DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Security

CrowdStrike Releases Threat Hunting Report 2025

DigitalCIO Bureau by DigitalCIO Bureau
August 5, 2025
in Security, Tech News
0
CrowdStrike Named A Leader In Cloud Workload Security By Forrester
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

CrowdStrike has released the 2025 Threat Hunting Report, highlighting a new phase in modern cyberattacks: adversaries are weaponizing GenAI to scale operations and accelerate attacks – and increasingly targeting the autonomous AI agents reshaping enterprise operations. The report reveals how threat actors are targeting tools used to build AI agents – gaining access, stealing credentials, and deploying malware – a clear sign that autonomous systems and machine identities have become a core part of the enterprise attack surface.

CrowdStrike Threat Hunting Report Highlights
Based on frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts tracking more than 265 named adversaries, the report reveals:

  • Adversaries Weaponize AI at Scale: DPRK-nexus adversary FAMOUS CHOLLIMAused GenAI to automate every phase of its insider attack program. From building fake resumes and conducting deepfake interviews to completing technical tasks under false identities – AI-powered adversary tradecraft is transforming traditional insider threats into scalable, persistent operations. Russia-nexus adversary EMBER BEAR used GenAI to amplify pro-Russia narratives and Iran-nexus adversary CHARMING KITTEN deployed LLM-crafted phishing lures targeting U.S. and EU entities.
  • Agentic AI Is the New Attack Surface: CrowdStrike observed multiple threat actors exploiting vulnerabilities in tools used to build AI agents, gaining unauthenticated access, establishing persistence, harvesting credentials, and deploying malware and ransomware. These attacks demonstrate how the agentic AI revolution is reshaping the enterprise attack surface – turning autonomous workflows and non-human identities into the next frontier of adversary exploitation.
  • GenAI-built Malware Becomes Reality: Lower-tier eCrime and hacktivist actors are abusing AI to generate scripts, solve technical problems, and build malware – automating tasks that once required advanced expertise. Funklocker and SparkCat are early proof points that GenAI-built malware is no longer theoretical, it’s already operational.
  • SCATTERED SPIDERAccelerates Identity-Based, Cross-Domain Attacks: The group resurged in 2025 with faster and more aggressive tradecraft – leveraging vishing and help desk impersonation to reset credentials, bypass MFA, and move laterally across SaaS and cloud environments. In one incident, the group moved from initial access to encryption by deploying ransomware in under 24 hours.
  • China-nexus Adversaries Drive Continued Surge in Cloud Attacks: Cloud intrusions rose 136%, with China-linked adversaries responsible for 40% of increased activity, as GENESIS PANDAand MURKY PANDA evaded detection through cloud misconfigurations and trusted access.

“The AI era has redefined how businesses operate, and how adversaries attack. We’re seeing threat actors use GenAI to scale social engineering, accelerate operations, and lower the barrier to entry for hands-on-keyboard intrusions,” said Adam Meyers, head of counter adversary operations at CrowdStrike. “At the same time, adversaries are targeting the very AI systems organizations are deploying. Every AI agent is a superhuman identity: autonomous, fast, and deeply integrated, making them high-value targets. Adversaries are treating these agents like infrastructure, attacking them the same way they target SaaS platforms, cloud consoles, and privileged accounts. Securing the AI that powers business is where the cyber battleground is evolving.”

 

Tags: CrowdStrike
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Red Hat AI now runs on AWS Trainium and Inferentia chips

by DigitalCIO Bureau
December 5, 2025
0
Red Hat AI now runs on AWS Trainium and Inferentia chips

Red Hat has announced an expanded collaboration with Amazon Web Services (AWS) to power enterprise-grade generative AI (gen AI) on AWS with Red Hat AI and AWS AI...

Read moreDetails

Kellton Acquires ServiceNow services provider Kumori Technologies

by DigitalCIO Bureau
December 5, 2025
0
CRISIL To Acquire Bridge To India Energy

Kellton has announced the acquisition of Kumori Technologies, a specialized ServiceNow services provider. The acquisition strengthens Kellton’s global ServiceNow delivery capabilities and advances its vision of building integrated,...

Read moreDetails

Hexaware Launches New Delivery Center in Cairo

by DigitalCIO Bureau
December 4, 2025
0
Hexaware Launches New Delivery Center in Cairo

Hexaware Technologies has strengthened its global delivery network with a new center in Cairo. Launching with 100 professionals, it will serve customers in Egypt, the Middle East, and...

Read moreDetails

Tata Technologies appoints Anand Sinha as Chief Digital and Information Officer

by DigitalCIO Bureau
December 3, 2025
0
Tata Technologies appoints Anand Sinha as Chief Digital and Information Officer

Anand Kumar Sinha has joined Tata Technologies as Chief Digital and Information Officer (CIDO). With an extensive experience in technology, focusing on IT operations, Technology Infrastructure, cybersecurity, ERP, AI,...

Read moreDetails

Cybercrime Will Become Increasingly Automated in 2026

by DigitalCIO Bureau
December 2, 2025
0
Trend Micro Named a Leader in Attack Surface Management in New Report

Trend Micro has released its annual Security Predictions Report for 2026, warning that the coming year will mark the true industrialization of cybercrime. Artificial intelligence (AI) and automation are now...

Read moreDetails
Next Post
Debashis Chatterjee Joins Ascendion Board

Debashis Chatterjee Joins Ascendion Board

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Japanese government plans to hack insecure IoT devices

January 29, 2019
Gartner Hype Cycle Shows AI Practices and Platform Engineering Will Reach Mainstream Adoption in Software Engineering in Two to Five Years

Gartner Hype Cycle Shows AI Practices and Platform Engineering Will Reach Mainstream Adoption in Software Engineering in Two to Five Years

November 29, 2023
Mphasis Establishes Global CoE for Advanced Computing in Hyderabad

Mphasis Establishes Global CoE for Advanced Computing in Hyderabad

May 22, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope New Relic NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?