Threat IntelHIGH

Threat Intel - 2025 Identity Threat Landscape Revealed

🎯

Basically, a report shows that hackers are stealing more passwords and using clever tricks to bypass security.

Quick Summary

Credential theft is skyrocketing, with millions of passwords exposed. Organizations need to act fast to protect sensitive data. Discover how infostealer malware is evolving and what steps to take.

The Threat

In 2025, credential theft became the leading method for cyber breaches. Recorded Future's report highlights that 1.95 billion credentials were exposed through malware. This alarming trend indicates that attackers are increasingly targeting systems with high access potential, such as authentication systems and VPNs. The report reveals a staggering 50% increase in credential theft in the latter half of the year compared to the first half, with a 90% spike in the last quarter alone. This surge underscores the growing sophistication of infostealer malware and the need for robust defenses.

Who's Behind It

The primary threat comes from infostealer malware, particularly the LummaStealer, which dominated the landscape in 2025. This malware operates under a malware-as-a-service (MaaS) model, allowing attackers to efficiently harvest credentials from compromised devices. The report notes that each infected device yielded an average of 87 stolen credentials, affecting both corporate and personal accounts. The evolution of this malware has made it increasingly difficult for traditional security measures to keep pace, as attackers exploit vulnerabilities in systems that organizations rely on for security.

Tactics & Techniques

Attackers are not just randomly stealing credentials; they are targeting specific systems that offer the greatest potential for exploitation. Over 63% of the compromised credentials were linked to authentication systems, with significant numbers also tied to cloud platforms and remote management tools. This strategic targeting allows attackers to gain broad access to organizational networks, making it crucial for security teams to prioritize monitoring these high-risk areas. Furthermore, the report highlights that 276 million credentials included active session cookies, enabling attackers to bypass multi-factor authentication (MFA) entirely. This emphasizes that MFA alone is no longer sufficient to protect sensitive data.

Defensive Measures

To combat these threats, organizations must adopt a proactive stance. Continuous monitoring for credential theft is essential, as the pace of exposure is rapid. Security teams should focus on detecting compromised credentials tied to authentication systems and remote access tools. Implementing shorter session token lifespans for high-risk applications and treating any credential exposure as a potential authentication bypass will enhance security. The report underscores the importance of swift action; organizations that respond quickly to intelligence can prevent the exploitation of stolen credentials, ultimately safeguarding their networks from serious breaches.

🔒 Pro insight: The rapid increase in credential theft signals a shift towards more targeted attacks, necessitating advanced detection and response strategies.

Original article from

Recorded Future Blog

Read Full Article

Related Pings

HIGHThreat Intel

Microsoft Teams Phishing Campaigns - Rapid7 Guidance Alert

Rapid7 has identified a rise in phishing campaigns using Microsoft Teams. Threat actors impersonate IT departments to trick users into granting remote access. This poses a serious risk to organizational security.

Rapid7 Blog·
HIGHThreat Intel

Cyberattack - Disrupts Parking Payments in Russian City

A cyberattack in Perm, Russia, disrupted parking payments, making them free for several days. City officials confirmed the system is now operational again. This incident highlights ongoing cybersecurity threats affecting urban infrastructure in the region.

The Record·
HIGHThreat Intel

Threat Intelligence - Key Cyberattack Insights Revealed

A major cyberattack on Stryker disrupts global operations, with Handala Hack claiming responsibility. Other breaches include Telus and Signal, highlighting ongoing threats. Stay alert and informed.

Check Point Research·
HIGHThreat Intel

Threat Intel - Weekly Recap on Chrome 0-Days and Botnets

This week saw critical vulnerabilities in Chrome and AWS breaches. Major botnets like SocksEscort and KadNap are exploiting network devices, posing serious risks. Stay informed and secure your systems!

The Hacker News·
HIGHThreat Intel

Signal Account Takeover - Targeting German Officials Explained

A wave of cyberattacks has targeted German officials, including a former BND VP. Hackers impersonate Signal support to hijack accounts, raising serious security concerns. Authorities urge users to stay vigilant and report suspicious activity.

Security Affairs·
HIGHThreat Intel

Handala Threat Group - Iranian Cyber Operations Unveiled

The Handala threat group is targeting Israel and Western nations with destructive cyber operations. Their activities involve espionage and disruption, raising significant cybersecurity concerns. Organizations must enhance defenses against these emerging threats.

Intel 471 Blog·