WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP:CLEAR) Check Point Report – How Ransomware Tactics are Evolving
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP:CLEAR) Check Point Report – How Ransomware Tactics are Evolving

TLP:CLEAR

Author: Chase Snow

Created: Thursday, August 21, 2025 - 14:28

Categories: Cybersecurity, Security Preparedness

Summary: Check Point Research recently published its Q2 2025 Ransomware Report showing shifts in the ransomware threat landscape. Based on leak site data and threat intelligence, the report indicates that attackers are mixing AI with classic extortion tactics.

Analyst Note: The research reveals that ransomware is evolving rather than fading. While overall victim disclosures dropped six percent, the first decline in over a year, groups like Qilin and DragonForce are expanding operations with AI-driven tools and aggressive affiliate models. Others, such as Hunters International, are shifting to data-only extortion. The report’s findings – AI’s growing role in attack automation, social engineering, and extortion tactics – also complements federal reporting on the subject.

Additionally, Warlock ransomware actors have been found to be exploiting the vulnerabilities in Microsoft SharePoint servers that WaterISAC shared with members in a recent advisory.

Original Source: https://l.cyberint.com/ransomware-q2-2025-report

Additional Reading:

  • Check Point reveals AI-powered ransomware surge as attackers shift from encryption to exfiltration
  • (TLP:AMBER) WaterISAC Advisory – WWS Billing Software Impacted by Ransomware Group (Updated June 18, 2025)
  • (TLP:CLEAR) WaterISAC Advisory – ACTION MAY BE REQUIRED: Critical Vulnerabilities in On-Premises SharePoint Server Actively Exploited (Updated July 24, 2025)
  • (TLP:CLEAR) Joint Cybersecurity Advisory – #StopRansomware: Interlock Ransomware

Related WaterISAC PIRs: 6, 10

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar