Market & Momentum - 08/18/2025

Ransomware gangs are climbing the supply chain, phishing is evolving beyond the inbox, and AI is fueling both sides of the fight. This week’s weather forecast: cloudy with a high chance of compromise if you don’t act.

In partnership with

Looking for unbiased, fact-based news? Join 1440 today.

Join over 4 million Americans who start their day with 1440 – your daily digest for unbiased, fact-centric news. From politics to sports, we cover it all by analyzing over 100 sources. Our concise, 5-minute read lands in your inbox each morning at no cost. Experience news without the noise; let 1440 help you make up your own mind. Sign up now and invite your friends and family to be part of the informed.

Cybercriminals are shifting from single-point attacks to compound strategies — hitting MSPs for scale, pairing AI reconnaissance with phishing for speed, and exploiting collaboration tools to bypass defenses. Think of it less like whack-a-mole, more like a coordinated storm front moving across multiple vectors.

📈 Risk Forecast – The Week Ahead 📉

Trend

Likelihood

What to Watch

AI-assisted phishing & deepfakes

8

Lures using fake prompts, voices, or CAPTCHAs

Ransomware-as-a-Service on MSPs

7

Attacks like Akira, Lynx exploiting service providers

Credential harvesting automation

8

36k/sec scan rates, MFA bypass toolkits

Collaboration app exploits

6

Teams/SharePoint as footholds into enterprises

Browser-based HEAT attacks

5

Phishing URLs outside traditional email vectors

🔎 Key Watchlist Items 🔍
  1. ClickFix phishing surge — Attackers disguising malicious links as “error prompts” or “CAPTCHA verifications”; incidents rose 400% this month.

  2. MSP-targeted RaaS campaigns — Akira and Lynx ransomware groups doubled down on managed service providers, affecting hundreds of downstream clients.

  3. AI-powered credential theft — Automated scanning rates hit 36,000 probes per second, with living-off-the-land tactics masking activity.

  4. Microsoft Teams RCE (CVE-2025-53783) — Exploit kits now integrate this vuln; attackers can execute arbitrary code in chats.

  5. HEAT-style phishing — Non-email vectors (QR, SMS, disguised URLs) bypass standard security gateways.

📊 Emerging Patterns 📊

Social engineering convergence — Campaigns now chain voice deepfakes + phishing + smishing in a single playbook.

Supply chain scaling — Ransomware operators find MSPs a more profitable pivot than hospitals or schools.

Speed through automation — Recon and credential theft no longer take weeks — they happen in minutes via AI-driven scanning.

Collaboration as the soft spot — Attacks on Teams/SharePoint show collaboration tools are the new perimeter.

Detection blind spots — Traditional filters can’t catch HEAT attacks or deepfake-enabled vishing; defenders need new lenses.

⏰ Call to Action ⏰

AI phishing: Mandate phishing-resistant MFA; run a 15-minute refresher on recognizing fake “fix prompts” this week.

MSP ransomware: Require every MSP/vendor to provide proof of segmentation, MFA, and offline backups.

Automated credential theft: Audit external exposure points; enable throttling/rate-limits where possible.

Collab app exploits: Validate Teams patch compliance across all tenants; alert on unusual message injection or deletion.

HEAT phishing: Enforce browser isolation or sandboxing for high-risk users; block access to unclassified domains.

⚡ Monday Motivation ⚡

Last week, INTERPOL announced its AI-driven cyber task force intercepted 50,000 stolen accounts before they could be sold!

A reminder that defenders win when they invest in speed and automation, too.

The battlefield is now automated, AI-enhanced, and psychology-first.
Stay alert, train hard, and patch even harder.

J.W.

(Forward to your CISO & Add to Board Briefing.)

Start learning AI in 2025

Keeping up with AI is hard – we get it!

That’s why over 1M professionals read Superhuman AI to stay ahead.

  • Get daily AI news, tools, and tutorials

  • Learn new AI skills you can use at work in 3 mins a day

  • Become 10X more productive