2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale
DPRK-nexus adversaries infiltrate 320+ companies using GenAI accelerated attacks; threat actors exploit AI agents, exposing autonomous systems as the next enterprise attack surface
CrowdStrike Threat Hunting Report Highlights
Based on frontline intelligence from CrowdStrike鈥檚 elite threat hunters and intelligence analysts tracking more than 265 named adversaries, the report reveals:
-
Adversaries Weaponize AI at Scale: DPRK-nexus adversary used GenAI to automate every phase of its insider attack program. From building fake resumes and conducting deepfake interviews to completing technical tasks under false identities 鈥� AI-powered adversary tradecraft is transforming traditional insider threats into scalable, persistent operations.
Russia -nexus adversary used GenAI to amplify pro-Russia narratives andIran -nexus adversary deployed LLM-crafted phishing lures targetingU.S. and EU entities. - Agentic AI Is the New Attack Surface: CrowdStrike observed multiple threat actors exploiting vulnerabilities in tools used to build AI agents, gaining unauthenticated access, establishing persistence, harvesting credentials, and deploying malware and ransomware. These attacks demonstrate how the agentic AI revolution is reshaping the enterprise attack surface 鈥� turning autonomous workflows and non-human identities into the next frontier of adversary exploitation.
- GenAI-built Malware Becomes AG真人官方ity: Lower-tier eCrime and hacktivist actors are abusing AI to generate scripts, solve technical problems, and build malware 鈥� automating tasks that once required advanced expertise. Funklocker and SparkCat are early proof points that GenAI-built malware is no longer theoretical, it鈥檚 already operational.
- Accelerates Identity-Based, Cross-Domain Attacks: The group resurged in 2025 with faster and more aggressive tradecraft 鈥� leveraging vishing and help desk impersonation to reset credentials, bypass MFA, and move laterally across SaaS and cloud environments. In one incident, the group moved from initial access to encryption by deploying ransomware in under 24 hours.
-
China -nexus Adversaries Drive Continued Surge in Cloud Attacks: Cloud intrusions rose136% , withChina -linked adversaries responsible for40% of increased activity, as and evaded detection through cloud misconfigurations and trusted access.
鈥淭he AI era has redefined how businesses operate, and how adversaries attack. We鈥檙e seeing threat actors use GenAI to scale social engineering, accelerate operations, and lower the barrier to entry for hands-on-keyboard intrusions,鈥� said Adam Meyers, head of counter adversary operations at CrowdStrike. 鈥淎t the same time, adversaries are targeting the very AI systems organizations are deploying. Every AI agent is a superhuman identity: autonomous, fast, and deeply integrated, making them high-value targets. Adversaries are treating these agents like infrastructure, attacking them the same way they target SaaS platforms, cloud consoles, and privileged accounts. Securing the AI that powers business is where the cyber battleground is evolving.鈥�
Additional Resources:
- Download the .
- Visit CrowdStrike鈥檚 for the internet鈥檚 definitive source on adversaries.
- Listen to the to glean insights into threat actors and recommendations to amplify security practices.
- To learn more about the 2025 CrowdStrike Threat Hunting Report, read our , visit us , or stop by the CrowdStrike Black Hat booth #2733.
About CrowdStrike
(NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world鈥檚 most advanced cloud-native platform for protecting critical areas of enterprise risk 鈥� endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon庐 platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
CrowdStrike: We stop breaches.
Learn more:
Follow us: | | | |
Start a free trial today:
漏 2025 CrowdStrike, Inc. All rights reserved. CrowdStrike and CrowdStrike Falcon are marks owned by CrowdStrike, Inc. and are registered in
View source version on businesswire.com:
Media Contact
Jake Schuster
CrowdStrike Corporate Communications
[email protected]
Source: CrowdStrike, Inc.