ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

Forescout’s 2025H1 Threat Review Highlights Surge in Zero-Day Exploits, Nation-Backed Hacktivism, and Healthcare Vulnerabilities

Ransomware hits 20 targets per day as attackers exploit unconventional entry points for lateral movement

Forescout Technologies, Inc., a global leader in cybersecurity, today released its 2025H1 Threat Review, an analysis of more than 23,000 vulnerabilities and 885 threat actors across 159 countries worldwide during the first half of 2025. Among the key findings: ransomware attacks are averaging 20 incidents per day, zero-day exploits increased 46 percent, and attackers increasingly targeting non-traditional equipment, such as edge devices, IP cameras and BSD servers. These footholds are often used for lateral movement across IT, OT, and IoT environments—allowing threat actors to pivot deeper into networks and compromise critical systems.

Download the full report and read the blog.

“We’re seeing attackers gain initial access through overlooked IoT devices or infostealers, then use lateral movement to pivot across IT, OT, and IoT environments,” said Sai Molige, Senior Manager of Threat Hunting at Forescout Technologies. “Our ValleyRAT hunt, which uncovered the Chinese threat actor Silver Fox targeting healthcare systems, is a prime example. These attackers exploit blind spots to quietly escalate access. The Forescout 4D Platform™ is purpose-built to detect hidden entry points, continuously assess their risk, and disrupt lateral movement before adversaries reach critical systems.”

“Cyberattacks aren’t just technical events — they have real-world consequences that put human lives at risk. From hospitals to medical devices to critical infrastructure, it is all being targeted through zero-day exploits, unconventional entry points, and nation-backed hacktivism,” said Barry Mainz, CEO of Forescout. “You can’t defend critical infrastructure with yesterday’s tools. Security today must be continuous, proactive, and device-agnostic. Forescout delivers the only platform that secures all devices — IT, OT, IoT and IoMT — across every environment, so organizations can protect what matters most.”

Forescout Research – Vedere Labs H1 2025 Threat Review Key Findings:

Exploits shift to older vulnerabilities and unconventional devices, zero days increase

  • 47% of newly exploited vulnerabilities were originally published before 2025.
  • Published vulnerabilities rose 15%, with 45% rated high or critical.
  • Zero-day exploitation increased 46%, and CVEs added to CISA KEV jumped 80%.
  • Modbus accounted for 57% of OT protocol traffic in Forescout honeypots.
  • Ransomware actors increasingly targeted non-traditional equipment, such as edge devices, IP cameras and BSD servers, which often lack EDR, making them ideal entry points for undetected lateral movement and underscoring the need for integrated detection solutions.

Ransomware rises 36% year over year, with 3,649 documented attacks in H1

  • Attacks grew in frequency to 608 per month, or roughly 20 per day.
  • The U.S. was the top target, accounting for 53% of all incidents.
  • The top sectors targeted were services, manufacturing, technology, retail and healthcare.
  • New attack vectors included IP cameras and BSD systems, amplifying lateral movement across enterprise environments.

Healthcare is under siege, averaging two healthcare breaches per day

  • In the first half of 2025, the healthcare sector emerged as the most impacted vertical for data breaches.
  • Nearly 30 million individuals were affected by breaches in H1 2025.
  • 76% of breaches stemmed from hacking or IT incidents.
  • 62% of breaches involved data stored on network servers; 24% were on email systems.
  • Forescout identified trojanized DICOM imaging software delivering malware directly to patient systems.

Lines blur between hacktivists and state-sponsored actors

  • Forescout tracked 137 threat actor updates in H1 2025, with 40% attributed to state-sponsored groups and 9% as hacktivists. The remaining 51% were cybercriminals, such as ransomware groups.
  • Iran-affiliated groups like GhostSec and Arabian Ghosts targeted programmable logic controllers (PLCs) linked to Israeli media and water systems.
  • CyberAv3ngers amplified unverified claims before major OT attacks in 2023–2024, echoing similar tactics now under a new identity: APT IRAN.
  • APT IRAN, CyberAv3ngers and other Iranian hacktivist personas form a continuum of Iranian threats to OT/ICS.

“Hacktivist operations are no longer just symbolic or isolated. They’re evolving into coordinated campaigns targeting critical infrastructure with real-world consequences,” said Daniel dos Santos, Head of Research at Forescout. “What we’re seeing from Iranian-aligned groups is a shift toward more aggressive, state-influenced disruption tactics masked as activism. As geopolitical tensions escalate, these actors are becoming faster, louder and harder to attribute, and that makes their threat even more urgent for defenders to address.”

Steps to Reduce Risk and Build Cyber Resiliency

  • Use agentless discovery to identify and monitor all connected assets—IT, OT, IoT and healthcare systems.
  • Regularly assess for vulnerabilities, apply patches, disable unused services and enforce strong, unique credentials with MFA.
  • Segment networks to isolate device types and limit lateral movement in case of compromise.
  • Encrypt all sensitive data in transit and at rest, especially PII, PHI and financial information.
  • Deploy threat detection tools that ingest data from EDR, IDS and firewalls while enabling detailed logging of user and system activity.

About Forescout

For more than 25 years, Fortune 100 organizations, government agencies, and large enterprises have trusted Forescout as their foundation to manage cyber risk, ensure compliance and mitigate threats. The Forescout 4D Platform™ delivers comprehensive asset intelligence, continuous assessment and ongoing control over all managed and unmanaged, agented and un-agentable assets across IT, OT, IoT and IoMT environments. Forescout’s open platform makes every cybersecurity investment more effective with seamless data integrations and automated workflow orchestration across more than 100 security and IT products.

Forescout Research – Vedere Labs is the industry leader in device intelligence, curating unique and proprietary threat intelligence that powers Forescout’s platform.

You can’t defend critical infrastructure with yesterday’s tools. Security today must be continuous, proactive, and device-agnostic. Forescout delivers the only platform that secures all devices — IT, OT, IoT and IoMT — across every environment.

Contacts

Recent Quotes

View More
Symbol Price Change (%)
AMZN  227.35
+0.59 (0.26%)
AAPL  273.67
+1.48 (0.54%)
AMD  213.43
+12.37 (6.15%)
BAC  55.27
+1.01 (1.86%)
GOOG  308.61
+4.86 (1.60%)
META  658.77
-5.68 (-0.85%)
MSFT  485.92
+1.94 (0.40%)
NVDA  180.99
+6.85 (3.93%)
ORCL  191.97
+11.94 (6.63%)
TSLA  481.20
-2.17 (-0.45%)
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.