A new CyberThreat Report from Trellix for October 2025 indicates a blurring of lines between nation-state espionage and financially motivated cybercrime. Threat actors of all motivations are adopting similar, more sophisticated tactics, including the use of AI-powered malware, to increase the speed and scale of their attacks. The report, analyzing data from April to September 2025, identifies the industrial sector as the most heavily targeted, suffering 36.57% of all sector-based attacks. The research also confirms trends seen elsewhere: the United States is the most-attacked country, and the ransomware ecosystem is highly fragmented. A key technical finding is the overwhelming dominance of PowerShell as a tool in ransomware campaigns, featuring in over 77% of attacks.
The convergence of TTPs (Tactics, Techniques, and Procedures) between state-sponsored groups and e-crime syndicates makes attribution more difficult and raises the overall threat level for all organizations. Nation-state actors may engage in financially motivated attacks to fund their operations, while criminal groups adopt stealthy, persistent techniques traditionally associated with espionage.
Key Trends:
The report provides specific data on the tools used in ransomware campaigns, highlighting the prevalence of "Living off the Land" techniques.
T1059.001 - PowerShell was the tool of choice in 77.7% of campaigns for script execution and payload delivery.T1570 - Lateral Tool Transfer using PsExec was observed in 66.5% of attacks to move between systems.net commands were used in 70.2% of attacks for tasks like user creation and privilege checks.This data reinforces the need for defenders to focus on monitoring the usage of legitimate system tools, not just looking for known malware.
The focus on the industrial sector is particularly concerning due to the potential for physical consequences. A successful attack on an industrial control system (ICS) environment could lead to production shutdowns, equipment damage, environmental incidents, or even risks to human safety. The convergence of espionage and financial crime means that an attack that initially appears to be financially motivated could have a secondary objective of stealing intellectual property or establishing long-term persistence for future disruption.
Constrained Language Mode for regular users, which limits access to dangerous commands, while allowing full access for administrators.Use application control to restrict the use of PowerShell and other potentially abused administrative tools.
Mapped D3FEND Techniques:
Crucial for the industrial sector to separate IT and OT networks to prevent attacks from crossing over.
Mapped D3FEND Techniques:
Use EDR solutions to detect malicious behaviors and chains of activity, even when legitimate tools are used.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats