ENISA Threat Landscape 2025
Cause-based threat classification analysis of ~4,900 incidents (July 2024 β June 2025)
The ReportTLCTC Cluster Threat Intensity
Score based on mention frequency and threat prominence in ENISA ETL 2025
Cluster Prevalence Ranking
Cluster Evidence from ENISA Report
Incident Distribution by Actor Type
Top 5 Targeted Sectors (EU)
TLCTC Attack Velocity Classes
Detailed Strategic Analysis
This section provides a deconstructed analysis of specific attack scenarios and actor methodologies derived from the ENISA report.
1. Executive Summary: The Cause vs. Effect Shift
The ENISA Threat Landscape 2025 reports on outcomes (Ransomware, Data Breaches, DDoS). Through the TLCTC lens, we reframe these findings to focus on the root causesβthe specific generic vulnerabilities leveraged to initiate these chains.
The 2025 landscape is defined by a polarization of entry vectors: High-velocity human manipulation (#9) versus rapid weaponization of server-side code flaws (#2).
2. Expanded Attack Path Analysis (Diagrams)
Below are the precise sequences of clusters forming the complex threats described in the report.
A. The "Ransomware" Ecosystem
Ransomware is not a single cluster. It is a sequence starting with human error or valid credentials, leading to abuse of functions.
Phishing Email] -->|Drops| B[#7 Malware
Loader/Trojan] B -->|Steals| C[#4 Identity Theft
Valid Creds] C -->|Auths to| D[#1 Abuse of Functions
Lateral Move/RDP] D -->|Deploys| E[#7 Malware
Encryptor] style A fill:#3498db,stroke:#2980b9,color:white style B fill:#e74c3c,stroke:#c0392b,color:white style C fill:#f1c40f,stroke:#f39c12,color:black style D fill:#9b59b6,stroke:#8e44ad,color:white style E fill:#e74c3c,stroke:#c0392b,color:white
B. The Supply Chain / State-Nexus Path
Sophisticated actors abuse trust in third-party components to bypass perimeter defenses, often staying silent for espionage.
Compromised Update] -->|Installs| B[#7 Malware
Backdoor/Shell] B -->|Harvests| C[#4 Identity Theft
Admin Keys] C -->|Exfiltrates via| D[#1 Abuse of Functions
Legit Cloud Sync] style A fill:#e67e22,stroke:#d35400,color:white style B fill:#e74c3c,stroke:#c0392b,color:white style C fill:#f1c40f,stroke:#f39c12,color:black style D fill:#9b59b6,stroke:#8e44ad,color:white
C. Public Facing Exploit (The "Edge" Breach)
Critical for VPNs and Exchange servers. The attacker exploits code directly to gain a foothold.
CVE in VPN/Edge] -->|Drops| B[#7 Malware
Web Shell] B -->|Harvests| C[#4 Identity Theft
Service Accounts] C -->|Auths to| D[#1 Abuse of Functions
Internal Network] style A fill:#9b59b6,stroke:#8e44ad,color:white style B fill:#e74c3c,stroke:#c0392b,color:white style C fill:#f1c40f,stroke:#f39c12,color:black style D fill:#9b59b6,stroke:#8e44ad,color:white
3. Detailed Actor Data
| Actor Profile (ENISA) | Primary Objective | Preferred TLCTC Clusters | Attack Velocity (At) |
|---|---|---|---|
| Cybercriminals | Financial Gain (Extortion) | #9 (Phish), #7 (Ransomware), #4 (Creds) | High (Automated via AI) |
| Hacktivists | Disruption / Ideology | #6 (DDoS), #2 (Web Defacement) | Med (Scripted Tools) |
| State-Nexus | Espionage / Pre-positioning | #10 (Supply Chain), #2 (0-Days), #1 (LotL) | Low (Stealth/Persistence) |