As we close out 2025, the threat landscape has shifted from opportunistic attacks to highly engineered, systemic campaigns. The final quarter of this year gave us two “canary in the coal mine” moments—the financial industrialization of GoldFactory and the deep persistence of BRICKSTORM.
These aren’t just isolated incidents; they are the prototypes for what we predict will define the cyber threat landscape of 2026. Here is how these late-2025 signals are shaping the trends for the year ahead.
Trend #1: The “Super-App” Evolution of Mobile Malware
The Signal: The GoldFactory Campaign (Dec 2025)
For years, mobile malware had a single focus: steal credentials or display ads. The GoldFactory “Hook for Gold” campaign changed the game by doing everything at once.
The 2026 Prediction: In 2026, we expect to see the industrialization of mobile fraud. Malware will no longer be a simple tool; it will be a modular platform—a “Super-App” for criminals.
- Multi-Modal Revenue: Attackers will not settle for just draining bank accounts. Infected devices will simultaneously mine crypto, generate ad fraud, and act as SMS proxy gateways for other criminals.
- The Death of “Permissions”: As seen with GoldFactory’s use of “hooking” (modifying app logic at runtime), the abuse of Accessibility Services will evolve into direct manipulation of the OS, bypassing standard permission prompts entirely.
- Strategic Takeaway: In 2026, mobile security can no longer rely on app store vetting. Organizations must implement behavioral device analysis to detect phones that are “working too hard” (battery/data anomalies) even when idle.
Trend #2: Sub-OS Warfare and “God-Mode” Persistence
The Signal: The BRICKSTORM Alert (Dec 2025)
The discovery of BRICKSTORM targeting public sector VMware environments signals a move away from noisy ransomware towards silent, deep entrenchment.
The 2026 Prediction: The battleground for 2026 will shift from the endpoint to the infrastructure layer. Nation-state actors are moving “down the stack.”
- Hypervisor Targeting: We predict a 40% increase in malware specifically designed for virtualization platforms (ESXi, vCenter, Hyper-V). If you own the hypervisor, you own every server running on top of it.
- Living-off-the-Virtualization: Adversaries will use built-in administrative tools (like snapshots and migration scripts) to move laterally, making their traffic indistinguishable from legitimate admin activity.
- Strategic Takeaway: 2026 must be the year of Non-Windows Security. Security teams need to urgently audit their “plumbing”—the virtualization consoles, VPN gateways, and storage controllers that often lack the EDR visibility of standard servers.
Summary: What This Means for Your 2026 Plans
The alerts of late 2025 serve as a blueprint for the coming year.
- Consumer Trust is the new Perimeter: If your customers use your mobile app, their device health is now your problem.
- Visibility Gap Analysis: You likely have great visibility on your Windows laptops, but do you know what is happening inside your hypervisor kernels?
The theme for 2026 is Depth. Deep attacks require deep defense. The era of surface-level scanning is over.
This article was researched and written by our team, with AI assistance used solely for copy-editing and rephrasing to improve readability.

To see our team in action, please join us for our weekly webinar every Tuesday.