Cybercrime Escalates in 2025 as Hackers Target Everyday Devices with Sophisticated Attacks

“We’re handing attackers the keys to critical operations,” warns Forescout CEO Barry Mainz, noting that 50% of the most vulnerable devices 2025 are routers, the gatekeepers of home and enterprise networks. Hybrid Broadcast-Broadband Television (HbbTV) technology, used in European smart TVs, exemplifies these risks: attackers can inject malicious code via radio signals to hijack devices, steal credentials, and even compromise home networks. Recent research reveals that 33% of device vulnerabilities in 2025 originate from IoT and Internet of Medical Things (IoMT) systems, a sharp increase from 2024. The Data Security Council of India warns that 40% of 2025’s cyber incidents will involve AI-driven tactics, including “adaptive malware” that modifies its code in real time to bypass security protocols. This year has seen a dramatic shift in attacker tactics, with malicious actors exploiting vulnerabilities in everyday devices, from devices to medical implants, to implant-coordinated campaigns. “The future of cybersecurity isn’t just about technology; it’s about building a culture of vigilance,” notes Pankit Desai of Sequretek, referencing the 500 million attacks recorded in Q1 2025 alone. The Ballista botnet, active since early 2025, has infected 6,000+ TP-Link routers globally by exploiting a known flaw (CVE-2023-1389), enabling distributed denial-of-service (DDoS) attacks on municipal services. While tools like post-quantum encryption and zero-trust architectures show promise, their success hinges on universal adoption, a daunting task in a world where 30% of medical devices still run unsupported operating systems. The proliferation of Internet of Things (IoT) devices has created a sprawling attack surface, with poorly secured smart TVs, routers, and wearables becoming prime targets. Retail networks, ranked the sector with the riskiest devices, have become battlegrounds for credit card skimming malware deployed through compromised point-of-sale terminals. Google’s Cybersecurity Forecast 2025 highlights automated threat-hunting platforms that analyze petabytes of network data to identify anomalies, reducing incident response times by 65%. In January 2025, a ransomware gang paralyzed a Midwestern hospital chain by exploiting unpatched vulnerabilities in patient monitoring systems. Healthcare and retail sectors now face disproportionate risks, with IoMT devices like insulin pumps and MRI machines showing a 15% year-over-year vulnerability increase. Meanwhile, regulatory bodies are tightening mandates: the EU’s upcoming Cyber Resilience Act will require IoT manufacturers to provide 5-year security update guarantees and vulnerability disclosure programs. Experts advocate for two-factor authentication and network segmentation on the consumer front, isolating smart devices on separate VLANs to contain breaches. Such incidents underscore the cascading effects of targeting foundational infrastructure: a single router breach can disrupt traffic systems, emergency response networks, and power grids. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. As ransomware, AI-driven malware, and state-sponsored attacks converge, the lines between personal and systemic risk have blurred, leaving individuals, corporations, and governments scrambling to fortify defenses. While high-profile incidents like the Nest thermostat hack, where intruders manipulated temperatures and communicated via compromised cameras, remain rare, they highlight the psychological and operational impacts of device hijacking. The global cost of cybercrime is projected to reach $10.5 trillion annually by 2025, underscoring the unprecedented scale of digital threats in an increasingly connected world. The lesson is clear for individuals: in 2025, every connected device is a potential frontline in the cyber war. Threats have more than doubled in the smart home sector since 2024, with IP cameras facing over 17 million attacks.

This Cyber News was published on cybersecuritynews.com. Publication date: Mon, 12 May 2025 09:55:09 +0000


Cyber News related to Cybercrime Escalates in 2025 as Hackers Target Everyday Devices with Sophisticated Attacks

The New Cybercrime Atlas: A Collaborative Approach to Fighting Digital Crime - The global transition to the digital economy means that the operations of governments, critical infrastructures, businesses, and individuals are now a tightly integrated system of interconnected resources. Cybercrime presents a significant risk to ...
1 year ago Feeds.fortinet.com
Cybercrime Escalates in 2025 as Hackers Target Everyday Devices with Sophisticated Attacks - “We’re handing attackers the keys to critical operations,” warns Forescout CEO Barry Mainz, noting that 50% of the most vulnerable devices 2025 are routers, the gatekeepers of home and enterprise networks. Hybrid Broadcast-Broadband Television ...
1 month ago Cybersecuritynews.com CVE-2023-1389
Stop, Collaborate and Listen: Disrupting Cybercrime Networks Requires Private-Public Cooperation and Information Sharing - As we reflect on 2022, we've seen that malicious actors are constantly coming up with new ways to weaponize technologies at scale to cause more disruption and devastation. The dangers are showing up everywhere - and more frequently. The volume and ...
2 years ago Securityweek.com
UN Cybercrime Convention: Tight Timeframe to Create New Global Approach to Combat Cybercrime - Cybercrime is a growing problem that affects nearly all of the world's nearly 200 nation-states. From ransomware attacks to rampant cryptocurrency theft, criminal exploitation of borderless digital systems threatens global economic security and the ...
2 years ago Csoonline.com
Prioritizing cybercrime intelligence for effective decision-making in cybersecurity - In this Help Net Security interview, Alon Gal, CTO at Hudson Rock, discusses integrating cybercrime intelligence into existing security infrastructures. Our discussion will cover a range of essential aspects, from the importance of continuous ...
1 year ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
Microsoft takes down websites used to create 750 million fraudulent accounts - Microsoft seized certain websites run by a Vietnam-based group that created roughly 750 million fraudulent Microsoft accounts after the software maker received a court order a week ago from the Southern District of New York. Posting to its blog Dec. ...
1 year ago Packetstormsecurity.com
Cyber Insights 2023: Criminal Gangs - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. Despite some geopolitical overlaps with state attackers, the majority of ...
2 years ago Securityweek.com
Latest Information Security and Hacking Incidents - Cybercrime has transpired as a serious threat in India, prompting calls for comprehensive reforms and collaborative efforts from various stakeholders. Experts and officials emphasise the pressing need to address the evolving nature of cyber threats ...
1 year ago Cysecurity.news
CVE-2021-41769 - A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < ...
3 years ago
How Hackers Interrupted GTA 5 Online Gameplay on PC - Recently, a cyber-attack on Grand Theft Auto 5 Online on PC caused an interruption to thousands of players’ gameplays. The game was completely taken offline and players couldn’t even access the main gameplay menu. The attack caused an uproar ...
2 years ago Hackread.com
Why Have Big Cybersecurity Hacks Surged in 2023? - Payments made to hackers who hold systems hostage for ransom increased by almost half through September, according to blockchain analytics firm Chainalysis Inc., totaling almost $500 million in payouts. In just the past few months, hackers have ...
1 year ago Bloomberg.com LockBit
Understanding the Escalating Threat of Web DDoS Tsunami Attacks - Whether it's hacktivists conducting cyberwarfare or ransom-seeking criminals targeting vulnerable firms in financial services, retail, energy, or transportation, a new breed of destructive distributed denial of service attack - the Web DDoS Tsunami - ...
1 year ago Cyberdefensemagazine.com
6 Facts About How INTERPOL Fights Cybercrime - Interpol recently celebrated its 100th anniversary, and as it steps into its second century of operation it remains highly relevant as a policing organization of our technical age. Interpol's global cybercrime program is one of four law enforcement ...
1 year ago Darkreading.com
20 Best Remote Monitoring Tools - 2025 - What is Good ?What Could Be Better ?Strong abilities to keep an eye on devices and systems.Some parts may take time to figure out.It gives you tools for remote control and troubleshooting.There could be more ways to change things.Lets you automate ...
2 months ago Cybersecuritynews.com
Hive Ransomware Infrastructure Seized by Police - Breaking News - Police have recently seized the entire infrastructure of the Hive ransomware by arresting a group of criminals in Europe. This ransomware is believed to be the root cause of many cyber-attacks taking place across the globe. This significant seizure ...
2 years ago Thehackernews.com
North Korean Hackers Use Fake Job Offers & Salary Bumps as Lure for Crypto Theft - Recent investigations have uncovered a massive operation carried out by North Korean hackers looking to steal cryptocurrency through fake job offers and salary bumps. According to recent reports, hackers have been able to trace the malicious ...
2 years ago Therecord.media
Riot Games Hacked: What You Need to Know - Riot Games, the company responsible for the popular video game League of Legends, has been hacked. This attack is the latest example of cyber-crime hitting the gaming industry, putting user data and information at risk. In this article, we’ll ...
2 years ago Securityaffairs.com
Telegram Emerges as Hub for Cybercrime, Phishing Attacks as Cheap as $230 - Cybersecurity experts raise alarms as Telegram becomes a hotspot for cybercrime, fueling the rise of phishing attacks. In a recent development, cybersecurity researchers shed light on the democratization of the phishing landscape, courtesy of ...
1 year ago Cysecurity.news
Booking.com hackers increase attacks on customers - Hackers are increasing their attacks on Booking.com customers by posting adverts on dark web forums asking for help finding victims. Cyber-criminals are offering up to $2,000 for login details of hotels as they continue to target the people who are ...
1 year ago Bbc.com
Holiday Hackers: How to Safeguard Your Service Desk - Hackers really don't take holidays, but they will take advantage of them. Many of these cyberattacks will zero in on the service or help desk to gain entry into network systems. Recovering accounts because of forgotten passwords is one of the ...
1 year ago Bleepingcomputer.com
FBI disrupts Moobot botnet used by Russian military hackers - The FBI took down a botnet of small office/home office routers used by Russia's Main Intelligence Directorate of the General Staff in spearphishing and credential theft attacks targeting the United States and its allies. This network of hundreds of ...
1 year ago Bleepingcomputer.com Fancy Bear APT28 Turla Volt Typhoon
GTA 6 Hacker: Life in Secure Hospital for Cybercrime Intent - The teenage hacker who leaked details about Grand Theft Auto 6 is now facing a life sentence in a guarded institution, which is a surprise development. The person, identified as Lapsus, was placed under an indefinite hospital order because of worries ...
1 year ago Cysecurity.news
Claroty Team82: 63% of Known Exploited Vulnerabilities Tracked by CISA Are on Healthcare Organization Networks - PRESS RELEASE. NEW YORK and ORLANDO, Fla., March 12, 2024/PRNewswire/ -Claroty, the cyber-physical systems protection company, released today at the annual HIMSS24 conference a new report that uncovered concerning data about the security of medical ...
1 year ago Darkreading.com
Staying Ahead of Adversarial AI with Incident Response Automation - The security operations community constantly seeks advancements in incident response. Consolidating security telemetry data, upgrading your organization's cybersecurity posture, and integrating with various artificial intelligence and machine ...
11 months ago Securityboulevard.com