Cybersecurity

Monthly Threat Intelligence Report: June 2025

AMVIA's June 2025 threat intelligence report covers the month's top attack trends, active threat actor campaigns, notable vulnerabilities and recommended defensive actions for UK businesses. Key themes this month include AI-assisted phishing campaigns, critical Microsoft Exchange vulnerabilities and continued ransomware activity against UK SMEs.

NH

Nathan Hill-Haimes

Technical Director

7 min read·Mar 2026

Executive Summary

June 2025 saw continued elevated phishing volumes targeting UK business email, with several active campaigns using AI-generated personalised lures that proved harder to detect through conventional training. The month also saw two critical vulnerabilities disclosed in widely used enterprise software with active exploitation observed within 48 hours of public disclosure — reinforcing the importance of rapid patch deployment workflows.

Ransomware affiliates continued to target SMEs in UK professional services, manufacturing and healthcare sectors. Average recovery time from a significant ransomware incident in the UK remains approximately 21 days, with average recovery costs — inclusive of forensics, remediation and business interruption — substantially exceeding initial ransom demands even when the ransom is not paid.

Top Threats: June 2025

AI-Assisted Spear Phishing

Multiple campaigns this month used AI-generated personalisation to craft phishing emails that referenced recipients' job titles, recent company announcements and LinkedIn activity. These emails bypassed traditional phishing indicators (generic salutation, poor grammar, irrelevant content) and achieved higher click rates in environments relying primarily on human vigilance for phishing detection.

Recommended action: Ensure email security filtering includes AI-based behavioural analysis, not just reputation and signature matching. Supplement user training with guidance on AI-personalised phishing, which looks legitimate precisely because it is personalised.

Microsoft Exchange and Outlook Vulnerabilities

CVE-2025-3087 (critical, CVSS 9.8), a remote code execution vulnerability in Microsoft Exchange Server, was disclosed in early June 2025 and had confirmed active exploitation within 48 hours. On-premises Exchange deployments that had not applied the June Patch Tuesday updates were vulnerable.

Recommended action: Businesses running on-premises Exchange should apply June 2025 Cumulative Updates immediately. Businesses on Exchange Online (Microsoft 365) were not affected. AMVIA recommends all clients on on-premises Exchange complete a migration roadmap assessment if one has not been undertaken recently.

Business Email Compromise (BEC) via MFA Bypass

Adversary-in-the-middle (AiTM) phishing kits continued to be widely used in June. These kits proxy the authentication session in real time, capturing session tokens and bypassing standard MFA prompts. Victims visit a phishing page that appears to be a legitimate Microsoft sign-in, enter credentials and MFA code, which the attacker relays to the real Microsoft service in real time — capturing the authenticated session token.

Recommended action: Transition from SMS/TOTP-based MFA to phishing-resistant MFA methods: FIDO2 hardware security keys or Microsoft Entra ID's passkey support. Where passkeys are not yet deployed, Conditional Access policies with sign-in risk detection provide partial mitigation by flagging anomalous authenticated sessions.

Vulnerability Spotlight

Key vulnerabilities requiring attention in June 2025:

  • CVE-2025-3087: Microsoft Exchange Server RCE — Critical (CVSS 9.8). Patch immediately.
  • CVE-2025-2991: Fortinet FortiGate SSL-VPN authentication bypass — High (CVSS 8.1). Patch and audit VPN access logs for exploitation indicators.
  • CVE-2025-3156: VMware vCenter heap overflow — Critical (CVSS 9.0). Affects virtualisation infrastructure; patch immediately in production environments.
  • CVE-2025-2844: Progress MOVEit Transfer SQL injection — High (CVSS 8.8). MOVEit has been a consistent target since 2023; prioritise patching if in use.

Ransomware Activity Summary

Active ransomware groups observed targeting UK organisations in June 2025:

  • LockBit 4 (rebranded): Continued activity following law enforcement disruption; new RaaS infrastructure observed. Targeting manufacturing and logistics.
  • Akira: Active against UK professional services firms, exploiting unpatched VPN appliances as initial access vector.
  • RansomHub: Healthcare and education sector focus; double extortion (encrypt and exfiltrate) model.

All three groups demonstrated capability to move from initial access to ransomware detonation in under 12 hours in some observed incidents — highlighting that response SLAs matter as much as detection capability.

Recommended Actions for July

  1. Apply all June Patch Tuesday updates to Windows endpoints, Exchange Server and any Fortinet/VMware infrastructure
  2. Review MFA configuration — assess readiness to migrate to phishing-resistant methods
  3. Run a tabletop ransomware exercise — test your incident response plan before an incident
  4. Audit VPN access logs for the indicators associated with CVE-2025-2991 exploitation
  5. Confirm offline backup integrity — verify that your most recent clean backup is restorable

Is Your Business Protected Against These Threats?

AMVIA's managed detection and response service monitors your environment for the indicators associated with active threat campaigns, providing 24/7 detection and response capability.

Frequently Asked Questions