In the first quarter of 2025, identity hunting attacks using artificial intelligence and malicious android applications became one of the most serious cyberoses. According to Ekaterina Rydemskaya, a casinolervice analytical engineer, scammers actively began to use their neural networks to create fake e -mails that are absolutely real. Such letters allegedly from banks or employers convince them to enter their usernames and passwords, and ask for a convincing way that leads to data leaks. In 2024, such identity hunting attacks caused about 20% of all data leaks in the world.
In addition, fake Android applications hidden as popular programs, journalists and games pose an important threat. Frauds use them to steal user data, and these applications are often very difficult to distinguish them from the originals. When such applications fall on the smartphone, they provide attackers into a “spy gadget ği by providing access to personal information. Such threats are becoming more and more complex for detecting, which makes smartphones vulnerable to hacking.
In addition, cyber attacks on cloud services and mobile communication operators entered the highest level. Computer pirates are trying to access personal data stored on cloud platforms to use for blackmail or employer attacks. The hacking of databases of telecommunication companies allows the attackers to manipulate the phone numbers, perform unauthorized writing, and make more complex attacks. However, the attackers actively used carrier programs for not only the organization, but also ordinary users, and required a ransom to solve files.
Source: Ferra

I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.