Monthly Threat Intelligence Report: July 2025

Connect With An Expert

Connect With An Expert

Access free consultative advice

Access free consultative advice

Call an expert on 0333 733 8050

Executive Summary - July 2025

Overview

The cybersecurity cyberthreat landscape during July 2025 marked a critical inflection point, demonstrating an unprecedented convergence of AI-powered attacks, sophisticated supply chain compromises, and targeted infrastructure exploitation. Following the trends identified in our June report, threat actors have accelerated their use of artificial intelligence while expanding attack surfaces through deepfake technology and advanced social engineering campaigns.

Global cybercrime costs continue their relentless climb, with AI-enhanced threats fundamentally transforming the attack landscape. The period witnessed a dramatic surge in voice-based social engineering attacks, with deepfake technology enabling criminals to bypass traditional authentication mechanisms. Simultaneously, ransomware operators have refined their tactics, deploying new variants like BQTLOCK and Interlock while exploiting critical vulnerabilities in enterprise systems.

Key Threat Indicators July 2025:

AI-powered voice cloning has reached commercial viability, enabling scammers to replicate voices with just 3-5 seconds of audio samples. The technology now passes both automated systems and human verification, creating unprecedented risks for financial institutions and corporate communications.

Microsoft SharePoint zero-day exploits designated as "ToolShell" have compromised over 400 organizations worldwide, including U.S. nuclear agencies, with Chinese state-sponsored groups leading coordinated campaigns.

QR code phishing (quishing) incidents surged dramatically, with Action Fraud receiving 784 reports between April 2024 and April 2025, resulting in £3.5 million in losses. The 5.3 billion projected QR code redemptions in 2025 represent equivalent opportunities for criminal exploitation.

Business Email Compromise attacks increased 30% as of March 2025, with 60% of compromises occurring within five minutes of victims clicking malicious links. AI-generated BEC emails now account for an estimated 40% of all BEC phishing communications.

Emerging Threat Analysis July 2025

AI-Powered Attack Maturation

The integration of artificial intelligence into cybercriminal operations reached a significant milestone in July 2025, with AI agents now outperforming elite human red teams by 24% in creating effective phishing campaigns. This represents a dramatic shift from 2023, when AI was 31% less effective than human attackers, demonstrating the rapid evolution of AI-powered threat capabilities.

Voice-based deepfakes have emerged as the dominant social engineering vector, with voice-based phishing now outpacing visual deepfakes in both frequency and impact. The technology's accessibility has democratized fraud, with voice cloning tools now costing less than $1 per call and requiring mere seconds to set up. Financial institutions face particular vulnerability, as AI has "fully defeated" voiceprint authentication systems according to OpenAI's CEO.

Critical Infrastructure Under Siege

July 2025 witnessed unprecedented targeting of critical infrastructure systems, with the ToolShell campaign representing the most significant SharePoint exploitation ever recorded. Chinese state-sponsored groups Linen Typhoon and Violet Typhoon coordinated attacks against over 400 organizations, demonstrating sophisticated persistence techniques and advanced reconnaissance capabilities.

The SonicWall SMA 100 series compromise revealed how end-of-life systems provide persistent attack vectors even when fully patched. The OVERSTEP rootkit deployment showcased attackers' ability to maintain long-term access while employing anti-forensic techniques to avoid detection.

Supply Chain Vulnerabilities Expand

Supply chain attacks have evolved beyond traditional software compromises to target the interconnected web of digital dependencies that define modern enterprise operations. With 79% of companies admitting limited oversight of their "nth-party" supply chain, attackers exploit these visibility gaps to achieve maximum impact through minimal effort.

Russian state-sponsored campaigns have specifically targeted Western logistics providers and IT companies supporting Ukrainian assistance efforts. These operations demonstrate how geopolitical tensions amplify supply chain risks, with attackers gaining access to transportation manifests, surveillance cameras, and border crossing systems.

Industry-Specific Risk Assessment July 2025

Financial Services Escalation

The financial sector faced intensified targeting through multimodal deepfake attacks combining voice, video, and behavioural cues to evade detection. The $25.5 million Arup engineering firm fraud exemplified how AI-generated executive impersonation attacks exploit corporate trust networks.

Deepfake fraud cases surged 1,740% in North America between 2022 and 2023, with financial losses exceeding $200 million in Q1 2025 alone. The sector's reliance on voice authentication systems creates particular vulnerability as AI voice cloning technology advances exponentially.

Healthcare Infrastructure Targets

Healthcare organizations continued facing sophisticated ransomware campaigns targeting both clinical systems and medical device networks. The sector's proliferation of Internet of Medical Things (IoMT) devices introduces new vulnerability vectors requiring comprehensive security adaptations.

Nation-state actors have intensified cyber-espionage efforts against healthcare organizations, targeting sensitive patient data and valuable intellectual property. The sector's legacy system dependencies and weak supply chain security create cascading vulnerabilities when external breaches occur.

Retail Sector Disruption

Major UK retailers including Marks & Spencer, Co-operative Group, and Harrods suffered significant cyberattacks during spring 2025. The M&S ransomware attack over Easter weekend disrupted all online orders and automated stock management systems, with estimated costs reaching £300 million in lost profits.

These attacks demonstrate how retail organizations' large organizational footprints and extensive customer databases make them attractive targets for cybercriminals seeking maximum data exposure and financial impact.

Government Sector Vulnerabilities

High-level U.S. government officials became targets of sophisticated voice deepfake campaigns using encrypted messaging platforms. The impersonation of Secretary of State Marco Rubio through AI-synthesized voice messages represents a significant evolution in social engineering tactics employed by nation-state actors.

Government defences continue struggling to keep pace with hostile states and criminals developing capabilities faster than anticipated. Legacy IT systems comprising significant portions of government infrastructure present substantial attack surfaces with high likelihood and impact risk profiles.

Attack Vector Evolution July 2025

Voice-Based Social Engineering Dominance

Voice-based attacks have emerged as the primary social engineering vector for 2025, with 37% of organizations worldwide already falling victim to voice deepfake scams. The technology's improvement at an exponential pace enables attackers to create convincing voice clones that bypass both automated systems and human verification.

Financial losses from voice-based fraud result in $25 billion annually, with Microsoft reporting widespread organizational impacts across multiple sectors. The democratization of voice cloning technology has dramatically lowered barriers to entry, making sophisticated attacks accessible to low-skill criminals.

Multi-Channel Attack Coordination

Threat actors increasingly deploy multi-channel campaigns combining email, voice, and messaging platforms to maximize success rates. The Russian OAuth phishing campaign targeting NGOs and human rights organizations exemplifies this approach, using Signal and WhatsApp communications to direct victims to legitimate Microsoft OAuth pages before stealing authentication tokens.

These response-based social engineering tactics comprise 99% of unblocked email threats, with attackers using simple emails containing phone numbers and QR codes to lure victims into less secure environments.

Zero-Day Exploitation Acceleration

The Microsoft zero-day vulnerability (CVE-2025-47981) exploited for cyber espionage demonstrates how threat actors manipulate Windows file execution search order to execute malicious code from remote servers. This technique enables attackers to avoid dropping files directly onto victim computers while evading detection.

Fortinet FortiWeb devices faced active exploitation via CVE-2025-25257, with over 85 devices infected with web shells within three days of public exploit availability. The rapid weaponization timeline highlights how quickly attackers capitalize on newly disclosed vulnerabilities.

Threat Actor Analysis July 2025

Nation-State Sophistication Advancement

Chinese state-sponsored groups demonstrated unprecedented coordination in the ToolShell SharePoint campaign, with Linen Typhoon and Violet Typhoon conducting synchronized attacks against critical infrastructure. These groups deployed custom espionage tools while maintaining persistent access through legitimate Windows components.

Russian threat actors UTA0352 and UTA0355 executed highly sophisticated OAuth phishing campaigns with personalized social engineering targeting European diplomats and Ukrainian officials. The campaigns' success rate demonstrates how nation-state actors leverage detailed reconnaissance to craft convincing impersonation attacks.

Ransomware Evolution Patterns

Ransomware operators have refined their deployment mechanisms, with new variants like BQTLOCK implementing multi-layered encryption approaches combining AES-256 and RSA-4096 cryptography. The Interlock ransomware group's specialized approach eschewing the prevalent ransomware-as-a-service model makes them more formidable to defend against.

SafePay ransomware organization's attack on Ingram Micro resulted in key systems offline for nearly a week, demonstrating how targeted attacks against critical supply chain partners create cascading operational impacts.

Criminal Innovation Acceleration

Cybercriminals increasingly leverage legitimate services and developer tools to bypass traditional security measures. The 200% increase in misuse of eSignature platforms and developer tools highlights how attackers exploit trusted services to deliver malicious content.

AI-powered phishing-as-a-service kits exist but remain less widely adopted than anticipated, with only 0.7-4.7% of phishing emails bypassing filters being AI-generated in 2024. However, the 4,151% increase in total phishing volume since ChatGPT's advent demonstrates AI's role in scaling attack operations.

Defensive Recommendations July 2025

Immediate Priority Actions

Organizations must implement comprehensive voice verification protocols beyond simple audio authentication. Multi-channel verification requiring family code words or unique personal knowledge becomes essential as voice cloning technology advances.

Advanced email authentication protocols including SPF, DKIM, and DMARC require immediate deployment, as major email providers now mandate these for reliable delivery. Zero-trust architecture implementation helps minimize the impact of successful initial compromises across all organizational systems.

Strategic Security Evolution

Adaptive deepfake detection systems require continuous retraining on the latest manipulation techniques, similar to how antivirus software evolves to catch new malware strains. Organizations cannot rely on static models when facing rapidly evolving AI-powered threats.

Supply chain risk management programmes must include comprehensive vendor security assessments, continuous monitoring, and incident response coordination. The interconnected nature of modern business ecosystems means each vendor introduces potential entry points for cyber threats.

Technology Integration Priorities

AI-powered threat protection solutions with behavioural analytics capabilities become essential for identifying sophisticated attacks that bypass traditional defences. Sandboxing technology for suspicious attachments and real-time threat monitoring provide critical defensive layers.

Zero-trust network architecture combined with microsegmentation prevents lateral movement during successful compromises. Multi-factor authentication must extend beyond traditional methods to address voice cloning vulnerabilities.

Industry-Specific Defensive Measures

Financial Services Hardening

Financial institutions must implement enhanced wire transfer verification procedures requiring multi-channel confirmation for high-value transactions. Voice authentication systems should incorporate deepfake detection capabilities to prevent audio impersonation attacks.

Real-time transaction monitoring with AI-powered anomaly detection becomes crucial as attackers leverage sophisticated social engineering to bypass traditional fraud prevention measures.

Healthcare Security Adaptation

Healthcare organizations must prioritize IoMT device security through network segmentation and continuous monitoring of medical device communications. Legacy system upgrade programmes require acceleration to address fundamental security vulnerabilities.

Third-party risk management becomes critical as healthcare supply chains face increasing targeting by nation-state actors seeking sensitive patient data and intellectual property.

Government Infrastructure Protection

Government agencies require enhanced authentication protocols for high-privilege communications, particularly when using encrypted messaging platforms that nation-state actors increasingly target. Personnel security training must address deepfake recognition and social engineering awareness.

Legacy system remediation programmes need immediate prioritization given the substantial gaps in understanding estate resilience to advanced persistent threats.

Conclusion July 2025

July 2025 represents a watershed moment in the evolution of cyber threats, with artificial intelligence fundamentally transforming both attack capabilities and defensive requirements. The convergence of AI-powered voice cloning, sophisticated supply chain targeting, and critical infrastructure exploitation creates an unprecedented threat environment requiring immediate strategic adaptation.

The democratization of deepfake technology has eliminated traditional indicators of fraudulent communications, forcing organizations to completely rethink authentication and verification processes. Voice-based attacks now represent the dominant social engineering vector, with financial losses exceeding billions annually and success rates surpassing traditional phishing campaigns.

Supply chain vulnerabilities have evolved beyond simple software compromises to encompass the entire digital ecosystem supporting modern business operations. With 79% of organizations lacking visibility into their extended supply chains, attackers exploit these blind spots to achieve maximum impact through coordinated campaigns targeting critical infrastructure and essential services.

The gap between cyber threat capabilities and organizational defences continues widening at an alarming rate. Nation-state actors develop sophisticated tools and techniques faster than government and private sector defences can adapt, creating capability gaps that criminals increasingly exploit for financial gain.

Success in this environment requires fundamental shifts in cybersecurity strategy, moving beyond traditional perimeter defence to embrace adaptive, AI-powered protection mechanisms. Organizations must combine advanced technical controls with comprehensive security awareness programmes tailored to address AI-powered social engineering and deepfake threats.

The cost of inaction has never been higher, with individual incidents now capable of causing hundreds of millions in damages while undermining customer trust and operational continuity. Organizations that fail to adapt their security postures to address these evolving threats face existential risks as the threat landscape continues its rapid evolution.

Immediate action remains essential, as the technological capabilities enabling these advanced attacks become more accessible and affordable. The window for proactive defence implementation continues narrowing as threat actors refine their techniques and expand their targeting scope across all industry sectors.

This analysis reflects cyberthreat intelligence gathered throughout July 2025 and represents current understanding of the rapidly evolving cybersecurity landscape. Organizations should implement appropriate security measures based on their specific risk profiles, regulatory requirements, and threat exposure assessments.

Compare Now

Compare Now

Get FREE Expert Help

Get FREE Expert Help

Call an expert on 0333 733 8050

Newsletter

Subscribe for updates

Subscribe to our mailing list to get updated about new features, case studies, deals and discounts. No spam.

Newsletter

Subscribe for updates

Subscribe to our mailing list to get updated about new features, case studies, deals and discounts. No spam.

Newsletter

Subscribe for updates

Subscribe to our mailing list to get updated about new features, case studies, deals and discounts. No spam.

Newsletter

Subscribe for updates

Subscribe to our mailing list to get updated about new features, case studies, deals and discounts. No spam.