April 2025 Cyber Environment Update

Security Insights  /  April 2025 Cyber Environment Update

Ben Watson & Allan Grant | SOC Analyst | 1 May 2025

Welcome to Fortian's April cyber threat environment summary!

April saw a sharp escalation in state-aligned cyber activity, with China and Russia intensifying operations and the U.S. scaling back its cyber defence leadership and funding with rising pressure on global cyber security infrastructure and frameworks like MITRE and CVE.

In Australia, the superannuation, education, and health sectors were hit by breaches, while new ransomware reporting laws and critical vulnerability advisories signalled a growing urgency to harden defences.

U.S.–China Cyber Tensions

In April, tensions between China and the United States continued over cyber issues. China accused the United States of launching cyberattacks against critical industries and breaching the registration system for the Asian Winter Games held in February. Chinese authorities claimed three National Security Agency (NSA) agents, allegedly supported by the Universities of California and Virginia Tech, activated pre-installed backdoors in Windows devices to access personal information of athletes and support staff involved in the games.

China responded by issuing arrest warrants for the agents and offering rewards for any information related to the alleged attacks. This move mirrors recent U.S. actions against Chinese nationals accused of state-sponsored attacks on American critical infrastructure.

The U.S. government denied involvement, just as China previously denied its role in similar U.S. infrastructure attacks. However, an April report by The Wall Street Journal alleged that in a secret meeting with the former Biden administration, Chinese officials admitted responsibility for the Volt Typhoon attacks, framing them as retaliation for U.S. support of Taiwan. SCMP, Reuters

U.S. Cyber Cuts and Layoffs

The U.S. administration moved forward with further cuts to cybersecurity programmes in April:

The Trump administration's cuts to US cybersecurity programs including CISA and MITRE have global implications, including for close allies like Australia.

Cybersecurity teams, including those in the Australian private sector, can rely heavily on U.S. provided cyber infrastructure and frameworks such as the ATT&CK and CVE. Uncertainty around these have the potential to affect how Australian organisations track and mitigate emerging threats.

Annual Threat Reports Released

April was a month in review with many cybersecurity providers releasing reports on the 2024 threat landscape. We have reviewed these reports and identified some concurrent themes, as follows:

Manufacturing industry targeted by threat actors

Chinese threat actors conducted the most cyber attacks

Lumma information stealer emerges as most prevalent stealer

FBI Releases Annual Internet Crime Report

ACSC Critical Advisories

Vulnerability reports

In April, the ACSC warned of active exploitation of two critical vulnerabilities:

Fortian recommends Australian organisations assess their inventory for exposure and apply updates as a priority.

Threat actors use "fast flux" to get around network security controls

The Australian ACSC, along with the US National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Canadian Centre for Cyber Security (CCCS), and New Zealand National Cyber Security Centre (NCSC-NZ) released a joint cybersecurity advisory on the "fast flux" technique being used by threat actors to subvert defences and communicate reliably with command-and-control servers. ACSC

Fast flux is a relatively old technique wherein threat actors rapidly change IP addresses associated with a domain's DNS record. This means that a single domain can map to dozens of different IP addresses. These IP addresses are often associated with botnets controlled by the threat actor. An extension of this technique, known as double flux, adds a layer of obfuscation by also rapidly changing the DNS name server responsible for resolving the domain. This means that defenders cannot easily block the DNS server resolving these malicious domains, nor can they easily block the IPs themselves. This technique is often paired with bullet-proof hosting providers and domain generating algorithms. By using these techniques in conjunction, it provides resilient hosting infrastructure for threat actors that is more difficult to detect and block for network defenders, and takedown for law enforcement.

Australian Cyber Policy

The Australian Cyber Security Legislative Package which consisted of three cyber security focused acts and was given royal assent in November 2024, is beginning to come into effect on the 4th of April and 30 May. The package introduces some major reforms including:

Australian Cybersecurity Incidents

Superannuation companies targeted in credential stuffing attack

NSW universities suffer data breaches

Two NSW universities suffered data breaches in April.

Car rental company Hertz breached

Police charge man with NSW Department of Justice website breach

Patient data stolen from Adelaide Women's and Children's Hospital

Key Takeaways for Australian Organisations

Australian organisations should undertake the following tactical actions:

CONTACT US

Sign up or speak with a Fortian Security Specialist

Request a consultation with one of our security specialists today or sign up to receive our monthly newsletter via email.

Get in touch