Apr 14, 2026 • Hazel Burton
State-sponsored threats: Different objectives, similar access paths
The Talos 2025 Year in Review highlights intensified state-sponsored cyber activity from China, Russia, North Korea, and Iran. These actors leverage...
Executive Summary
The Talos 2025 Year in Review highlights intensified state-sponsored cyber activity from China, Russia, North Korea, and Iran. These actors leverage vulnerabilities, identity compromise, and trusted access for espionage, financial gain, and disruption. North Korean group Famous Chollima executed the largest cryptocurrency heist in history ($1.5 billion) and infiltrated companies via fake IT workers. Iranian APT ShroudedSnooper targeted telecommunications using custom backdoors. Russian operations utilized malware like Dark Crystal RAT and Smoke Loader against Ukraine. Chinese actors exploited unpatched vulnerabilities for persistent access. Common tactics include social engineering, credential harvesting, and exploiting older networking device flaws. Defenders are urged to prioritize patching older systems, strengthen identity security, and increase visibility to detect long-term persistence mechanisms. The convergence of state-sponsored and financially motivated activities presents a complex threat landscape requiring robust defensive postures against both espionage and revenue-generating attacks.
Summary
A look at 2025 state-sponsored threats, exploring how actors linked to China, Russia, North Korea, and Iran use vulnerabilities, identity, and trusted access paths to achieve their goals.
Published Analysis
The Talos 2025 Year in Review highlights intensified state-sponsored cyber activity from China, Russia, North Korea, and Iran. These actors leverage vulnerabilities, identity compromise, and trusted access for espionage, financial gain, and disruption. North Korean group Famous Chollima executed the largest cryptocurrency heist in history ($1.5 billion) and infiltrated companies via fake IT workers. Iranian APT ShroudedSnooper targeted telecommunications using custom backdoors. Russian operations utilized malware like Dark Crystal RAT and Smoke Loader against Ukraine. Chinese actors exploited unpatched vulnerabilities for persistent access. Common tactics include social engineering, credential harvesting, and exploiting older networking device flaws. Defenders are urged to prioritize patching older systems, strengthen identity security, and increase visibility to detect long-term persistence mechanisms. The convergence of state-sponsored and financially motivated activities presents a complex threat landscape requiring robust defensive postures against both espionage and revenue-generating attacks. A look at 2025 state-sponsored threats, exploring how actors linked to China, Russia, North Korea, and Iran use vulnerabilities, identity, and trusted access paths to achieve their goals. Across the Talos 2025 Year in Review , state-sponsored threat activity from China, Russia, North Korea, and Iran all had varying motivations, such as espionage, disruption, financial gain, and geopolitical influence. But when you look at how these operations actually unfold, similar tactics, techniques, and procedures (TTPs) keep appearing: access through vulnerabilities and identity, and access that remains under the radar for a considerable period of time. Here are the dominant themes from the state-sponsored section of the Talos Year in Review, available now. China China-nexus threat activity stood out this year for both volume and efficiency, with Talos investigations increasing by nearly 75% compared to 2024. Newly disclosed vulnerabilities were exploited almost immediately (e.g., ToolShell), sometimes before patches were widely available. At the same time, long-standing, unpatched vulnerabilities in networking devices and widely used software continued to provide reliable entry points for these types of adversary. Once inside, the focus shifts to persistence. Web shells, custom backdoors, tunneling tools, and credential harvesting all support long-term access. There’s also more overlap than ever before between state-sponsored and financially motivated activity. It is likely that in some cases, state-sponsored actors conducted operations for personal profit alongside espionage-focused missions, while in others, cybercriminals collected valuable information during an attack that could be sold to espionage-motivated actors for further exploitation, providing them dual revenue streams. Russia Russian-linked cyber activity remains closely tied to their geopolitical objectives, particularly the war in Ukraine. Many operations continue to rely on unpatched, older vulnerabilities (especially in networking devices) to gain initial access. These flaws provide a dependable way in for adversaries and support long-term intelligence gathering. Russia’s offensive cyber activity is highly correlated with developments in the larger geopolitical sphere. For example, the announcement of sanctions intended to apply pressure on Russia by both the U.S. and E.U. often corresponded with our observed levels of Russian cyber activity. Common malware families like Dark Crystal RAT (DCRAT), Remcos RAT, and Smoke Loader appeared frequently in Talos investigations on operations against Ukraine in 2025. These families aren’t exclusive to Russia-nexus threat actors, but they continue to be effective in environments where patching and visibility are inconsistent, and should therefore be high priority targets for defense and monitoring. North Korea North Korea cyber operations leaned heavily into social engineering and insider access in 2025. These operations were both for financial and espionage purposes. Campaigns like Contagious Interview (orchestrated by Famous Chollima ) used fake recruiters from legitimate companies to socially engineering targets to execute code or hand over credentials. From there, actors stole cryptocurrency, exfiltrated data, and established persistent access. North Korean cyber actors also pulled off the largest cryptocurrency heist in history in 2025, stealing $1.5 billion . Additionally, thousands of IT workers used stolen identities and AI-generated profiles to secure positions at Fortune 500 companies, generating billions in annual revenue for North Korea’s nuclear weapons and ballistic missiles programs. Iran Iranian cyber threat activity in 2025 combined visible disruption with long-term access. Hacktivist operations increased by 60% in response to geopolitical events, particularly the Israel-Hamas conflict. These...
Linked Entities
- Dark Crystal RAT
- Remcos RAT
- Smoke Loader
- Famous Chollima
- ShroudedSnooper