By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CrowdStrike report finds surge in malware-free cyberattacks and AI-driven threats in 2024 – News
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > CrowdStrike report finds surge in malware-free cyberattacks and AI-driven threats in 2024 – News
News

CrowdStrike report finds surge in malware-free cyberattacks and AI-driven threats in 2024 – News

News Room
Last updated: 2025/02/27 at 5:50 AM
News Room Published 27 February 2025
Share
SHARE

A new report out today from CrowdStrike Holdings Inc. highlights how cyberthreats evolved significantly in 2024, with attackers shifting toward malware-free intrusions, artificial intelligence-assisted social engineering and cloud-focused vulnerabilities.

The 11th annual 2025 CrowdStrike Global Threat report details a surge in alleged China-backed cyber activity, an explosion in “vishing,” or voice phishing, and identity-based attacks and the growing role of generative AI in cybercrime.

In 2024, CrowdStrike found that 79% of cyber intrusions were malware-free, compared with 40% in 2019. Attackers were found to be increasingly leveraging legitimate remote management and monitoring tools to bypass traditional security measures. And the breakout time — the time it takes for an attacker to move laterally within a compromised network after gaining initial access — dropped to 48 minutes in 2024, with some attacks spreading in under one minute.

Identity-based attacks and social engineering saw notable surges through 2024. Vishing attacks surged more than fivefold, notably replacing traditional phishing as a primary method of initial access. Help desk impersonation attempts also increased through the year, with adversaries persuading information technology staff to reset passwords or bypass multifactor authentication.

Access broker advertisements, where attackers sell stolen credentials, rose 50% through 2024, as more credentials were stolen and made available on both the clear and dark web.

Alleged China-linked actors were also busy through the year. CrowdStrike’s researchers claim a 150% increase in activity, with some industries seeing a 200% to 300% spike. The same groups are noted in the report as adopting strong OPSEC measures, making their attacks harder to trace.

As with last year’s annual report, CrowdStrike also highlights the rising prominence of AI in cybercrime. Generative AI is now widely adopted for social engineering, phishing, deepfake scams and automated disinformation campaigns. Notable AI campaigns include the North Korea-linked group FAMOUS CHOLLIMA using AI-powered fake job interviews to infiltrate tech companies.

Cloud and software-as-a-service attacks were also found to have risen in 2024, with cloud-conscious adversaries expanding their tactics and exploiting valid accounts for initial access. Some 35% of cloud security incidents involved valid account abuse, as attackers avoided malware to stay undetected and SaaS exploitation increased. Attackers targeted Microsoft 365, SharePoint and enterprise application programming interfaces to exfiltrate sensitive data.

On the vulnerability front, more than half of vulnerabilities observed in 2024 were related to initial access, reinforcing the urgency of securing entry points. The report notes that zero-day or unpatched vulnerability exploitation remains a concern, with state-backed groups focusing on network appliances and cloud infrastructure.

To counter the increasing levels of security risk, CrowdStrike’s researchers recommend strengthening identity security through phishing-resistant MFA, continuous monitoring of privileged accounts, and proactive threat hunting to detect malware-free intrusions before attackers establish a foothold. Organizations should also implement real-time AI-driven threat detection, ensuring rapid response capabilities to mitigate fast-moving attacks, such as those with breakout times under a minute.

In addition to identity protection, enterprises are recommended to fortify cloud security by enforcing least privilege access, monitoring API keys for unauthorized usage and securing software-as-a-service applications against credential abuse. As adversaries increasingly exploit automation and AI tools, defenders are advised to adopt advanced behavioral analytics and cross-domain visibility solutions to detect stealthy intrusions and disrupt adversary operations before they escalate.

Image: News/Ideogram

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Amazon has knocked over $30 off our favorite fitness tracker for runners
Next Article Slack Is Down, Leaving Thousands in the Dark
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Ben Johnson shows true colors over Caleb Williams’ feelings towards Bears
News
Tariffs or Not, I'm Still Glad I Bought an iPhone 16 Pro Before Summer
News
Which two tech rivals have the most valuable brands right now?
News
Netflix Tudum 2025: How to Stream Lady Gaga’s Performance and All the Big Reveals
News

You Might also Like

News

Ben Johnson shows true colors over Caleb Williams’ feelings towards Bears

4 Min Read
News

Tariffs or Not, I'm Still Glad I Bought an iPhone 16 Pro Before Summer

13 Min Read
News

Which two tech rivals have the most valuable brands right now?

3 Min Read
News

Netflix Tudum 2025: How to Stream Lady Gaga’s Performance and All the Big Reveals

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?