Connect with us

Hi, what are you looking for?

AI Cybersecurity

AI-Driven Cyberattacks Surge as 90% Target Vulnerable Third-Party Software

AI-driven cyberattacks surged as 90% exploit vulnerable third-party software, prompting urgent calls for automated defenses to safeguard businesses.

Cybercriminals are increasingly leveraging artificial intelligence (AI) to exploit vulnerabilities in cloud infrastructure, according to a new report from Google Cloud Security. The document reveals that the time between vulnerability disclosure and mass exploitation has dramatically decreased, shrinking from weeks to just days. This alarming trend signifies that businesses must adopt automated, AI-powered defenses to counter escalating cyber threats.

As cybercriminals refine their tactics, their focus has shifted from core infrastructure of major cloud services like Google Cloud, Amazon Web Services, and Microsoft Azure—areas that are typically well-secured—to targeting weak third-party software. The report highlights a number of incidents involving the exploitation of unpatched vulnerabilities in popular applications, such as React Server Components and the XWiki Platform. In one case, an attacker began exploiting a critical remote code execution vulnerability in React just 48 hours after its public disclosure.

Another serious incident involved the XWiki Platform, where attackers targeted a vulnerability that had been patched but not widely deployed. This issue allowed malicious actors to run arbitrary code on remote servers, and exploitation commenced shortly after the vulnerability was identified. The report suggests that many of these attacks are orchestrated by sophisticated groups, including state-sponsored entities from North Korea.

One particularly illustrative case involves a group known as UNC4899, which lured a developer into downloading compromised code under the guise of project collaboration. This exploit led to the infiltration of corporate networks and the theft of millions in cryptocurrency. Similarly, another attack exploited a compromised Node Package Manager package that enabled the theft of a developer’s GitHub token, facilitating unauthorized access to Amazon Web Services and the deletion of files within 72 hours.

Moreover, the report notes a troubling shift in attack strategies. Rather than relying on brute force methods to crack weak credentials, attackers are increasingly exploiting identity-related vulnerabilities. Notably, 21% of these incidents involved compromised trusted relationships with third parties, and 17% were attributed to voice-based social engineering techniques, or “vishing.” Furthermore, the report identifies “malicious insiders”—employees or contractors leaking confidential information—as a growing threat, often using consumer-focused cloud storage services to exfiltrate data.

One concerning finding is that nearly half of intrusions resulted in data theft without immediate extortion attempts, indicating that attackers are adopting a stealthier approach. These incidents are marked by prolonged dwell times, allowing attackers to persist undetected within networks.

To combat these rising threats, Google Cloud Security has provided a set of recommendations for organizations to bolster their defenses. For large enterprises, the advice includes enhancing patch management protocols, implementing multi-factor authentication, and establishing comprehensive incident response plans. However, small and medium-sized businesses may lack the internal resources to effectively manage these challenges and are encouraged to seek managed service providers with relevant expertise.

As AI continues to shape the landscape of cybersecurity, the imperative for businesses to upgrade their defenses becomes increasingly critical. With AI tools transforming the tactics of cybercriminals, organizations must evolve their security strategies to keep pace. The call for automated, AI-enhanced defenses not only highlights the urgency of the situation but also underscores the broader implications of AI in both offensive and defensive capacities across digital landscapes.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

Top Stories

Hugging Face democratizes AI development by hosting over 2 million open-source models on Google Cloud, empowering 13 million developers to innovate without high costs

Top Stories

Google opens its AI Center in Berlin to drive innovation and ethical AI development through partnerships with the Technical University of Munich and Helmholtz...

Top Stories

Alphabet's cloud backlog skyrocketed 55% to $240 billion, while Nvidia's data center revenue surged 75% to $62.3 billion, intensifying AI competition.

AI Research

Amazon awards $1.2 million in grants to UC Merced professors Li and Lu to advance AI efficiency using AWS Trainium for high-performance deep learning.

Top Stories

Amazon's ProServe is transforming the consulting landscape, leveraging AI to drive over $10 billion in annual revenue while reshaping client engagement strategies.

AI Cybersecurity

AWS outage on October 12, 2023, disrupts access to key applications across e-commerce and finance, raising urgent questions about cloud reliability.

AI Technology

Amazon's CloudFront outage disrupts access for users, highlighting vulnerabilities in cloud services amid rising internet traffic and pushing businesses to reconsider their reliance on...

AI Cybersecurity

A Russian-speaking threat actor compromised over 600 Fortinet devices across 55 countries by exploiting AI tools and misconfigured firewalls, raising urgent cybersecurity concerns.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.