
Cyber Threats Are Evolving Faster Than Defenses
www.forbes.com
Cyber adversaries are evolving into enterprise-scale operations, leveraging AI, social engineering, ... [+] and identity-based attackscan defenders keep up?gettyCybercrime is no longer just about opportunistic hackers looking for a quick payday. The modern cyber adversary is highly structured, well-resourced, and increasingly operates like a business. From nation-state actors to financially motivated cybercriminals, threat groups are becoming more sophisticated, leveraging AI-driven automation, social engineering, and cloud exploitation to breach even the most well-defended organizations.The 2025 CrowdStrike Global Threat Report paints a stark picture: adversaries are faster, more efficient, and more business-like than ever before. Their tactics have evolved beyond traditional malware, shifting toward identity-based attacks, deepfake-driven social engineering, and rapid cloud exploitation.Security teams are now in a race to out-innovate attackers who are thinking and operating like enterprises themselves.Cybercrime as an Industry: The Business of HackingCybercriminals have streamlined their operations, creating a sophisticated underground economy. One of the fastest-growing trends is Access-as-a-Service, where initial access brokers specialize in infiltrating networks and then selling entry points to ransomware groups and other threat actors.Adam Meyers, CrowdStrikes head of counter adversary operations, explained during a recent media roundtable, One of the big things that kind of exploded in 2024 is the increase in social engineering, particularly using voice phishing. We saw a 442% increase in voice phishing. Adversaries are realizing that traditional technical attacks are getting harder, so theyre going after the weakest linkhumans.This shift away from malware is reshaping the cyber threat landscape. 79% of observed attacks were malware-free, relying on valid credentials, remote administration tools, and hands-on-keyboard attacks instead.Breakout timesthe speed at which attackers move laterally within a breached networkhit a record low of just 48 minutes, with the fastest breakout happening in only 51 seconds.Scott Crawford, Research Director of Information Security at 451 Research, part of S&P Global Market Intelligence, described this shift as part of a long-evolving cybercriminal ecosystem. Weve seen that evolution for many years now. The threat landscape has long matured into a well-developed ecosystem where information, tactics, and skills are traded with regularity, enabled by innovations like the development of cryptocurrencies that make attacks for tangible gain more practical for adversaries.The AI Arms Race: Cybercriminals Weaponizing Artificial IntelligenceAI isnt just revolutionizing business operationsits transforming cybercrime. Adversaries are using generative AI to craft hyper-convincing phishing emails, create deepfake videos, and even simulate real-time interactions in social engineering campaigns.Meyers highlighted the chilling effectiveness of AI-driven deception. AI-generated phishing emails have a 54% click-through rate, compared to just 12% for human-written emails. Deepfake technology is now being used for business email compromise, including a $25.6 million transfer scam last year using a deepfake video.At the same time, however, the rise of generative AI makes things like credible deception and phishing attacks more believable to targets, pointed out Crawford. Although it still has gaps such as defects in image manipulation that can still make some attempts detectable, sophistication is growing and can be expected to challenge defenders increasingly.Cybercriminals are also using AI-powered social engineering to infiltrate organizations at a deeper level. A North Korean-affiliated group, Famous Chollima, was caught creating fake LinkedIn profiles, using AI for job interview answers, and even deploying deepfake videos to land jobs within tech companiesgranting them insider access to corporate networks.Crawford emphasized, But defenders can leverage innovation, tooand we can expect to see this continue to shape the security technology landscape sooner rather than later.Chinas Cyber Expansion: A New Era of Nation-State AttacksWhile criminal enterprises are evolving, nation-state actors are scaling their operations with unprecedented efficiency. CrowdStrikes report reveals a 150% increase in China-nexus cyber activity, with some industriesincluding finance, manufacturing, and mediaexperiencing spikes of 200-300%.Meyers didnt mince words about the implications of this growth. After decades of investment, Chinas offensive cyber capabilities are now on par with other world powers. Theyve moved from smash-and-grab operations to persistent, stealthy intrusions that are highly specialized.Chinas new adversary groups are targeting specific industries, leveraging specialized techniques, and focusing on maintaining persistent access. For example, Vanguard Panda has been pre-positioning itself in critical infrastructure networks as part of what analysts believe is an effort to prepare for geopolitical conflicts, including potential tensions over Taiwan.Identity is the New Perimeter: The Death of Traditional SecurityOne of the most striking findings in the CrowdStrike report is the shift away from traditional malware toward identity-based attacks. Cybercriminals and nation-state actors alike are exploiting cloud services, stealing credentials, and bypassing endpoint security altogether.The cloud is no longer a safe havena 35% increase in cloud intrusions shows that attackers are specifically targeting cloud control planes and SaaS environments, where identity verification is often the weakest link. Access broker activity surged by 50%, further highlighting that stolen credentials are the new goldmine for cybercriminals.The Future of Cyber Defense: Can Enterprises Keep Up?With cybercriminals and nation-state actors adopting AI, cloud exploitation, and sophisticated social engineering, organizations must rethink their approach to security. Meyers laid out the key priorities for defenders:Identity security is paramount. Multi-factor authentication (MFA) alone isnt enoughorganizations need continuous identity monitoring and behavioral analytics to detect unauthorized access.Cross-domain visibility is critical. Companies must integrate intelligence across endpoint, identity, and cloud security to spot threats before they escalate.Threat intelligence-driven patching. Adversaries are increasingly chaining low-severity vulnerabilities together to create high-impact exploits. Patching strategies must prioritize real-world threat activity, not just severity scores.As cyber threats continue to evolve, the big question remains: Can defenders keep up with enterprise-grade adversaries who innovate as fast as the businesses they target? The next phase of cybersecurity will be a battle between AI-driven attackers and AI-driven defenses.For organizations, the message is clear: Adapt now, or risk becoming the next target in an era where cybercrime is no longer just a threatits an industry.
0 Comments
·0 Shares
·12 Views