Connect with us

Hi, what are you looking for?

AI Cybersecurity

AI-Driven Cyberattacks Surge as 90% Target Vulnerable Third-Party Software

AI-driven cyberattacks surged as 90% exploit vulnerable third-party software, prompting urgent calls for automated defenses to safeguard businesses.

Cybercriminals are increasingly leveraging artificial intelligence (AI) to exploit vulnerabilities in cloud infrastructure, according to a new report from Google Cloud Security. The document reveals that the time between vulnerability disclosure and mass exploitation has dramatically decreased, shrinking from weeks to just days. This alarming trend signifies that businesses must adopt automated, AI-powered defenses to counter escalating cyber threats.

As cybercriminals refine their tactics, their focus has shifted from core infrastructure of major cloud services like Google Cloud, Amazon Web Services, and Microsoft Azure—areas that are typically well-secured—to targeting weak third-party software. The report highlights a number of incidents involving the exploitation of unpatched vulnerabilities in popular applications, such as React Server Components and the XWiki Platform. In one case, an attacker began exploiting a critical remote code execution vulnerability in React just 48 hours after its public disclosure.

Another serious incident involved the XWiki Platform, where attackers targeted a vulnerability that had been patched but not widely deployed. This issue allowed malicious actors to run arbitrary code on remote servers, and exploitation commenced shortly after the vulnerability was identified. The report suggests that many of these attacks are orchestrated by sophisticated groups, including state-sponsored entities from North Korea.

One particularly illustrative case involves a group known as UNC4899, which lured a developer into downloading compromised code under the guise of project collaboration. This exploit led to the infiltration of corporate networks and the theft of millions in cryptocurrency. Similarly, another attack exploited a compromised Node Package Manager package that enabled the theft of a developer’s GitHub token, facilitating unauthorized access to Amazon Web Services and the deletion of files within 72 hours.

Moreover, the report notes a troubling shift in attack strategies. Rather than relying on brute force methods to crack weak credentials, attackers are increasingly exploiting identity-related vulnerabilities. Notably, 21% of these incidents involved compromised trusted relationships with third parties, and 17% were attributed to voice-based social engineering techniques, or “vishing.” Furthermore, the report identifies “malicious insiders”—employees or contractors leaking confidential information—as a growing threat, often using consumer-focused cloud storage services to exfiltrate data.

One concerning finding is that nearly half of intrusions resulted in data theft without immediate extortion attempts, indicating that attackers are adopting a stealthier approach. These incidents are marked by prolonged dwell times, allowing attackers to persist undetected within networks.

To combat these rising threats, Google Cloud Security has provided a set of recommendations for organizations to bolster their defenses. For large enterprises, the advice includes enhancing patch management protocols, implementing multi-factor authentication, and establishing comprehensive incident response plans. However, small and medium-sized businesses may lack the internal resources to effectively manage these challenges and are encouraged to seek managed service providers with relevant expertise.

As AI continues to shape the landscape of cybersecurity, the imperative for businesses to upgrade their defenses becomes increasingly critical. With AI tools transforming the tactics of cybercriminals, organizations must evolve their security strategies to keep pace. The call for automated, AI-enhanced defenses not only highlights the urgency of the situation but also underscores the broader implications of AI in both offensive and defensive capacities across digital landscapes.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

Top Stories

SAP and Google Cloud partner to integrate AI agents in marketing, enabling real-time strategies and reducing data fragmentation for over 50% of marketers.

Top Stories

Google Cloud unveils TPU 8t and 8i chips, boosting AI model training speed by 300% and offering 80% better performance per dollar for cloud...

AI Tools

AWS faces significant outages due to high traffic and configuration errors, disrupting critical services and raising concerns over cloud reliability.

AI Regulation

CloudFront's recent service interruption blocked user requests amid high traffic, raising alarms over potential server overload and impacting businesses relying on its content delivery.

Top Stories

Amazon's stock nears a 52-week high as CEO Andy Jassy reveals a $15B annual run rate for AI services and a groundbreaking $200B capital...

AI Regulation

CloudFront's recent server connectivity issues disrupted access to numerous applications, highlighting vulnerabilities in digital infrastructure as businesses face increased traffic demands.

AI Business

Commvault unveils AI Protect and Data Activate to enhance data resilience for the 93% of organizations engaging with agentic AI, ensuring robust governance and...

Top Stories

AWS launches Amazon Bio Discovery, an AI-powered service that accelerates scientific research by streamlining data analysis and interpretation for drug discovery and genomics.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.