Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponisation, and the Obsolescence of “Time to Patch”
Rapid7’s latest Q3 2025 Threat Landscape Report reveals how cybercriminals are accelerating exploitation timelines, consolidating ransomware alliances, and weaponising AI to outpace defenders.
Posted: Thursday, Nov 13
  • KBI.Media
  • $
  • Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponisation, and the Obsolescence of “Time to Patch”
Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponisation, and the Obsolescence of “Time to Patch”

Rapid7, a leader in threat detection and exposure management, has released its Q3 2025 Threat Landscape Report, revealing how threat actors are accelerating the race between vulnerability disclosure and exploitation, consolidating ransomware power structures, and increasingly weaponising artificial intelligence to evade detection. The report draws from Rapid7’s Intelligence Hub, AttackerKB, incident response, and managed detection and response (MDR) telemetry, offering data-driven insight into how adversaries are evolving and how defenders can adapt.

“Ransomware has evolved significantly beyond its early days to become a calculated strategy that destabilises industries,” said Raj Samani, Chief Scientist at Rapid7. “In addition, the groups themselves are operating like shadow corporations. They merge infrastructure, tactics, and PR strategies to project dominance and erode trust faster than ever.”

Critical vulnerability exploitation speeds up as old weaknesses persist

Rapid7’s quarterly analysis shows that the total number of newly exploited vulnerabilities trended downward, dropping 21% from Q2 to Q3. However, adversaries doubled down on older, unpatched weaknesses, including CVEs more than a decade old, indicating that historic exposures remain potent attack vectors.

The mass exploitation of critical vulnerabilities in Microsoft SharePoint (CVE-2025-53770) and Cisco ASA/FTD products underscores the narrowing window between patch disclosure and in-the-wild attacks.

“The moment a vulnerability is disclosed, it becomes a bullet in the attacker’s arsenal,” said Christiaan Beek, senior director of threat intelligence and analytics at Rapid7. “Attackers are no longer waiting. Instead, they’re weaponising vulnerabilities in real time and turning every disclosure into an opportunity for exploitation. Organisations must now assume that exploitation begins the moment a vulnerability is made public and act accordingly.”

Ransomware activity spikes with new alliances and innovative tactics

The quarter also saw 88 active ransomware groups, up from 65 in Q2 and 76 in Q1, signalling an increase in activity as well as underscoring these groups’ fluidity. Groups like Qilin, SafePay, and WorldLeaks led a wave of alliances targeting industries like business services, manufacturing, and healthcare, and experimenting with fileless operations, single-extortion data leaks, and affiliate service offerings such as ransom negotiation assistance, where a more senior member of the group partners with a less experienced player to extort the victim.

Generative AI lowers barriers as nation-state campaigns redefine cyber warfare

The report details how generative AI is lowering the barrier for creating convincing phishing campaigns and enabling adaptive malware, such as LAMEHUG, which can dynamically generate new commands.

Meanwhile, nation-state operators from Russia, China, and Iran refine their tactics, blurring the line between espionage and disruption by targeting supply chains and identity systems with an emphasis on stealth and persistence.

To read a full copy of the report, visit https://www.rapid7.com/research/report/threat-landscape-report-2025-q3/.

About the Rapid7 Threat Landscape Report

The Rapid7 Threat Landscape Report is a quarterly analysis of global adversary behaviour drawn from the company’s managed detection and response operations, vulnerability intelligence platforms, and threat research telemetry. The Q3 2025 edition provides one of the most comprehensive views of the global threat ecosystem: from ransomware and zero days to state-sponsored operations and AI-driven attacks.

Share This