
Google GTIG: Zero‑Day Exploits Shift Toward Enterprise Targets in 2025
Context and Chronology
GTIG’s year‑end review documents a definable reorientation of offensive investment toward corporate infrastructure in 2025: appliances, management planes and operating systems together accounted for an unusually large share of observed exploited zero‑days. The strategic consequence is that initial access increasingly delivers broad network privileges, enabling faster lateral movement and larger blast radii for intrusions that begin at the edge. The report’s technical annex (GTIG 2025 review) links this pattern to both bespoke commercial surveillance tooling and rapid re‑use of disclosed flaws by brokers and mid‑tier operators.
Complementary industry reporting supplies concrete operational examples that illuminate the GTIG narrative and reconcile apparent contradictions. Researchers tracked prolonged, real‑world exploitation of CVE‑2025‑8088 (WinRAR), used across state‑linked espionage and criminal campaigns, while other incidents showed disclosed appliance bugs being weaponized in hours or days (an Ivanti VPN issue was observed exploited within ~48 hours). Those cases show how both legacy desktop utilities and internet‑facing management interfaces can serve as efficient attack vectors into enterprise and supply‑chain ecosystems.
At the same time, multiple sources emphasize that human‑facing vectors and consumer‑grade networking gear remain critical footholds: attackers often chain socially engineered lures, compromised collaboration accounts, or SOHO router compromises into enterprise intrusions. In practice this means the shift to enterprise targets does not eliminate consumer‑side exposure — it repurposes it into higher‑yield stepping stones that feed enterprise‑impacting exploits.
Tradecraft trends amplified across reports converge on two accelerants: commoditized exploit availability (exploit brokers and underground sellers offering ready‑made tooling) and AI/agentic automation that compresses reconnaissance-to‑weaponization timelines. CrowdStrike, IBM X‑Force and GTIG field data together document large increases in model‑assisted reconnaissance, automated validation of targets, and programmatic exploitation that reduce containment windows to minutes or even seconds in some measured events.
Industrial and OT‑focused reporting (Dragos and peers) adds another dimension: new clusters emerged in 2025 that specialize in access brokering, SOHO/edge pivoting and IT‑to‑OT movement, increasing the probability that initial appliance compromises will be converted into operational disruption. The combined picture is therefore one of faster, higher‑payoff operations in which a single reliable exploit can be reused across espionage, crime and disruption campaigns.
Defensive implications are concrete: organizations must improve firmware hygiene, shorten patch‑and‑validate cycles for edge appliances, and expand telemetry fusion across endpoint, identity, cloud and management planes. Identity‑first controls (hardware‑backed MFA, rapid session revocation, attestation for agentic tools) and verified cybersecurity baselines for suppliers are repeatedly called out as high‑leverage mitigations in GTIG and allied reporting.
Operationally, SOCs should treat appliance and archive‑handling telemetry as first‑class signals (the WinRAR case shows archive extractors remain an effective delivery channel), and incident playbooks must assume rapid conversion from disclosure to exploitation. Procurement and vendor assurance must press for faster update SLAs and richer telemetry from appliance vendors; where patches cannot be applied quickly, compensating segmentation and deny‑list controls are essential.
Taken together, the GTIG findings plus corroborating industry cases create a coherent threat narrative: attackers are reallocating effort toward enterprise‑impacting vectors while continuing to exploit human and consumer touchpoints as enablers, and AI‑assisted automation and exploit commoditization are amplifying both speed and scale. The net effect is higher containment costs and more complex lateral escalation patterns that will stress traditional incident response playbooks unless organizations accelerate telemetry investments and automation with strong human oversight.
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Google rolls Android updates to fix exploited Qualcomm zero-day
Google issued Android security updates patching roughly 130 vulnerabilities, including an exploited Qualcomm graphics zero-day, CVE-2026-21385 (CVSS 7.8). Organizations must prioritize devices on the 2026-03-01 and 2026-03-05 patch levels to close immediate exposure and treat this as part of a wider cross‑vendor wave of in‑the‑wild fixes (see recent Chrome and document‑parser advisories) that increases urgency for rapid deployment and verification.
Google flags intensifying cyber campaigns against the global defense supply chain
Google’s Threat Intelligence Group alerts that coordinated cyber campaigns against firms and personnel in the defense industrial base are increasing, combining long‑dwell implants, commodity exploit reuse, and LLM-assisted social engineering. The advisory urges identity‑first controls, extended cross‑domain telemetry to suppliers and staff, hardware-backed MFA and governed agentic automation to shorten attackers’ windows and blunt supply‑chain impact.

Microsoft pushes urgent Office patch for a newly exploited zero-day used in targeted intrusions
Microsoft released fixes for CVE-2026-21509 after detecting active exploitation that undermines Office protections; mitigations and patches cover major supported Office builds and CISA has flagged the flaw for immediate remediation. The vulnerability appears to be leveraged in focused operations requiring user interaction and complex exploit chains, elevating the priority for high-value targets to deploy updates quickly.
Google: Multiple APTs and crime syndicates widely exploited a critical WinRAR flaw
Google Threat Intelligence Group says a high-severity WinRAR vulnerability (CVE-2025-8088) has been actively abused for months by both nation-state actors and financially motivated groups. Attackers leveraged crafted RAR archives and hidden alternate data streams to place persistent payloads — affecting government, military, technology, travel, and banking targets globally.

Dell RecoverPoint Zero-Day Exploited by China-Linked Cyberespionage Group
A China-linked espionage cluster abused a hardcoded-credential flaw in Dell RecoverPoint for Virtual Machines to escalate privileges, move laterally, and deploy bespoke malware; Dell released patch 6.0.3.1 HF1 and vendors published IoCs and behavioral indicators. The incident underscores a broader trend of rapid weaponization of management and recovery tooling, forcing organisations to pair urgent patching with compensating network controls and extended telemetry into virtualization stacks.

Google GTIG Disrupts IPIDEA Residential Proxy Network in the United States
Google's Threat Intelligence Group, allied with infrastructure partners, dismantled the IPIDEA residential proxy operation that hijacked Android phones and Windows PCs to relay adversary traffic. The takedown targeted command-and-control points, shut down domains and updated detection signals to hinder future reuse of the same toolset.
Dragos: Three New Threat Clusters Escalate ICS/OT Risk in 2025
Dragos identified three previously unreported threat clusters in 2025 that expanded industrial-targeting techniques and raised the active tracked groups to 11 of 26. Complementary industry signals show automation and synthetic-media-driven social engineering are compressing time-to-weaponization and amplifying the operational risk these new clusters pose, forcing defenders toward identity-first controls and faster, automated containment.
Coruna Toolkit: iPhone Zero-days Move into Criminal Markets
The Coruna exploit toolkit — a polished WebKit chain targeting iOS 13–17.2.1 — has appeared beyond government channels in a criminalized, modular form and likely reached tens of thousands of devices. Evidence suggests operators bought or re-hosted turnkey control panels and distribution builders (messaging/phishing), increasing resilience to takedown and raising urgency for emergency patches, telemetry hunts, and procurement controls for offensive tooling.