Report Identifies Surge in Credential͏͏ Theft͏͏ and͏͏ Breaches͏͏
A current report from cybersecurity agency Flashpoint detected an escalation of menace exercise throughout͏͏ a number of͏͏ fronts͏͏ throughout͏͏ the͏͏ first͏͏ half͏͏ of͏͏ 2025. Primarily based͏͏ on͏͏ monitoring͏͏ of͏͏ extra͏͏ than͏͏ 3.6͏͏ petabytes͏͏ of͏͏ original-source͏͏ information,͏͏ “Flashpoint͏͏ Global͏͏ Threat͏͏ Intelligence͏͏ Index:͏͏ Midyear͏͏ Edition” paperwork progress͏͏ in͏͏ credential͏͏ theft,͏͏ vulnerability͏͏ disclosures͏͏ and͏͏ exploit͏͏ availability,͏͏ as͏͏ nicely͏͏ as͏͏ a͏͏ rise͏͏ in͏͏ ransomware͏͏ assaults͏͏ and͏͏ large-scale͏͏ information͏͏ breaches.
The͏͏ report,͏͏ which͏͏ covers͏͏ exercise͏͏ from͏͏ Jan.͏͏ 1͏͏ to͏͏ June͏͏ 30,͏͏ discovered͏͏ that͏͏ infostealer͏͏ malware͏͏ was͏͏ the͏͏ main͏͏ trigger͏͏ of͏͏ stolen͏͏ credentials͏͏ for͏͏ the͏͏ first͏͏ half͏͏ of͏͏ 2025.͏͏ Flashpoint͏͏ reported͏͏ an͏͏ 800͏͏% improve͏͏ in͏͏ stolen͏͏ credentials͏͏ linked͏͏ to͏͏ infostealer͏͏ infections͏͏ in contrast͏͏ to͏͏ the͏͏ identical͏͏ interval͏͏ final͏͏ 12 months,͏͏ with͏͏ a͏͏ whole͏͏ of͏͏ 1.8͏͏ billion͏͏ compromised͏͏ data.͏͏ These͏͏ data͏͏ included͏͏ usernames,͏͏ passwords,͏͏ session͏͏ cookies,͏͏ and͏͏ autofill͏͏ information͏͏ collected͏͏ by͏͏ standard͏͏ malware.͏͏ In accordance͏͏ to͏͏ the͏͏ report,͏͏ “these͏͏ items͏͏ of͏͏ digital͏͏ id͏͏ are͏͏ typically͏͏ the͏͏ beginning͏͏ level͏͏ for͏͏ bigger͏͏ malicious͏͏ campaigns,͏͏ permitting͏͏ menace͏͏ actors͏͏ to͏͏ achieve͏͏ preliminary͏͏ entry͏͏ — typically͏͏ via͏͏ a͏͏ single͏͏ infostealer͏͏ an infection.”
“The͏͏ theft …͏͏ underscores͏͏ how͏͏ these͏͏ stolen͏͏ digital͏͏ identities͏͏ underpin͏͏ main͏͏ malicious͏͏ campaigns,”͏͏ mentioned͏͏ Flashpoint.͏͏ “They͏͏ allow͏͏ preliminary͏͏ entry͏͏ that͏͏ can͏͏ cascade͏͏ into͏͏ vital͏͏ information͏͏ breaches͏͏ throughout͏͏ organizations͏͏ and͏͏ their͏͏ provide͏͏ chains.”
Flashpoint͏͏ additionally͏͏ reported͏͏ a͏͏ 246͏͏% improve͏͏ of͏͏ newly͏͏ disclosed͏͏ vulnerabilities͏͏ over͏͏ the͏͏ identical͏͏ time͏͏ interval͏͏ final͏͏ 12 months,͏͏ whereas͏͏ the͏͏ quantity͏͏ of͏͏ publicly͏͏ obtainable͏͏ exploits͏͏ elevated͏͏ by͏͏ 179͏͏%.͏͏ Flashpoint͏͏ analysts͏͏ mentioned͏͏ that͏͏ attackers͏͏ are͏͏ “exploiting͏͏ gaps͏͏ in͏͏ the͏͏ vulnerability͏͏ intelligence͏͏ panorama,”͏͏ notably͏͏ the place͏͏ safety͏͏ groups͏͏ rely͏͏ completely͏͏ on͏͏ official͏͏ feeds͏͏ such͏͏ as͏͏ the͏͏ U.S.͏͏ Nationwide͏͏ Vulnerability͏͏ Database,͏͏ which͏͏ could͏͏ delay͏͏ or͏͏ omit͏͏ rising͏͏ exploit͏͏ intelligence.
Ransomware͏͏ gangs͏͏ ramped͏͏ up͏͏ their͏͏ exercise͏͏ in͏͏ early͏͏ 2025,͏͏ Flashpoint͏͏ discovered,͏͏ with͏͏ assaults͏͏ up͏͏ 179͏͏% over͏͏ the͏͏ earlier͏͏ 12 months.͏͏ The͏͏ agency͏͏ blamed͏͏ the͏͏ surge͏͏ on͏͏ a͏͏ acquainted͏͏ set͏͏ of͏͏ points:͏͏ stolen͏͏ login͏͏ credentials,͏͏ outdated͏͏ software program,͏͏ and͏͏ a͏͏ rising͏͏ market͏͏ of͏͏ ready-made͏͏ ransomware͏͏ kits.
At͏͏ the͏͏ identical͏͏ time,͏͏ international͏͏ information͏͏ breaches͏͏ climbed͏͏ 235͏͏%,͏͏ with͏͏ over͏͏ 9.45͏͏ billion͏͏ data͏͏ uncovered.͏͏ About͏͏ two-thirds͏͏ of͏͏ that͏͏ information͏͏ got here͏͏ from͏͏ U.S.-based͏͏ organizations,͏͏ which͏͏ Flashpoint͏͏ recognized͏͏ as͏͏ the͏͏ most͏͏ steadily͏͏ focused͏͏ area͏͏ so͏͏ far͏͏ this͏͏ 12 months.
IT͏͏ Response
The͏͏ report͏͏ calls͏͏ consideration͏͏ to͏͏ the͏͏ limitations͏͏ of͏͏ reactive͏͏ safety͏͏ methods͏͏ and͏͏ recommends͏͏ organizations͏͏ undertake͏͏ intelligence-driven͏͏ approaches͏͏ that͏͏ prioritize͏͏ threats͏͏ based mostly͏͏ on͏͏ energetic͏͏ adversary͏͏ conduct,͏͏ somewhat͏͏ than͏͏ treating͏͏ all͏͏ vulnerabilities͏͏ equally.͏͏ Flashpoint͏͏ additionally͏͏ advises͏͏ that͏͏ organizations͏͏ monitor͏͏ for͏͏ compromised͏͏ credentials͏͏ on͏͏ underground͏͏ marketplaces,͏͏ observe͏͏ exploit͏͏ availability͏͏ from͏͏ unofficial͏͏ sources,͏͏ and͏͏ implement͏͏ multi-factor͏͏ authentication͏͏ and͏͏ privileged͏͏ entry͏͏ monitoring͏͏ throughout͏͏ environments.
The͏͏ findings͏͏ mirror͏͏ broader͏͏ patterns͏͏ famous͏͏ in͏͏ different͏͏ business͏͏ analysis.͏͏ IBM’s͏͏ X-Pressure͏͏ Risk͏͏ Intelligence͏͏ Index͏͏ earlier͏͏ this͏͏ 12 months͏͏ highlighted͏͏ a͏͏ substantial͏͏ improve͏͏ in͏͏ phishing͏͏ campaigns͏͏ delivering͏͏ infostealers,͏͏ alongside͏͏ with͏͏ a͏͏ shift͏͏ in͏͏ attacker͏͏ focus͏͏ towards͏͏ identity-based͏͏ entry͏͏ vectors.͏͏ These͏͏ developments͏͏ have͏͏ contributed͏͏ to͏͏ the͏͏ rising͏͏ adoption͏͏ of͏͏ zero-trust͏͏ frameworks͏͏ throughout͏͏ enterprise͏͏ IT.
Flashpoint͏͏ positions͏͏ its͏͏ midyear͏͏ index͏͏ as͏͏ a͏͏ complement͏͏ to͏͏ its͏͏ annual͏͏ World͏͏ Risk͏͏ Intelligence͏͏ Report,͏͏ offering͏͏ defenders͏͏ with͏͏ a͏͏ close to͏͏ real-time͏͏ view͏͏ into͏͏ adversary͏͏ conduct.͏͏ “Our͏͏ aim͏͏ with͏͏ this͏͏ midyear͏͏ replace͏͏ is͏͏ to͏͏ present͏͏ safety͏͏ groups͏͏ with͏͏ well timed͏͏ perception͏͏ to͏͏ assist͏͏ inform͏͏ selections͏͏ throughout͏͏ the͏͏ second͏͏ half͏͏ of͏͏ the͏͏ 12 months,” based on the report.͏͏ “Understanding͏͏ how͏͏ threats͏͏ are͏͏ evolving͏͏ midstream͏͏ permits͏͏ defenders͏͏ to͏͏ make͏͏ higher͏͏ use͏͏ of͏͏ their͏͏ current͏͏ intelligence,͏͏ know-how͏͏ and͏͏ workers.”
With͏͏ the͏͏ second͏͏ half͏͏ of͏͏ 2025͏͏ underway,͏͏ the͏͏ report͏͏ signifies͏͏ that͏͏ credential-based͏͏ assaults,͏͏ exploit͏͏ weaponization,͏͏ and͏͏ information͏͏ leaks͏͏ will͏͏ stay͏͏ crucial͏͏ areas͏͏ of͏͏ concern.͏͏ The͏͏ report͏͏ suggests͏͏ that͏͏ whereas͏͏ new͏͏ applied sciences͏͏ and͏͏ frameworks͏͏ provide͏͏ some͏͏ mitigation,͏͏ menace͏͏ actors͏͏ proceed͏͏ to͏͏ adapt͏͏ quickly͏͏ —͏͏ typically͏͏ sooner͏͏ than͏͏ enterprise͏͏ defenses͏͏ can͏͏ maintain͏͏ tempo.͏͏ Safety͏͏ groups,͏͏ the͏͏ report͏͏ concludes,͏͏ will͏͏ want͏͏ to͏͏ be͏͏ equally͏͏ agile͏͏ in͏͏ order͏͏ to͏͏ reply͏͏ to͏͏ the͏͏ increasing͏͏ menace͏͏ panorama.
The total report is accessible right here on the Flashpoint site (registration required).