expert team. Data risks we cover include:


Cyberint data shows a dramatic increase in customer credential exposure in the past three years, with an average percentage increase of 333% per year. This is likely driven by factors such as increased phishing attacks, credential stuffing, and data breaches.
This also reflects the increasing sophistication of threat actors, and the growing use of automation in attacks. We expect this to continuously increase amid the emergence of generative AI.
Companies should enforce strong security policies, including multi-factor authentication (MFA), endpoint protection, and VPN usage, along with regular employee training on avoiding risky online behaviors and securing their devices.
Compromised employee credentials alerts increased nearly eightfold from 355 in 2022 to 5,802 in 2024. The sharp rise in compromised employee credentials, largely sourced from malware logs, highlights the growing risk of employee exposure to malware. This can be attributed to the widespread use of personal devices, remote and home networks, coworking spaces, and unsecured public Wi-Fi.
As employees access sensitive company resources from less secure environments, the potential for malware infections that harvest credentials increases significantly.
Companies should secure PoS systems with up-to-date software, employ strong anti-malware solutions, and use advanced fraud detection systems to identify suspicious activity. Additionally, implementing measures to detect and block BIN stuffing attempts, as well as educating customers on avoiding phishing schemes and ensuring device security, can help mitigate these risks.
The sharp rise in compromised payment card alerts can be attributed to threat actors increasingly targeting vulnerable point-of-sale (PoS) systems, exploiting weaknesses in banking infrastructure, and using phishing campaigns to steal customer payment information.
Additionally, BIN stuffing (where attackers guess valid payment card details using the first six digits of a card) and the use of BIN checkers (tools to verify the validity of card details) have become prevalent techniques to compromise payment card data. Malware-infected devices, whether used by customers or within the company’s infrastructure, also play a significant role in harvesting sensitive payment card data.
Companies should secure PoS systems with up-to-date software, employ strong anti-malware solutions, and use advanced fraud detection systems to identify suspicious activity. Additionally, implementing measures to detect and block BIN stuffing attempts, as well as educating customers on avoiding phishing schemes and ensuring device security, can help mitigate these risks.
Gain a valuable human element when it comes to research, investigation, and threat intelligence operations. Deepen your understanding of the vectors behind the threat itself, including the threat actor’s motivation, the tools, tactics and procedures (TTPs) in use, third-party vendors involved, and other crucial factors.
*The Surge in Q3 2024 in Coupon and Refund Fraud is Attributed to the Onboarding of Major Retail Clients in That Period.


Key Insights
Cyberint uses various methods to identify potential phishing attacks and ensure end-to-end coverage, detection and protection from phishing attempts.

In July 2024, Cyberint launched a significant new tool in our arsenal to combat phishing misdetections and campaigns. The new capability relies on the way threat actors both copy customer websites and reuse phishing kits.
It allows us to mark specific page resources, like images and text files, as protected page resources, and to tag any suspicious page from any of our feeds as phishing if it uses them. Pages with the configured resources will trigger a high confidence phishing alert which will be published automatically,
preventing any human errors or delays in reviewing candidates.
This, along with our continuous commitment to improving our machine learning capabilities for detecting lookalike domain permutations, reaped great rewards in our phishing detection: We saw an 87.3% increase in the detection of phishing sites, and an 85.94% increase in the detection of lookalike domains, after the improvements were deployed.

Monitor for malicious brand impersonation across the open, deep, and dark web, identify suspicious behaviors, such as mentions of your brands and products in threat actor forums, and outsource takedowns to Cyberint to remove any illegal posting of proprietary information.
Cyberint can monitor the following:


Social media pages impersonating companies have become a prevalent tool for phishing and social engineering operations. Cybercriminals create fake profiles that closely mimic legitimate company pages, often using the same logos, branding, and tone of communication to deceive users into believing they are interacting with the official organization.
These fraudulent pages are then used to spread phishing links, lure victims into providing sensitive information, or conduct scams, such as fake customer service interactions or investment schemes.

The distribution of unofficial mobile apps significantly increases the risk of SDK (Software Development Kit) and API attacks, which can lead to severe data leaks.
Unofficial apps often bypass the security checks imposed by official app stores, making them more likely to contain malicious or compromised SDKs. Threat actors exploit these apps by embedding harmful SDKs that can access sensitive information such as user credentials, financial data, or personal identifiers. Once installed, these SDKs can covertly collect and transmit data to unauthorized third parties without the user’s knowledge.
They may also interact with legitimate APIs without proper security protocols, opening the door for threat actors to intercept API requests and responses, leading to man-in-the-middle (MITM) attacks; as well as leak API keys and expose API endpoints.
Cyberint continuously monitors forums, marketplaces and code repositories to detect and intercept various malware shared and sold by cyber criminals, help customers defend against these tools, and take them down in time. cyberint can identify the use of tools that systematically go through lists of credentials found in the dark web. Then, it automatically publishes alerts as these findings are detected.


In October 2024, it was reported that APT group GoldenJackal was able to breach air-gapped government systems in Europe using two custom toolsets to steal sensitive data, such as emails, encryption keys, media files, and documents. the group executed these attacks on two separate occasions: one targeting a South Asian embassy in Belarus between 2019 and 2021, and another against a European government body from May 2022 to March 2024.
In May 2023, Kaspersky highlighted GoldenJackal’s espionage-focused activities, which primarily target government and diplomatic entities. Although the group’s use of custom USB-based tools, like “JackalWorm,” was previously known, the successful compromise of air-gapped systems had not been confirmed until recently.
Air-gapped systems are typically isolated from networks to protect highly sensitive data, but GoldenJackal’s attacks expose the vulnerabilities that still exist. The intrusion begins on internet-connected systems, where the GoldenDealer malware spreads through trojanized software or malicious documents. GoldenDealer automatically transfers itself to any inserted USB drives, which are then unknowingly used to infiltrate air-gapped systems.
When the compromised USB is plugged into the air-gapped machines, it installs GoldenHowl (a backdoor) and GoldenRobo (a data-stealing tool). GoldenRobo searches for sensitive data like encryption keys and confidential documents, storing them on the USB drive. Once the drive is reconnected to a networked machine, GoldenDealer sends the stolen data to the attackers’ command and control server.
These breaches emphasize the critical need to monitor malware trends, outputs, and manifestations in the dark web. GoldenHowl, a versatile backdoor, enables persistence, vulnerability scanning, and communication with the attackers, highlighting the sophisticated methods used to compromise air-gapped systems.
Cyberint’s Supply Chain Intelligence module automatically discovers the third-party technologies and vendors in your digital supply chain, continuously monitors these third parties, and assigns risk scores that leverage Cyberint’s extensive open, deep and dark web intelligence. The module issues targeted alerts in real-time about the threats that may negatively affect your organization.



| Compromised Vendor | Industry | Date | Incident Type |
|---|---|---|---|
| ServiceNow | I.T. and Technology | October 2023 | Breach |
| State Street | Financial Services | February 2024 | Breach |
| Fiserv | Financial Services | February 2024 | Breach |
| Prudential | Financial Services and Insurance | February 2024 | Ransomware |
| Fujitsu | I.T. and Technology | February 2024 | Breach |
| Microsoft | I.T. and Technology | April 2024 | Breach |
| HOYA | Medical Technology | April 2024 | Breach |
| Medibank | Health Insurance | May 2024 | Ransomware |
| Synnovis | Healthcare Services | June 2024 | Breach |
| Snowflake | I.T. and Technology | July 2024 | Breach |
| Adobe | Software | July 2024 | Breach |
| Crowdstrike | Cybersecurity | August 2024 | Breach |
| TOTVS | Software | October 2024 | Ransomware |
| Star Health Insurance | Health Insurance | October 2024 | Breach |
As we look toward 2025, the cyber threat landscape will become increasingly complex, driven by rapid advancements in technology, shifts in work environments, and geopolitical tensions. Below are the key threats expected to dominate the cybersecurity space in 2025, which will require proactive planning and strategic response from organizations across industries.
Phishing attacks have long been a preferred tactic for cybercriminals, but with the integration of generative AI, these attacks will become far more sophisticated. Attackers will use AI to generate highly personalized phishing emails, texts, or social media messages, tailored to individual targets by analyzing publicly available data. These AI-powered phishing campaigns will be difficult to detect due to their human-like language, dynamic content generation, and ability to bypass traditional filters. Organizations will need to adopt advanced AI-based defense mechanisms that can identify subtle anomalies in communication patterns to combat this rising threat. Security awareness training will also need to evolve to equip employees to spot these highly convincing phishing attempts.
Supply chain attacks—where attackers target vulnerabilities in third-party vendors or software suppliers—will continue to rise in 2025. As organizations increasingly rely on external vendors for critical operations, this interconnectedness presents a broader attack surface for cybercriminals. These attacks can disrupt entire supply chains, allowing adversaries to exploit weaknesses in software update mechanisms or third-party cloud infrastructure. We expect attackers to exploit these vulnerabilities to gain lateral access to corporate networks, steal sensitive data, or distribute malware. Continuous vendor security assessments, enhanced contractual requirements for cybersecurity standards, and real-time monitoring of supply chain activity will be essential for mitigating these risks.
Ransomware is expected to remain a dominant threat, evolving with even more sophisticated techniques. In 2025, we anticipate the use of AI-enhanced ransomware that can evade traditional detection methods by dynamically altering its behavior and encryption strategies. Attackers will continue to employ double and triple extortion schemes, not only encrypting data but also threatening to release sensitive information or target customers and partners unless a ransom is paid. This trend will also see the rise of Ransomware-as-a-Service (RaaS), where attackers lease out ransomware tools to lower-skilled threat actors. Organizations must implement zero-trust architectures, robust data encryption, and rapid incident response plans to minimize the damage of ransomware attacks and ensure quick recovery.
The shift to remote and hybrid work models will continue to present significant security challenges in 2025. As employees access company resources from home networks, public Wi-Fi, and personal devices, attackers will exploit these often less-secure environments. Threat actors may use compromised home routers, infected personal devices, or poorly secured coworking spaces to gain access to corporate networks. The lack of centralized control over these environments leaves organizations vulnerable to a wide range of attacks, from malware infections to credential theft. To mitigate these risks, organizations will need to strengthen endpoint detection and response (EDR) systems, enforce virtual private networks (VPNs), and ensure that personal devices used for work meet strict security standards. Additionally, regular employee security training will be critical to reducing risky behaviors in remote work settings.
The unofficial distribution of mobile apps will increasingly lead to SDK-based attacks (attacks that exploit vulnerabilities within software development kits integrated into mobile applications). Attackers can distribute unofficial versions of legitimate apps that contain malicious SDKs capable of stealing user data, credentials, and other sensitive information. This poses a particular risk to both consumers and employees who may inadvertently download compromised apps outside of official app stores. Moreover, the growing use of mobile devices for work-related tasks increases the likelihood of corporate data being exposed via these apps. Organizations must enforce strict policies that limit the use of unofficial apps, implement mobile application management (MAM) tools to monitor app usage, and regularly audit mobile devices for compliance with security policies.
As geopolitical tensions rise, nation-state-sponsored cyberattacks will become more frequent and sophisticated, targeting critical infrastructure, financial systems, and government organizations. These attacks will range from Distributed Denial of Service (DDoS) campaigns to cyber espionage and sabotage operations aimed at destabilizing national economies or critical industries. Cyber warfare could also involve targeting cloud services and operational technologies (OT), aiming to disrupt essential services like energy, healthcare, and transportation. For organizations, this will mean fortifying their defenses against nation-state attackers, including bolstering cyber resilience measures and working closely with governmental and cybersecurity agencies to share intelligence and mitigate threats.

©1994–2025 Check Point Software Technologies Ltd. All rights reserved.
Copyright | Privacy Policy | Cookie Settings | Get the Latest News
Fill in your business email to start