Skip to main content
Mallory
Mallory

Credential-Based Attacks and Identity Threats in Modern Cybersecurity

identity threatsidentity managementcyber breachescredential stuffingemail-based threatscompromised credentialsidentity resilienceautomated attackscredential abusemulti-stage attacksemail threatsvulnerability exploitationleaked credentialssurge in attacksnon-human identities
Updated November 25, 2025 at 07:00 AM3 sources

Get Ahead of Threats Like This

Know if you're exposed — before adversaries strike.

Credential abuse, phishing, and vulnerability exploitation remain the primary vectors for cyber breaches, with attackers increasingly leveraging automation, AI-driven social engineering, and new evasion techniques. Recent research highlights a 160% surge in leaked credentials, with billions exposed in single incidents, and a significant rise in email-based threats, including a 130% increase in malware delivered via email and a resurgence of ransomware. Attackers exploit overlooked file types and advanced obfuscation tactics to bypass security controls, while compromised credentials and endpoint exploitation are now frequently blended in multi-stage attacks.

The rapid proliferation of non-human digital identities, such as AI agents, has dramatically expanded the attack surface, with non-human accounts now outnumbering human users by 82 to 1. This shift has led 90% of business leaders to rank identity attacks as their top concern, and most organizations are reevaluating their identity and access management strategies. The growing complexity and scale of identity-based threats have eroded confidence in rapid recovery, underscoring the need for robust identity resilience and specialized security staff to defend against increasingly sophisticated credential and identity attacks.

Sources

November 25, 2025 at 12:00 AM
November 24, 2025 at 12:00 AM
November 24, 2025 at 12:00 AM

Related Stories

AI-Driven Phishing and Identity-Related Breaches Escalate Cybersecurity Risks

Organizations across industries are experiencing a surge in identity-related breaches, with attackers exploiting weaknesses in authentication systems and leveraging advanced phishing techniques. Despite years of investment in stronger access controls, many companies continue to rely on passwords, which remain a primary entry point for cybercriminals. Password reuse, weak verification processes, and overconfidence in outdated systems contribute to the persistence of these breaches. Attackers often gain initial access through compromised credentials and can move laterally within networks for extended periods before detection. Social engineering tactics, such as convincing help desk staff to reset passwords or bypass multi-factor authentication, have become increasingly effective, as support teams are typically trained to assist rather than scrutinize user legitimacy. Most organizations have not implemented robust identity verification for support interactions, relying instead on easily compromised methods like security questions and one-time codes. The adoption of passwordless authentication remains low, and where it is higher, organizations report fewer identity-related breaches and losses. Meanwhile, phishing remains a dominant vector for malware delivery, with attackers using email to introduce ransomware, spyware, and other malicious software into business networks. AI-powered phishing campaigns are on the rise, with cybercriminals using generative tools to craft highly personalized and convincing messages that evade traditional detection methods. These AI-enhanced attacks can be launched at scale, targeting entire organizations rapidly and making it more difficult for employees to distinguish legitimate communications from malicious ones. The evolution of AI in cybercrime has also led to the proliferation of synthetic fraud, deepfake scams, and autonomous fraud campaigns that operate continuously. Despite the growing threat, only a minority of businesses have adopted AI-driven defenses, even as the majority of leaders recognize AI-generated fraud as a top challenge in the near future. The gap between the sophistication of attacker tactics and the defensive capabilities of organizations is widening, with operational damage and financial losses mounting as a result. Security teams face challenges in modernizing identity controls across diverse environments, including legacy systems that are incompatible with newer authentication methods. The need for comprehensive, adaptive security strategies that incorporate AI-powered detection and response is becoming increasingly urgent as adversaries continue to innovate. Organizations are urged to strengthen identity verification processes, accelerate the adoption of passwordless technologies, and invest in AI-driven security solutions to counter the escalating threat landscape. The convergence of identity-related breaches and AI-enhanced phishing underscores the critical importance of proactive, multi-layered defenses in protecting against modern cyberattacks.

5 months ago
Identity Abuse and Credential Misuse as the Primary Initial Access Vector

Identity Abuse and Credential Misuse as the Primary Initial Access Vector

Recent threat intelligence reporting indicates **identity-based attacks** (credential theft, social engineering, and misuse of legitimate access) are now the dominant driver of initial compromise, increasingly outpacing exploitation of software vulnerabilities. A *Unit 42* report cited by SC Media attributes **65% of initial access** to identity techniques versus **22%** to vulnerabilities, and notes accelerating attacker tempo—down to **72 minutes** from initial access to data exfiltration in the fastest observed cases—alongside growing cross-surface intrusions where **87%** of incidents span multiple environments (endpoints, cloud, SaaS, and identity systems). The report also highlights the **browser** as a key battleground (involved in **48%** of attacks) and a sharp rise in **SaaS supply-chain** abuse (nearly **4x** since 2022), including the use of **OAuth tokens** and **API keys** for lateral movement. Separately, Google Threat Intelligence Group commentary on the **defense industrial base (DIB)** describes adversaries shifting beyond classic espionage toward operations intended to **disrupt production capacity** and **compromise supply chains**, with **identity** increasingly treated as the “new security boundary” across the broader defense ecosystem (from prime contractors to smaller dual-use suppliers). The DIB focus underscores that credential-driven access and downstream supply-chain compromise can have strategic impact beyond data theft, including staging access for future contingencies and enabling ransomware/extortion that indirectly degrades defense supply availability.

3 weeks ago

Credential Compromise and the Risks of Password-Based Authentication

Cybercriminals are increasingly targeting enterprise credentials through phishing, brute force attacks, and exploitation of password reuse, leading to widespread compromise and monetization of login details. Attackers use tactics such as convincing phishing emails, credential stuffing, and the sale of stolen credentials on underground markets, enabling further exploitation including data theft and ransomware. The prevalence of password reuse and weak password management practices among employees exacerbates the risk, as users often rotate between a small set of passwords or make only minor variations, making it easier for attackers to gain access to multiple accounts once a single credential is compromised. Security experts are urging organizations to move away from traditional password-based authentication and adopt phishing-resistant, device-bound cryptographic solutions such as FIDO2, passkeys, and certificate-based authentication. These measures are seen as essential to counter the growing threat posed by automated attacks leveraging AI agents and large-scale credential theft. SaaS providers are also encouraged to integrate with identity platforms that support these advanced authentication methods to strengthen overall security posture and reduce the risk of credential-based breaches.

4 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed — before adversaries strike.