Hackers No Longer Break In – They Log In

Login
  • IBM X-Force report highlights rise of infostealers and AI-driven threats

IBM’s X-Force cybersecurity report for 2025 shows a dramatic shift in the nature of cyber threats. Infostealer malware activity has surged by 180% in two years, with attackers increasingly bypassing traditional intrusion methods. Instead of breaking into corporate systems, criminals now log in using stolen credentials. The report also details how generative artificial intelligence is reshaping attack strategies and offers recommendations for organizations seeking stronger defenses.

Rapid Growth of Infostealer Malware

Cybersecurity experts detected 84% more infostealer malware in early 2025 compared to the previous year. These tools operate silently, capturing screenshots, recording keystrokes, and collecting passwords and financial data without user awareness. Distribution methods have expanded beyond infected emails to include SEO manipulation, fake Google ads, and compromised software supply chains. IBM noted that stolen credentials sold on the dark web increased by 12% in 2024.

Although overall malware attacks are declining globally, the damage caused by individual incidents continues to rise. In 2024, the average cost of a data breach reached a record 1.6 billion forints. Attackers are refining their techniques to maximize impact. This trend underscores the growing importance of proactive security measures.

Europe in the Crosshairs

Nearly a quarter of global cyberattacks in 2024 targeted Europe, making it the third most affected region worldwide. Attackers most often exploited vulnerabilities in publicly accessible applications (36%) or logged in with valid credentials (30%). IBM summarized the situation with the phrase: “Hackers don’t break in – they log in.” The most common consequences included credential theft (46%), data leaks (31%), and outright data theft (15%).

The findings highlight Europe’s growing exposure to sophisticated cyber campaigns. Organizations across the continent face increasing pressure to secure systems against credential-based attacks. Public institutions and private companies alike must adapt to this evolving threat landscape. The report suggests that resilience depends on both technical defenses and regulatory oversight.

AI Expands Attack Surfaces

Generative AI is creating new vulnerabilities as companies adopt cloud-based and AI-supported solutions. Only 24% of firms adequately secured their AI systems in 2024, leaving many exposed. Attackers are already using AI tools for password theft, phishing, and automated information operations. Techniques such as “prompt injection” allow hackers to manipulate AI models and gain unauthorized code execution.

Criminals also employ AI to generate deepfake content, phishing emails, and malicious code at scale. These tools enable credential forgery, large-scale phishing campaigns, and automated intrusions at lower cost and higher efficiency. Experts warn that AI-driven attacks will continue to grow in sophistication. At the same time, AI can also be harnessed to strengthen defenses, creating a dual-use challenge for organizations.

Defensive Strategies for the AI Era

Experts recommend integrated and transparent approaches to cybersecurity. Measures include embedding advanced protections throughout AI workflows, establishing internal AI governance with audits, and adopting international security frameworks with continuous monitoring. Offline storage methods, such as tape backups, may also regain importance as safeguards against severe data loss. Companies must balance innovation with resilience to withstand evolving threats.

The report found that traditional malware spread via ZIP and RAR attachments declined sharply in 2024, with ZIP files down 70% and RAR files down 45%. Attackers increasingly rely on PDFs and malicious URLs, which are harder for modern email systems and scanners to detect, showing how cybercriminals adapt quickly to defensive technologies.


 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.