A recent report by Positive Technologies reveals a surge in cybercrime across the Middle East between 2024 and Q1 2025, with social engineering identified as the primary initial access method. Threat actors leveraged malware, DDoS attacks, and exploitation of unpatched vulnerabilities to target government, defense, industrial sectors, and individuals. The report, covering 14 countries, highlights that underreporting driven by reputational concerns and social stigma likely conceals the true extent of the threat landscape. Dark web activity shows the UAE, Saudi Arabia, Israel, and Qatar as frequently targeted nations, with mentions tied to stolen data and compromised infrastructure.
A recent threat intelligence report published by Positive Technologies highlights a sustained wave of cybercrime activity across the Middle East between 2024 and Q1 2025. The findings underscore the prevalence of social engineering as a leading initial access vector, with adversaries leveraging phishing, impersonation, and psychological manipulation techniques to exfiltrate sensitive user data. This tactic facilitated a high rate of successful intrusions across regional targets.
The report further identifies a diverse threat landscape, with adversaries employing malware, distributed denial-of-service (DDoS) attacks, and exploitation of unpatched vulnerabilities in web-facing applications and network services. These attack methods were observed targeting a broad spectrum of verticals, including government agencies, defense organizations, industrial and manufacturing entities, and individual users.
Research team conducted a cross-regional assessment involving Bahrain, Egypt, Israel, Jordan, Iraq, Yemen, Qatar, Kuwait, Lebanon, the UAE, Oman, Palestine, Saudi Arabia, and Syria. Despite the extensive geographic coverage, analysts noted that the data underrepresents the true scale of malicious activity due to underreporting, driven largely by reputational concerns and societal stigma.
The report also details increased threat activity emanating from dark web ecosystems. Intelligence gathered indicates that the UAE, Saudi Arabia, Israel, and Qatar are among the most referenced countries on underground forums, often linked to listings of stolen credentials, sensitive documents, and compromised infrastructure. These nations, noted for their aggressive digital transformation initiatives, are viewed by cybercriminals as high-value targets.
Cybercrime groups specializing in data theft and disruption of critical infrastructure were among the most active actors in the region. Listings of breached government and private sector data suggest systemic gaps in security governance amid rapid digitization efforts.
Security research teams warns that advancements in AI and the proliferation of high-performance computing resources are lowering the technical barriers to entry for cybercriminals. This democratization of offensive capabilities is expected to result in a measurable uptick in regional threat activity.
The report concludes with strategic recommendations, urging Middle Eastern governments to prioritize the protection of critical infrastructure, financial institutions, and public sector entities. The potential compromise of these sectors presents significant risks to national security and sovereignty.
The rise in cybercrime across the Middle East is creating major risks for national security, important services, and the economy. Countries with advanced digital systems are especially vulnerable to data leaks and service outages. Many attacks go unreported, making it harder to understand the full threat and build strong cybersecurity defenses.
https://www.securitymiddleeastmag.com/positive-technologies-report-finds-cyberattacks-intensify-in-uae-ksa/