Cyber Security News

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of legitimate businesses, according to the CrowdStrike 2025 Global Threat Report.

The report highlights a significant shift in the cyber threat landscape during 2024, with attackers employing advanced tactics and leveraging emerging technologies such as generative artificial intelligence (GenAI) to scale their operations.

The average eCrime breakout time measuring how quickly attackers move laterally within a network dropped to 48 minutes in 2024, down from 62 minutes in 2023, with the fastest recorded breakout time being a mere 51 seconds.

Social engineering attacks surged dramatically, with voice phishing (vishing) incidents increasing by 442% in the second half of 2024 compared to the first half.

Adversaries increasingly relied on compromised credentials and malware-free intrusions, which accounted for 79% of detections.

Access broker advertisements selling stolen credentials grew by 50% year-over-year, underscoring the growing sophistication of these operations.

Generative AI played a pivotal role in enhancing attack effectiveness.

Threat actors used large language models (LLMs) to craft convincing phishing emails and credential-harvesting websites, enabling rapid and scalable social engineering campaigns.

This technology lowered barriers for adversaries, making sophisticated attacks more accessible and widespread.

Cloud and SaaS Environments Under Siege

Cloud environments faced escalating threats, with new and unattributed cloud intrusions rising by 26% year-over-year.

Valid account abuse emerged as the primary method for initial access, accounting for 35% of cloud-related incidents in the first half of 2024.

Adversaries also targeted cloud-based SaaS applications for data theft, lateral movement, extortion, and third-party exploitation.

Single sign-on (SSO) identities were frequently compromised to gain access to these environments.

Unpatched vulnerabilities became a critical focus for attackers, particularly in internet-exposed network appliances where endpoint detection and response (EDR) visibility is inherently limited.

Such vulnerabilities provided an entry point for adversaries to bypass traditional defenses and establish footholds within target organizations.

Nation-State Activity and Insider Threats Proliferate

The report also observed a sharp increase in nation-state activity, with China-linked adversaries leading the charge.

China-nexus activity surged by 150%, with targeted industries such as financial services, manufacturing, and engineering experiencing increases of up to 300%.

Seven new China-nexus adversary groups were identified in 2024, reflecting a shift toward more specialized and sophisticated intrusions.

Insider threats also grew more complex as adversaries embedded themselves within organizations by posing as employees or leveraging insider access.

CrowdStrike reported responding to 304 incidents involving FAMOUS CHOLLIMA adversaries in 2024, nearly 40% of which included insider threat components.

The CrowdStrike report underscores the growing sophistication of cyber adversaries and their ability to exploit vulnerabilities across diverse environments.

Organizations are urged to adopt proactive measures to detect and respond to these evolving threats effectively.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Interlock Ransomware Uses Multi-Stage Attack Through Legitimate Websites to Deliver Malicious Browser Updates

The Interlock ransomware intrusion set has escalated its operations across North America and Europe with…

9 minutes ago

Researchers Expose Medusa Ransomware Group’s Onion Site

Researchers have successfully infiltrated the digital fortress of one of the most prolific ransomware groups,…

11 minutes ago

CISA Extends Support a Last Minute to CVE Program, Averting Global Cybersecurity Crisis

CISA announced an eleventh-hour contract extension with MITRE Corporation to maintain the Common Vulnerabilities and…

20 minutes ago

Hackers Target Investors Through Fraud Networks to Steal Financial Data

Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data. Utilizing…

53 minutes ago

Hackers Weaponize Gamma Tool Through Cloudflare Turnstile to Steal Microsoft Credentials

Cybercriminals are exploiting an AI-powered presentation tool called Gamma to launch a multi-stage attack aimed…

1 hour ago

AI-Powered Bad Bots Account for 51% of Traffic, Surpassing Human Traffic for the First Time

Automated traffic generated by bad bots has for the first time surpassed human activity, accounting…

1 hour ago