Cybercriminals Shift Focus to Credential Theft and AI-Driven Phishing

Article Highlights
Off On

In 2024, the cybersecurity landscape experienced notable changes, with cybercriminals increasingly adopting stealthier tactics, particularly focusing on credential theft through infostealers. IBM’s research highlighted an 84% spike in phishing emails delivering infostealers from 2023 to 2024, favoring this method for its quick and discreet identity attacks.

Credential theft incidents surged as attackers exploited the growing complexity of hybrid cloud environments, targeting critical infrastructure. Within this sector, cybercriminals often gained initial access via valid accounts (31%), phishing (26%), and public-facing application exploits (26%). Once access was secured, malware was deployed in 40% of cases, with ransomware constituting 30% of these deployments.

A significant trend in 2024 saw cybercriminals prefer stealing data (18%) over encrypting it (11%). This shift is attributed to advanced detection technologies and increased pressure from law enforcement, prompting quicker and more discreet operations. Although ransomware incidents declined, constituting 28% of malware cases and 11% of security cases, cybercriminals continued diversifying their malware portfolios.

IBM’s report exposed vulnerabilities in critical infrastructure due to reliance on legacy technology and slow patching cycles. Over a quarter of incidents exploited these weaknesses. The trading of exploit codes for common vulnerabilities on dark web forums fueled attacks on power grids, health networks, and industrial systems. Phishing emails delivering infostealers continued to rise into early 2025, with a 180% increase compared to 2023. The use of AI enabled cybercriminals to scale phishing campaigns, making identity attacks cheaper and more profitable. Additionally, the dark web saw an increase in adversary-in-the-middle (AITM) phishing kits designed to bypass multi-factor authentication (MFA).

Regionally, the Asia-Pacific (APAC) region accounted for 34% of attacks, focusing primarily on malware-ransomware (22%) and server access (11%). North America followed with 24% of incidents, with common actions including remote access tools (17%) and backdoor malware (17%). AI security remained a critical concern as researchers worked to identify and rectify vulnerabilities before exploitation by cybercriminals. As AI adoption grows, securing the AI pipeline will be crucial. In conclusion, 2024 marked significant shifts towards stealthier and more opportunistic cyberattack methods. The emphasis on credential theft and data exfiltration shows cybercriminals adapting to modern security measures. This evolution underscores the importance of robust and proactive cybersecurity measures to combat an ever-evolving threat landscape.

Explore more

Poco Confirms M8 5G Launch Date and Key Specs

Introduction Anticipation in the budget smartphone market is reaching a fever pitch as Poco, a brand known for disrupting price segments, prepares to unveil its latest contender for the Indian market. The upcoming launch of the Poco M8 5G has generated considerable buzz, fueled by a combination of official announcements and compelling speculation. This article serves as a comprehensive guide,

Data Center Plan Sparks Arrests at Council Meeting

A public forum designed to foster civic dialogue in Port Washington, Wisconsin, descended into a scene of physical confrontation and arrests, vividly illustrating the deep-seated community opposition to a massive proposed data center. The heated exchange, which saw three local women forcibly removed from a Common Council meeting in handcuffs, has become a flashpoint in the contentious debate over the

Trend Analysis: Hyperscale AI Infrastructure

The voracious appetite of artificial intelligence for computational resources is not just a technological challenge but a physical one, demanding a global construction boom of specialized facilities on a scale rarely seen. While the focus often falls on the algorithms and models, the AI revolution is fundamentally a hardware revolution. Without a massive, ongoing build-out of hyperscale data centers designed

Trend Analysis: Data Center Hygiene

A seemingly spotless data center floor can conceal an invisible menace, where microscopic dust particles and unnoticed grime silently conspire against the very hardware powering the digital world. The growing significance of data center hygiene now extends far beyond simple aesthetics, directly impacting the performance, reliability, and longevity of multi-million dollar hardware investments. As facilities become denser and more powerful,

CyrusOne Invests $930M in Massive Texas Data Hub

Far from the intangible concept of “the cloud,” a tangible, colossal data infrastructure is rising from the Texas landscape in Bosque County, backed by a nearly billion-dollar investment that signals a new era for digital storage and processing. This massive undertaking addresses the physical reality behind our increasingly online world, where data needs a physical home. The Strategic Pull of