HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks
-
Cyber adversaries adopt business-like models to target every major sector,
HPE finds - Generative AI used to produce synthetic voices, images and videos for targeted impersonation fraud campaigns
-
World-class network threat research expertise and experience brought together in new
HPE Threat Labs
The report shows a global cyber threat environment defined by scale, organization and speed. Based on the cyber analysis of 1,186 active threat campaigns observed worldwide
“In the Wild reflects the reality organizations face every day,” said Mounir Hahad, Head of
Industrial-scale infrastructure fuels modern threat campaigns
As this inaugural report shows,
Government organizations were the most targeted sector globally, accounting for 274 campaigns spanning federal, state and municipal bodies. The finance and technology sectors followed closely, with 211 and 179 campaigns, respectively, reflecting attackers’ sustained focus on high-value data and financial gain. Defense, manufacturing, telecommunications, healthcare and education organizations were also heavily targeted. Together, these findings underscore that attackers are strategically prioritizing sectors tied to national infrastructure, sensitive data and economic stability, but reinforce that no sector is immune.
Over the course of the year, threat actors deployed more than 147,000 malicious domains, nearly 58,000 malware files, and actively exploited 549 vulnerabilities. This professionalization of cybercrime makes attacks more predictable in execution, yet harder to disrupt, as dismantling one component of an operation rarely stops the broader campaign.
Automation and AI tools accelerate attacker speed and impact
Attackers also adopted new techniques to increase speed and impact. Some operations used automated “assembly line” workflows over platforms like Telegram to exfiltrate stolen data in real time. Others leveraged generative AI to produce synthetic voices and deepfake videos for targeted video-phishing (vishing) and executive impersonation fraud, while an extortion gang did market research on virtual private network (VPN) vulnerabilities to optimize its intrusion strategy.
These tactics allowed threat actors to move faster, reach more targets and concentrate efforts on sectors tied to national infrastructure, critical data and economic stability. By streamlining operations and prioritizing high-value targets, threat actors were able to pursue financial gain with greater efficiency by strategically “following the money.”
Practical steps to strengthen cyber resilience
The report underscores that effective defense depends less on adding tools and more on improving coordination, visibility, and response across the network. Organizations can take the following steps to improve their security posture:
- Break down silos by sharing threat intelligence across corporate teams, customers, and industries, while using a secure access service edge (SASE) approach to unify networking and security and surface attack patterns earlier.
- Patch common entry points such as VPNs, SharePoint, and edge devices to reduce exposure and shut down frequently exploited paths into the network.
- Apply zero trust principles to strengthen authentication and limit lateral movement, with zero trust network access (ZTNA) continuously verifying users and devices before granting access.
- Improve visibility and response with threat intelligence, deception technologies, and AI-native detection, helping organizations detect, analyze, and respond to attacks with greater speed and accuracy.
- Extend security beyond the corporate perimeter to home networks, third-party tools, and supply chain environments.
Together, these steps can help organizations move faster, reduce risk, and better defend against increasingly organized and persistent threats.
Building upon long-standing expertise,
“HPE Threat Labs was created to bridge the gap between cutting-edge research and real-world security outcomes,” said
Methodology
Related Resources:
-
HPE unveils new AI-driven security and advanced data protection innovations atBlack Hat USA 2025 -
HPE Networking Instant On Secure Gateway brings robust enterprise-grade security to small and medium businesses -
Hewlett Packard Enterprise redefines cloud-based security with expansive solutions for zero trust networking and private cloud operations
About
View source version on businesswire.com: https://www.businesswire.com/news/home/20260317429570/en/
Media Contacts:
kelsey.akerson@hpe.com
Source: