Threat IntelHIGH

Identity Attacks - Understanding Cyber Horror Trends

TACisco Talos Intelligence·Reporting by Hazel Burton
📰 4 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, attackers are tricking people into giving them access to systems.

Quick Summary

Identity attacks are on the rise, with attackers manipulating consent to gain access. Organizations must enhance their security measures to combat these evolving threats. Stay informed to protect your systems.

What Happened

In recent years, identity attacks have become a dominant theme in cybersecurity. Rather than brute-forcing their way through defenses, attackers are increasingly finding ways to be 'invited in' by manipulating consent. This trend reflects a significant shift in tactics, where adversaries exploit the trust of users to gain unauthorized access to sensitive systems.

The 2025 Talos Year in Review highlights that nearly a third of multi-factor authentication (MFA) spray attacks targeted identity access management (IAM) applications. Attackers are leveraging social engineering to convince victims to disclose their MFA codes in real time, often posing as IT support or trusted vendors. This manipulation allows them to bypass traditional security measures and operate within the system as legitimate users.

Who's Being Targeted

Organizations across various sectors are at risk, especially those relying heavily on digital identity verification and remote access. The surge in fraudulent device registration events—up 178%—indicates that attackers are not just targeting individuals but also the mechanisms that issue invitations for access. Companies that implement MFA without robust user education and awareness may find themselves vulnerable to these sophisticated tactics.

The implications are broad, affecting both small businesses and large enterprises. As attackers refine their methods, the potential for damage increases, making it crucial for organizations to stay ahead of these evolving threats.

Tactics & Techniques

Attackers employ a variety of tactics to gain access. One common method involves adversary-in-the-middle phishing kits that capture legitimate login credentials and MFA codes as users enter them. This technique is particularly insidious because the authentication appears valid, leading to unauthorized access without triggering alarms.

Additionally, social engineering plays a significant role. Attackers often manipulate victims into providing sensitive information under the guise of legitimate requests. This approach not only bypasses security barriers but also highlights a critical vulnerability in the human element of cybersecurity.

Defensive Measures

Organizations must adopt a proactive stance to defend against these identity-based attacks. First and foremost, user education is essential. Employees should be trained to recognize social engineering attempts and understand the importance of safeguarding their authentication credentials.

Implementing robust security measures, such as continuous monitoring of access logs and employing advanced threat detection systems, can help identify suspicious activities early. Additionally, organizations should regularly review and update their MFA protocols to ensure they remain effective against evolving tactics. Finally, fostering a culture of security awareness can empower employees to act as the first line of defense against identity attacks.

🔒 Pro insight: The rise in identity attacks underscores the need for continuous user education and advanced monitoring to counteract sophisticated social engineering tactics.

Original article from

TACisco Talos Intelligence· Hazel Burton
Read Full Article

Also covered by

SESentinelOne Labs

The Identity Paradox: The Hidden Risks in Your Valid Credentials

Read Article
MIMicrosoft Security Blog

Identity security is the new pressure point for modern cyberattacks

Read Article
HEHelp Net Security

Download: 2026 SANS Identity Threats & Defenses Survey

Read Article

Related Pings

MEDIUMThreat Intel

Researchers Roast Cybercriminals to Diminish Their Glamour

Researchers are roasting cybercriminals to diminish their glamor. This humorous approach aims to expose their failures and fracture trust within criminal networks. It's a fresh take on cybersecurity, focusing on education and awareness.

The Register Security·
HIGHThreat Intel

Node.js Maintainers Targeted - Sophisticated Social Engineering Scheme

A coordinated social engineering scheme is targeting Node.js developers, risking the integrity of widely used software packages. This alarming trend highlights the need for vigilance in the open-source community.

Cyber Security News·
HIGHThreat Intel

Transparent Tribe Targets India's Startup Ecosystem - New Threat

Acronis reveals that Transparent Tribe is now targeting India's startup sector, especially cybersecurity firms. This shift raises concerns about espionage and data security risks. Startups must bolster their defenses against these sophisticated attacks.

CyberWire Daily·
HIGHThreat Intel

Gaming Industry - High-Stakes Cybersecurity Threats Explained

Cybercriminals are increasingly targeting the gaming industry, driven by financial transactions and sensitive data. As casinos go digital, understanding these threats is vital for operators to safeguard their assets.

Cyber Security News·
HIGHThreat Intel

China-Linked TA416 Targets European Governments with Phishing

TA416, a China-aligned threat actor, is targeting European governments with sophisticated phishing campaigns using PlugX malware. This poses significant risks to diplomatic security. Stay informed to safeguard your organization.

The Hacker News·
HIGHThreat Intel

Spear-Phishing Campaign Neutralizes MFA for Executives

A new spear-phishing campaign is targeting senior executives, neutralizing MFA protections. This poses serious risks to corporate security. Organizations must enhance their defenses against such sophisticated threats.

SC Media·