
Huntress 2025 Cyber Threat Report: Key Trends and Industry Impact (Part 1 of 2)
Cyber Threats: Sophisticated Attacks Become the New Normal
Huntress 2025 Cyber Threat Report: Key Trends and Industry Impact (Part 1 of 2)
The recently released Huntress 2025 Cyber Threat Report provides critical insights into the evolving cybersecurity landscape of 2024. In this first part of our two-part series, we’ll examine the key threats, industry-specific impacts, ransomware trends, and the tools attackers used throughout the year.
The 2024 Threat Landscape
The past year saw a significant evolution in cyber threats, with infostealers leading the pack at 24% of all incidents, followed closely by malicious scripts at 22%. Remote Access Trojans (RATs) and general malware made up 13% and 17% of incidents respectively, while ransomware accounted for 9.5% of attacks.
A particularly concerning trend was the democratization of sophisticated attack methods – techniques once reserved for targeting large enterprises are now being deployed against businesses of all sizes. Attackers have effectively standardized their methodologies across targets, regardless of organization size.
(Industries Targeted by Percentage 2024 – Source: Huntress 2025 Cyber Threat Report)
Industry-Specific Impacts
Healthcare Sector (17% of Total Attacks)
Healthcare faced the highest risk of malicious script executions throughout 2024. These scripts were primarily used for persistence, often appearing as JavaScript components of malware, downloaders, and system analysis tools. Many scripts were intercepted before execution, making it difficult to associate them with specific malware families. However, most appeared to be related to infostealers like Gootloader and PowerShell components used for obfuscation or anti-analysis techniques.
Threat Distribution:
- Malicious scripts: 22%
- Infostealers: 19%
- Malware: 16%
- RMM abuse: 9%
- RATs: 7%
- Ransomware: 8%
- Other: 19%
Technology Sector (12% of Total Attacks)
The technology sector saw attackers shift their strategies to leverage tools commonly used by employees, helping them blend into networks. Most notable was the abuse of RMM tools for both initial access and lateral movement. Password dumping and keylogging campaigns specifically targeting technology companies used tools like Mimikatz, lazagne, and the infostealers Meduza and Strela, followed by credential abuse for lateral movement.
Threat Distribution:
- Malicious scripts: 19%
- Infostealers: 18%
- Malware: 14%
- RMM abuse: 14%
- RATs: 9%
- Ransomware: 8%
- Lateral movement: 6%
- Other: 12%
Education Sector (21% of Total Attacks)
Educational environments faced similar threats to healthcare, but with malicious scripts being the most commonly identified threat. Unlike healthcare’s prevalence of Java-based attacks, education saw PowerShell, VBScript, and WMI abuse as the top threats. RMM abuse was slightly higher in educational environments, as these systems often rely on remote administration tools for management.
Threat Distribution:
- Malicious scripts: 24%
- Infostealers: 16%
- Malware: 13%
- RMM abuse: 13%
- Ransomware: 7%
- RATs: 6%
- Lateral movement: 4%
- Other: 17%
Government Sector (11% of Total Attacks)
Government environments were heavily targeted with information-stealing components, downloaders/persistence mechanisms, and RATs. SOCGholish, AsyncRAT, and JupiterRAT were popular malware families used for remote access. The sector saw an increase in Cobalt Strike and Bloodhound toolkit usage compared to other industries, though these numbers were far less than LOLBin abuse.
Threat Distribution:
- Infostealers: 21%
- Malicious scripts: 18%
- Malware: 16%
- RATs: 10%
- RMM abuse: 9%
- Lateral movement: 8%
- Ransomware: 5%
- Other: 13%
Manufacturing Sector (9% of Total Attacks)
Manufacturing showed unique patterns in 2024, with a high number of RAT installations including AsyncRAT, Trickbot, NetSupport, and NewCoreRAT. The sector faced the most evenly distributed list of scripting languages from malicious scripts, with PowerShell leading but WMI, JavaScript, and VBScript also commonly used. Notably, 23% of malware in this sector disguised itself as Adobe components.
Threat Distribution:
- Malware: 17%
- Infostealers: 15%
- Malicious scripts: 15%
- RATs: 13%
- RMM abuse: 12%
- Hacking tools: 8%
- Ransomware: 6%
- Other: 14%
Ransomware Trends
The average time-to-ransom (TTR) in 2024 was approximately 17 hours, with significant variations between different ransomware groups. Some groups like Akira deployed ransomware within six hours of initial access, while others took a more methodical approach.
On average, attackers performed 18 malicious actions before deploying ransomware, with activities ranging from reconnaissance to privilege escalation and data exfiltration. Groups focusing on data theft and extortion typically performed more actions compared to those prioritizing rapid encryption.
(Time-to-Ransomware 2024 – Source: Huntress 2025 Cyber Threat Report)
Attacker Tools and Techniques
Threat actors heavily relied on specialized tools for automation and system compromise. Key statistics include:
- RATs dominated remote access methods at 75% of incidents
- RMM tool abuse represented 17.3% of remote access methods
- ConnectWise ScreenConnect abuse accounted for 74.5% of RMM exploitation
- Cobalt Strike remained the top hacking tool at 31.7% of detected tools
- Mimikatz followed at 17.6% of hacking tool usage
(Most Common Remote Access Methods Used Across 2024 – Source: Huntress 2025 Cyber Threat Report)
How CinchOps Can Help
In response to these evolving threats, CinchOps offers comprehensive cybersecurity solutions tailored to your industry’s specific needs:
- 24/7 Threat Monitoring and Response
- Real-time threat detection powered by AI and machine learning
- Continuous monitoring of network and endpoint activity
- Rapid incident response capabilities
- Industry-Specific Security Solutions
- Customized security protocols based on your sector’s unique threats
- Specialized protection against prevalent attack vectors
- Compliance-focused security measures
- Advanced Threat Protection
- Protection against RATs and malicious scripts
- Comprehensive ransomware defense
- Data backup and recovery
- Security Assessment and Training
- Regular security posture assessments
- Employee security awareness training
- Incident response planning and testing
Discover more about our enterprise-grade and business protecting cybersecurity services on our Cybersecurity page.
Stay tuned for Part 2 of our series, where we’ll examine hacker activity patterns, identity threats, and the latest phishing techniques observed in 2024. Contact CinchOps today to learn how our comprehensive security solutions can protect your organization against these evolving threats.
If you would like to review the cyber threat report in full, visit Huntress 2025 Cyber Threat Report.