
Report: Attackers Now Focus on Credential Theft to Gain Access To Systems
Hackers are moving their focus from “breaking in” to “logging in,” according to the 2026 Cloudflare Risk Report.
Sophisticated security tools are more difficult to penetrate and raise alarms when targeted, the report found. This has actually required hackers to steal genuine credentials to exploit system vulnerabilities, instead.
This approach has actually proven to be quicker, stealthier, and harder to detect. The main identity systems that are vulnerable to theft include usernames, passwords, tokens, and gain access to opportunities.
In addition, it has ended up being incredibly difficult to identify assailants. As soon as they get the target’s qualifications, they can move around the internal system with ease.
Cloudflare also found that 4 %of login attempts are bots immediately evaluating qualifications. The report lays out that 54% of ransomware attacks originate from credential-stealing malware.
Near 50% of human logins use credentials currently exposed to breaches.
Essential modifications in how companies handle their IT environments have actually made this kind of attack, which takes login information, more widespread. These consist of:
- Cloud and SaaS communities: Corporate systems are significantly connected through single sign-on (SSO) and federated identity platforms.
- Remote and hybrid work: Workers log in from personal gadgets, home networks, and mobile endpoints.
- Device identities and automation: Bots, APIs and service accounts now surpass human users in lots of systems.
All these changes have provided a breeding ground for a sophisticated web of targeted attacks on organizations, as attackers seek big troves of usernames and passwords.
These databases are then offered or traded online on the dark web. These attacks come cycle when hackers use stolen qualifications to breach IT systems.
AI as a Tool for Hackers
The Cloudflare Risk Report also lays out how hackers are using generative AI to bolster their toolbox. They utilize it for automated reconnaissance, to create phishing messages or deepfake interactions, and to map networks and identify high-value targets quicker.
The concerning pattern here is that it offers opponents access to the arena with sophisticated tools, triggering breaches at scale.
In the past, the focus for IT was on keeping aggressors out. Now, it has to do with identifying dangers that appear as employees or contractors and who run within relied on applications like Slack, Google Work Space, or GitHub.
Cloudflare recognizes that the cybersecurity action should use autonomous defense systems to utilize AI and automation to detect suspicious activity and respond quickly.
Cloudflare suggests these systems be used for continuous identity verification, as well as keeping track of the habits of users and gadgets and the automated containment of compromised accounts.
Enemies are always on the lookout for brand-new and ingenious methods to compromise IT systems. This wave of taking credentials and going into systems under the auspices of genuine users leads to a requirement for real-time automation rather than manual action.
“Organizations needs to shift to automated, edge-based mitigation that can respond in seconds,” the report’s authors composed. “Legacy scrubbing center designs are no longer enough for attacks that peak and conclude within 10 minutes.”
For the complete report, go to the Cloudflare blog.