
🔥 Get Your $1000 Gift Card Instantly! 🔥
🎉 1 out of 4 wins! Claim your $1000 gift card in just 1 minute! ⏳
💎 Claim Now 🎁 Get $1000 Amazon Gift Card Now! 🎯🎉 1 out of 4 wins! Claim your $1000 gift card in just 1 minute! ⏳
💎 Claim Now 🎁 Get $1000 Amazon Gift Card Now! 🎯🎉 1 out of 4 wins! Claim your $1000 gift card in just 1 minute! ⏳
💎 Claim Now 🎁 Get $1000 Amazon Gift Card Now! 🎯Join our daily and weekly newsletters for the latest updates and exclusive content on industry-leading AI coverage. Learn More
Fifty-one seconds. That’s all it takes for an attacker to breach and move laterally across your network, undetected, using stolen credentials to evade detection.
Adam Meyers, senior vice president of counter adversary operations at CrowdStrikeexplained to VentureBeat just how quickly intruders can escalate privileges and move laterally once they penetrate a system. “(T)he next phase typically involves some form of lateral movement, and this is what we like to calculate as breakout time. In other words, from the initial access, how long does it take till they get into another system? The fastest breakout time we observed was 51 seconds. So these adversaries are getting faster, and this is something that makes the defender’s job a lot harder,” Meyers said.
AI is far and away an attacker’s weapon of choice today. It’s cheap, fast and versatile, enabling attackers to create vishing (voice phishing) and deepfake scams and launch social engineering attacks in a fraction of the time previous technologies could.
Vishing is out of control due in large part to attackers fine-turning their tradecraft with AI. CrowdStrike’s 2025 Global Threat Report found that vishing exploded by 442% in 2024. It’s the top initial access method attackers use to manipulate victims into revealing sensitive information, resetting credentials and granting remote access over the phone.
“We saw a 442% increase in voice-based phishing in 2024. This is social engineering, and this is indicative of the fact that adversaries are finding new ways to gain access because…we’re kind of in this new world where adversaries have to work a little bit harder or differently to avoid modern endpoint security tools,” Meyers said.
Phishing, too, continues to be a threat. Meyers said, “We’ve seen that with phishing emails, they have a higher click-through rate when it’s AI-generated content, a 54% click-through rate, versus 12% when a human is behind it.”
The Chinese Green Cicada network has used an AI-driven content generator to create and run 5,000+ fake accounts on social media to spread election disinformation. North Korea’s FAMOUS CHOLLIMA adversary group is using generative AI to create fake LinkedIn profiles of IT job candidates with the goal of infiltrating global aerospace, defense, software and tech companies as remote employees.
A sure sign attackers’ AI tradecraft is maturing fast is how successful they’re being with identity-based attacks. Identity attacks are overtaking malware as the primary breach method. Seventy-nine percent of attacks to gain initial access in 2024 were malware-free, relying instead on stolen credentials, AI-driven phishing and deepfake scams. One in three, or 35%, of cloud intrusions leveraged valid credentials last year.
“Adversaries have figured out that one of the fastest ways to gain access to an environment is to steal legitimate credentials or to use social engineering. Bringing malware into the modern enterprise that has modern security tools on it is kind of like trying to bring a water bottle into the airport — TSA is probably going to catch you,” explains Meyers.
“We found a gap in our ability to revoke legitimate identity session tokens at the resource side,” Alex Philips, CIO at National Oilwell Varco (NOV), told VentureBeat in a recent interview. “We now have a startup company who is helping us create solutions for our most common resources where we would need to quickly revoke access. It isn’t enough to just reset a password or disable an account. You have to revoke session tokens.”
NOV is fighting back against attacks using a wide variety of techniques. Philips shared the following as essential for shutting down increasingly AI-driven attacks that rely on deception through vishing, stolen credentials and identities:
51-second breakouts are a symptom of a much larger and more severe identity and access management (IAM) weakness in organizations. Core to this breakdown in IAM security is assuming trust is enough to protect your business (it isn’t). Authenticating every identity, session and request for resources is. Assuming your company has been breached is the place to start.
What follows are three lessons about about shutting down lightning-fast breaches, shared by Philips and validated by CrowdStrike’s research showing these attacks are the new normal of weaponized AI:
Cut off attacks at the authentication layer first, before the breach spreads. Make stolen credentials and session tokens useless as fast as you can. That needs to start with identifying how to shorten token lifetimes and implement real-time revocation to stop attackers mid-movement.
Use AI-driven threat detection to spot attacks in real time. AI and machine learning (ML) excel at anomaly detection across large datasets that they also train on over time. Identifying a potential breach or intrusion attempt and containing it in real time is the goal. AI and ML techniques continue to improve as the attack datasets they’re trained on improve.
Unify endpoint, cloud and identity security to stop lateral movement. Core to zero trust is defining segmentation at the endpoint and network level in order to contain a breach within the segments’ boundaries. The goal is to keep enterprise systems and infrastructure secure. By having them unified, lightning-quick attacks are contained and don’t spread laterally across a network.
To win the AI war, attackers are weaponizing AI to launch lightning-quick attacks while at the same time creating vishing, deepfakes and social engineered campaigns to steal identities. Phillips’ methods for stopping them, including employing AI-driven detection and instantly revoking tokens to kill stolen sessions before they spread, are proving effective.
At the center of Philips’ and many other cybersecurity and IT leaders’ strategies is the need for zero trust. Time and again, VentureBeat sees security leaders who succeed in battling back against machine-speed attacks are those championing least privileged access, network and endpoint segmentation, monitoring every transaction and request for resources, and continually verifying identities.
🎁 You are the lucky visitor today! You won a FREE $1000 gift card! 🎁
⚡ Hurry up! This offer is valid for today only! ⚡
Claim Now 💰 Get Amazon Deals 📢