Follow the Money: How Cybercriminals Evolved Their Financial Attack Playbook in 2025
Kaspersky's 2025 financial threat report reveals surging infostealer activity, adaptive phishing campaigns, and shifting regional targeting patterns that every security team needs to understand.
This analysis is based on research published by Kaspersky Securelist. CypherByte adds analysis, context, and security team recommendations.
Executive Summary
Financial cyberthreats represent the most consistently monetized segment of the global threat landscape, and 2025 delivered no shortage of evolution. According to original research published by Kaspersky Securelist, the past year saw threat actors sharpen their toolsets across three primary attack vectors — phishing campaigns targeting financial credentials, PC-based banking malware, and a rapidly maturing ecosystem of information-stealing malware. The findings carry direct relevance for financial institutions, fintech operators, enterprise security teams, and individual consumers who rely on digital banking infrastructure. Understanding how these threats evolved is not optional tradecraft — it is baseline operational awareness for anyone defending assets with monetary value attached.
What makes the 2025 report particularly significant is its longitudinal perspective. Kaspersky's telemetry spans millions of endpoints globally, providing statistically meaningful signal across regions that are often underrepresented in Western-centric threat intelligence feeds. The outlook for 2026 outlined in the research suggests that the conditions enabling these threats — commoditized malware-as-a-service platforms, AI-assisted phishing lure generation, and an abundant underground market for stolen credentials — are not receding. If anything, the barrier to entry for financially motivated cybercrime continued to drop throughout 2025, and defenders must calibrate their posture accordingly.
Technical Analysis
The Kaspersky research segments the financial threat landscape into three distinct but increasingly interconnected categories, each with its own operational mechanics and threat actor profiles.
On the phishing front, the technical sophistication of delivery infrastructure continued to advance. Attackers made broader use of adversary-in-the-middle (AiTM) phishing kits, which intercept session tokens in real time rather than simply harvesting static credentials. These kits — many available commercially on underground forums — effectively bypass standard TOTP-based multi-factor authentication by relaying the authentication session between victim and legitimate service simultaneously. The result is that credential theft and session hijacking occur within a single interaction window, often before the victim has any indication that something is wrong. Domain infrastructure used in these campaigns leaned heavily on typosquatting, homograph attacks using lookalike Unicode characters, and abuse of legitimate cloud hosting providers to extend campaign longevity before takedown.
PC-based banking malware in 2025 operated predominantly through web injection frameworks that manipulate the DOM of banking pages rendered in the victim's browser, allowing attackers to add fraudulent fields, redirect transactions, or exfiltrate form data without the financial institution's infrastructure ever being touched. Families tracked in Kaspersky's telemetry maintained persistence mechanisms via scheduled tasks and registry run keys, communicated over encrypted C2 channels frequently tunneled through legitimate services to evade network-level detection, and incorporated anti-analysis techniques including virtual machine detection, sandbox evasion, and delayed execution routines. Distribution continued to rely heavily on malicious email attachments, SEO poisoning of software download searches, and trojanized pirated software distributed through torrent ecosystems.
The infostealer ecosystem deserves particular attention because of how it functions as upstream infrastructure for downstream financial fraud. Strains such as those in the Lumma, Vidar, and RedLine families — and their successors — operate as credential harvesters whose output is sold in bulk on Telegram-based marketplaces and dedicated underground shops. Buyers then use these credentials to conduct account takeovers, drain cryptocurrency wallets, initiate fraudulent wire transfers, or resell access to other threat actors. This separation of compromise and monetization creates a supply chain structure that is resilient to law enforcement disruption at any single node. The research notes that browser-stored autofill data, saved passwords, and session cookies — the latter enabling authentication bypass without knowledge of the underlying password — were among the highest-value exfiltration targets.
Impact Assessment
The affected surface area is broad. Retail banking customers remain primary victims of phishing and banking trojan campaigns, facing direct financial loss through unauthorized transactions, account takeovers, and fraudulent loan applications initiated with harvested identity data. Enterprise treasury and finance teams are targeted by more sophisticated business email compromise operations that leverage infostealer-sourced credentials to infiltrate email accounts and redirect payment flows. Cryptocurrency holders — both retail and institutional — face disproportionate risk given the irreversibility of blockchain transactions and the high density of credential reuse between crypto platforms and general web services. Regionally, Kaspersky's data highlights persistent high-activity zones across Eastern Europe, Southeast Asia, and Latin America, though no geography is categorically insulated from these threats.
The systemic consequence most underappreciated by organizations is the latency between infection and exploitation. Infostealer logs are often sold and actioned weeks or months after initial compromise, meaning that credential rotation policies calibrated to known breach events will routinely miss the window. A device silently compromised in Q1 may result in a fraudulent wire transfer attempted in Q3, long after any incident response activity has concluded.
CypherByte's Perspective
From where we sit, the 2025 financial threat landscape is best understood not as a collection of discrete attack types but as a vertically integrated criminal supply chain. Phishing delivers initial access or credentials. Banking trojans and infostealers convert that access into monetizable data. Underground markets aggregate and distribute that data. Fraud operators convert it into cash. Each layer has specialists, tooling, and pricing structures. Defending against any single layer without addressing the others produces diminishing returns. This is why purely perimeter-focused defenses — even well-configured ones — continue to fall short against financially motivated adversaries who have industrialized every phase of their operation.
The 2026 outlook implied by Kaspersky's research also warrants serious attention. As generative AI tooling becomes embedded in phishing lure production, the quality gap between high-sophistication nation-state social engineering and commodity criminal campaigns is narrowing rapidly. Security awareness training built around spotting grammatical errors and awkward phrasing will need structural revision. Detection strategies must shift further toward behavioral signals and anomalous authentication patterns rather than content-based heuristics that threat actors have already learned to defeat.
Indicators and Detection
Security teams should orient detection engineering efforts around the behavioral signatures most consistent with the threats documented in this research. Key indicators and detection opportunities include:
Phishing and AiTM: Monitor for impossible travel in authentication logs — session tokens appearing from geographies inconsistent with user baselines immediately following authentication events. Flag logins that bypass MFA prompts anomalously. Inspect DNS query logs for newly registered domains with high lexical similarity to monitored financial brands using homoglyph detection tooling.
Banking Malware: Endpoint telemetry should alert on browser process injection, unexpected scheduled task creation by Office or productivity applications, and outbound encrypted traffic to domains with low reputation scores or recently issued TLS certificates. PowerShell and WMIC invocations from document-rendering processes warrant immediate triage.
Infostealers: Watch for bulk reads of browser profile directories — particularly Login Data, Cookies, and Web Data SQLite databases — by processes other than the browser itself. Credential manager access outside of expected tooling, and ZIP or archive creation events in user temp directories immediately preceding outbound connections, are high-fidelity behavioral indicators.
Recommendations
Based on the findings documented by Kaspersky Securelist and CypherByte's own assessment of the threat environment, we recommend the following prioritized actions for security teams:
1. Transition MFA to phishing-resistant standards. Deprecate TOTP and SMS-based MFA for any system with financial access. Prioritize FIDO2/WebAuthn hardware keys or passkey implementations that are architecturally resistant to AiTM interception.
2. Implement continuous session validation. Session cookies are as valuable as passwords in the current threat model. Deploy controls that bind session tokens to device fingerprint and IP context, and enforce re-authentication on anomalous session characteristics.
3. Conduct proactive credential exposure monitoring. Subscribe to threat intelligence feeds that surface infostealer log dumps. Organizations should have a process for ingesting compromised credential notifications and forcing rotation before threat actors have the opportunity to weaponize harvested data.
4. Harden endpoint browser environments. Restrict browser-stored credential autofill for systems that access financial platforms. Consider enterprise password manager deployment as a controlled alternative that does not expose credentials through browser-accessible SQLite databases.
5. Revisit security awareness training content. Update phishing simulation and training programs to reflect AI-generated lure quality. Shift user education emphasis from content-based red flags toward process-based verification habits — confirming payment changes through out-of-band channels, scrutinizing sender domains at the character level, and treating urgency as a risk signal rather than an action trigger.
6. Segment financial transaction systems. Ensure that endpoints used for treasury, payroll, or high-value financial operations are network-segmented, subject to enhanced monitoring, and excluded from general-purpose browsing and email workflows wherever operationally feasible.
This analysis is based on original research published by Kaspersky Securelist. Full report and regional statistics are available at the original source: https://securelist.com/financial-threat-report-2025/119304/. CypherByte analysis represents our independent assessment of the research findings and their implications for enterprise security posture.
Get full access to all research analyses, deep-dive writeups, and premium threat intelligence.