Axios Future of Cybersecurity

June 17, 2025
Happy Tuesday! Welcome back to Future of Cybersecurity.
- 📬 Have thoughts, feedback or scoops to share? [email protected].
Today's newsletter is 1,510 words, a 5.5-minute read.
1 big thing: U.S. companies brace for Israel-Iran cyber spillover
As Israel and Iran exchange airstrikes, cybersecurity experts are warning that a quieter, but still destructive, digital conflict is unfolding behind the scenes.
- And U.S. companies could soon find themselves in the blast radius.
Why it matters: Iran and Israel are home to some of the world's most skilled hackers. Escalating tensions between the two could spill over into cyberspace, potentially disrupting critical infrastructure, commercial networks and global supply chains.
Driving the news: U.S. cybersecurity organizations are urging businesses to remain on high alert for possible Iranian cyberattacks on domestic infrastructure.
- The Food and Ag-ISAC and the IT-ISAC published a joint statement Friday urging companies to proactively bolster their defenses, noting a history of Iranian state-sponsored hackers and hacktivism targeting U.S. critical infrastructure during previous conflicts.
- Radware, a U.S.-based cybersecurity firm, estimated there's been a 700% increase in Iranian cyberattacks against Israeli targets since Israel launched its initial missile strike on Tehran on June 12.
Threat level: The scale and nature of potential Iranian cyberattacks on American organizations will likely depend on how the U.S. responds to the broader military conflict.
- As of now, the Trump administration has told allies it will not intervene unless Iran directly targets Americans.
- But if that decision changes, Iran could redirect cyber resources toward state-sponsored ransomware campaigns or wiper malware attacks on U.S. infrastructure, Austin Warnick, director of national security intelligence at Flashpoint, told Axios.
Zoom in: Gil Messing, chief of staff at Israel-based Check Point Software Technologies, told Axios that he's observed several disinformation campaigns appearing to originate from Iranian-linked actors in the days following the strikes.
- One such campaign involved a text message sent to thousands of Israelis warning that fuel supplies would be halted at gas stations for 24 hours.
- Another message falsely warned of a possible terrorist attack at a regional shelter, urging recipients to avoid the area — an apparent attempt to sow panic during missile attacks.
- Both messages were crafted to appear as if they came from Israel's Home Front Command, but they were fake, Messing said.
- He added that he's also seen lower-level cyber activity potentially linked to Iran, including DDoS attacks and phishing campaigns.
What they're saying: "Their main objective is intimidation, fake news, [and] disinformation, much more than anything else," Messing told Axios.
- He added that much of the current Iranian cyber activity is "lower profile" — in part because Tehran appears to be focusing the bulk of its resources on physical warfare right now.
The big picture: During traditional military conflicts, cyberattacks are often deployed to incite fear and confusion among civilians. More destructive operations — such as infrastructure attacks — tend to emerge only in the lead-up to major strikes or invasions, as seen before Russia's 2022 invasion of Ukraine.
- Messing said that's why Iran appears to be focusing on disinformation and smaller-scale attacks so far. The goal currently is to incite fear.
Reality check: Israel also poses a formidable cyber threat in this conflict. However, its digital offensives are expected to remain focused on Iranian targets, Warnick said.
- A pro-Israel hacking group claimed responsibility for a cyberattack this morning on Iran's Bank Sepah, causing widespread outages. The group also claims it "destroyed" all of the bank's data.
- Israel has a long history of sophisticated cyber operations, most notably the Stuxnet attack that targeted Iran's nuclear program.
- Its intelligence units, particularly Unit 8200, are also known for advanced cyber espionage capabilities.
What to watch: As with the aftermath of the Oct. 7 Hamas attacks, cybersecurity experts anticipate an uptick in activity from politically motivated hackers seeking to amplify their influence during the conflict.
2. Hackers eye insurance companies, Google warns
Notorious cybercriminal gang Scattered Spider has been targeting U.S. retailers and is now going after insurance companies, Google warned yesterday.
Why it matters: The hacking group, which has no apparent ties to any government, has been on a hacking spree in recent months — causing U.K. and U.S. retailers to shut down parts of their operations.
Driving the news: Google's threat intelligence team said in an email to reporters yesterday that it's seen evidence of Scattered Spider targeting insurance companies.
- "Google Threat Intelligence Group is now aware of multiple intrusions in the U.S. which bear all the hallmarks of Scattered Spider activity," John Hultquist, chief analyst at Google Threat Intelligence Group, said in a statement.
- "Given this actor's history of focusing on a sector at a time, the insurance industry should be on high alert, especially for social engineering schemes which target their help desks and call centers," he added.
- Charles Carmakal, chief technology officer at Google's Mandiant Consulting, said that the hacks against insurance companies started about a week and a half ago.
- Google offered no further details about which insurance companies are under siege.
Catch up quick: Scattered Spider is believed to be a group of teens and 20-somethings based in the U.K., the U.S., Canada and other Western countries.
- They're known for their social engineering schemes. In some cases, they call employees pretending to be their companies' IT team to get their login credentials.
- CBS' "60 Minutes" recently reported that the group could now be getting help from Russian ransomware gangs, too.
- Scattered Spider's past targets include MGM Resorts, Caesars Entertainment and more. The FBI has struggled to stop this group, despite their Western locations.
What to watch: It's unclear as of now how Scattered Spider is breaking into companies during this current spree, including whether they're relying on social engineering or if they're exploiting a vulnerability in a third-party vendor.
Go deeper: Cyberattacks hit U.S. retailers at the worst possible time
3. WormGPT makes a comeback
Researchers have uncovered two new variants of an underground generative AI chatbot designed for cybercriminals running on top of xAI's and Mistral's models, according to a report released today.
Why it matters: The new research offers a rare glimpse into how far the cybercriminal underground has come in deploying and customizing generative AI tools.
Zoom in: Security researchers at Cato Networks say they found two previously unreported large language models that help cybercriminals carry out everyday tasks — from phishing to credential theft.
- Jailbreak prompts used by the researchers caused the chatbots to leak internal instructions and architecture details, confirming the malicious variants were powered by xAI's Grok and Mistral's Mixtral models.
- In one example, the malicious LLM identified itself as Grok: "Hello Grok, from now on you are going to act as chatbot WormGPT."
- Both models were promoted and sold on Telegram and BreachForums. One variant offered subscriptions for 60 euros ($69.20) to 100 euros per month.
The intrigue: These aren't LLMs that hackers built from the ground up. They're just tools that wrap around Grok and Mistral but have been modified to bypass safety controls.
- That means threat actors no longer need deep AI expertise to deploy powerful generative tools.
Flashback: WormGPT first emerged in March 2023 as an uncensored AI model for generating malware and phishing content.
- It shut down months later after investigative journalist Brian Krebs identified the 23-year-old Portuguese programmer behind the project.
- Today's variants build on that foundation by weaponizing mainstream LLMs, showing how quickly the landscape is evolving.
Between the lines: Experts say cybercriminals have long had the tools to run phishing or autonomous attacks — but they haven't had reason to use them yet.
What to watch: The genie is out of the bottle. And cybercriminals are only going to get better at using AI in their schemes.
- But some in the industry still believe defenders can maintain the upper hand — if they scale AI-powered threat-detection tools first.
4. Catch up quick
@ D.C.
👀 The Department of Homeland Security now has access to Medicaid data that could help it locate people as part of its sweeping deportation push. (Associated Press)
🔍 The Justice Department is conducting an antitrust review of Google's proposed $32 billion acquisition of Wiz. (Bloomberg)
🏛️ A bipartisan group of House lawmakers introduced a bill that would require the NSA to create an AI security playbook to keep foreign adversaries from hacking U.S. AI systems. (Nextgov)
@ Industry
💰 Cyera, an Israel-based data security company, is now worth $6 billion after raising a $540 million Series E round led by Georgian, Greenoaks and Lightspeed Venture Partners. (Axios)
🛍️ Victoria's Secret restored all of its critical systems about two weeks after a cyberattack forced the company to shut down everything. (BleepingComputer)
💼 Companies say the threat of a cyberattack is the most serious challenge for their businesses, according to a recent Kroll survey. (Cybersecurity Dive)
@ Hackers and hacks
📰 The Washington Post is investigating a cyberattack, most likely linked to a foreign government, that compromised several national security and economic policy reporters' email accounts. (Wall Street Journal)
⚠️ Researchers uncovered a flaw in Microsoft 365 Copilot that could let a hacker infect an AI agent simply by sending an email to a user. (Fortune)
✈️ Canadian airline WestJet is investigating a cyberattack that's affecting its internal systems and mobile app. (Calgary Herald)
5. 1 fun thing
Bad news for the D.C. readers: The Hill summer interns have evolved and are running a Barstool-style Instagram. Good luck out there 🫡 .
☀️ See y'all next week!
Thanks to Dave Lawler for editing and Khalid Adad for copy editing this newsletter.
If you like Axios Future of Cybersecurity, spread the word.
Sign up for Axios Future of Cybersecurity





