CrowdStrike Releases "2025 Global Threat Report": AI-Powered Attacks Surge
CrowdStrike has released its “2025 Global Threat Report“, tracking over 250 adversary groups and 140 new activity clusters. The report reveals alarming trends in the cybersecurity landscape, with significant increases in China-linked cyber operations, generative AI-based social engineering attacks, and malware-free intrusions.
The report documents a 150% increase in China-linked cyber espionage operations compared to the previous year. Targeted attacks against critical industry sectors—including finance, media, and manufacturing—surged by up to 300%. CrowdStrike identified seven new China-affiliated hacking groups in the past year alone, highlighting the nation’s expanding offensive cyber capabilities.
Voice phishing (vishing) attacks increased by a staggering 442% in the second half of 2024 compared to the first half, driven by AI-generated deception techniques. Sophisticated cybercriminal groups like Curly Spider, Chatty Spider, and Plump Spider have leveraged AI-enhanced social engineering methods to steal credentials, establish remote sessions, and evade detection systems.
In 2024, Iran-linked threat actors actively utilized AI for vulnerability research, exploit development, and domestic network patching, aligning with government-led AI initiatives. This signals a concerning trend of nation-states integrating AI capabilities into their offensive cyber operations.
A striking 79% of initial access attacks now occur without malware, with access broker advertisements increasing by 50% year-over-year. Threat actors increasingly exploit compromised credentials to infiltrate systems as legitimate users, manually evading detection while moving laterally through networks.
North Korea-linked Famous Chollima led 304 cyber attacks last year, with 40% involving insider threats. These attacks employed sophisticated methods to bypass security systems by impersonating normal employees to gain access to corporate systems before conducting malicious activities.
The average cybersecurity attack time decreased by 22% to just 48 minutes, down from last year’s average of 62 minutes. The fastest attack took only 51 seconds, leaving security teams with virtually no time to detect and respond.
Unclassified new cloud intrusions increased by 26% compared to the previous year. Account exploitation emerged as the primary access tactic, accounting for 35% of cloud incidents in the first half of 2024.
The report found that 52% of identified vulnerabilities were related to initial access. This emphasizes the critical importance of protecting entry points before attackers can establish persistence within systems.
Adam Meyers, CrowdStrike’s Head of Counter Adversary Operations, stated: “China’s increasingly aggressive cyber espionage activities and the rapid weaponization of AI-based deception tactics are forcing organizations to reconsider their security approaches. Threat actors are stealing identity information, utilizing social engineering techniques, and launching attacks across multiple domains, making them difficult to defend against using traditional security frameworks alone.”
Meyers emphasized that “an integrated platform combining real-time threat intelligence and hunting focused on identity, cloud, and endpoints is the key solution for eliminating security blind spots.”
CrowdStrike provides AI-driven real-time threat intelligence and hunting through its CrowdStrike Falcon cybersecurity platform. The company uses behavioral AI and machine learning analytics to enhance visibility and protection across the entire attack chain.
For detailed information on the CrowdStrike 2025 Global Threat Report, visit the CrowdStrike website.
As cyber threats continue to evolve with unprecedented sophistication and speed, organizations must adapt their security strategies accordingly. The integration of AI technologies by both defenders and attackers has fundamentally transformed the cybersecurity landscape, creating a technological arms race where speed, intelligence, and visibility are crucial factors for successful defense.
Security teams must focus on eliminating visibility gaps, detecting adversary movements in real-time, and containing attacks before they can expand. This requires not only advanced technological solutions but also proactive security strategies that anticipate the evolving tactics of determined adversaries.