Connect with us

Hi, what are you looking for?

AI Cybersecurity

CrowdStrike Reveals AI Cuts Cyberattack Breakout Time to Just 29 Minutes

CrowdStrike reports AI has slashed cyberattack breakout time to just 29 minutes, highlighting a 65% speed increase and alarming rise in AI-driven threats.

Artificial intelligence is accelerating the pace of cyberattacks, according to CrowdStrike’s 2026 Global Threat Report, which reveals that the average “breakout time” for attackers has plummeted to just 29 minutes. This represents a staggering 65% increase in speed from the previous year, with the most rapid case recorded at a mere 27 seconds. These findings underscore how AI is not only equipping cybercriminals with advanced tools but also exposing new vulnerabilities within organizations.

The report, which analyzes threat activities from over 280 identified adversaries, indicates a significant evolution in the tactics used by cybercriminals. In 2025, once attackers gain initial access to a system, they have begun moving laterally within networks with unprecedented speed. In one incident, data was exfiltrated within four minutes of breaching a system.

One troubling trend highlighted in the report is the exploitation of legitimate generative AI tools. Attackers have manipulated these systems by inputting harmful prompts, which in turn generate commands capable of stealing login credentials and cryptocurrency. Some adversaries have also discovered weaknesses in AI development platforms, deploying ransomware and establishing counterfeit AI servers that mimic trusted services to capture sensitive information. This shift signifies that AI systems have transitioned from merely being tools for employees to becoming integral components of the attack surface.

The rise in AI-driven malicious activity is striking, with such incidents surging by 89% year-over-year. Cybercriminals and state-sponsored groups are increasingly leveraging AI for tasks ranging from network scanning to credential dumping and obfuscating their tracks. These attacks often navigate through trusted user accounts and SaaS applications, blending seamlessly into legitimate traffic and diminishing the response window for security teams.

State actors scale up

Nation-state actors have also intensified their reliance on AI. For example, the Russian-linked group FANCY BEAR has deployed malware integrated with large language models known as LAMEHUG to automate reconnaissance and document collection. Similarly, the eCrime group PUNK SPIDER utilized AI-generated scripts to expedite credential dumping and eliminate forensic trails. Activity linked to North Korea, particularly by the group FAMOUS CHOLLIMA, has surged, with incidents more than doubling. The group PRESSURE CHOLLIMA notably executed a $1.46 billion cryptocurrency theft, marking it as the largest documented financial heist to date.

Additionally, China-linked activities increased by 38% in 2025, predominantly targeting logistics firms, which saw an 85% uptick in assaults. Two-thirds of the vulnerabilities exploited by these actors allowed immediate system access, with 40% directed at internet-facing edge devices.

The report also notes a concerning rise in zero-day exploitations, with 42% of vulnerabilities being exploited before public disclosure. These flaws have been leveraged for initial access, remote code execution, and privilege escalation. Cloud-focused intrusions experienced a 37% increase overall, while attacks targeting cloud environments by state-linked actors surged by 266%, often for intelligence gathering purposes.

Another alarming trend involves the dramatic increase in fake CAPTCHA pages, which have risen by 563%. Instead of verifying user identities, these deceptive pages lure victims into downloading malware. This shift indicates a potential pivot away from traditional tactics like fake browser update prompts, as cybercriminals increasingly adopt these CAPTCHA traps.

The report emphasizes that 2025 has been characterized by “the evasive adversary,” where attackers exploit trusted relationships—such as supply chain partners, legitimate software, and even internal systems—to infiltrate networks and evade detection. Adam Meyers, head of counter adversary operations at CrowdStrike, stated, “This is an AI arms race. Breakout time is the clearest signal of how intrusion has changed. Adversaries are moving from initial access to lateral movement in minutes. AI is compressing the time between intent and execution while turning enterprise AI systems into targets. Security teams must operate faster than the adversary to win.”

The findings from CrowdStrike highlight a growing urgency for organizations to adapt to the rapid evolution of cyber threats. As AI continues to permeate both offensive and defensive strategies in cybersecurity, the pressure on security teams will only escalate, necessitating faster responses to neutralize threats before they can inflict harm.

See also
Rachel Torres
Written By

At AIPressa, my work focuses on exploring the paradox of AI in cybersecurity: it's both our best defense and our greatest threat. I've closely followed how AI systems detect vulnerabilities in milliseconds while attackers simultaneously use them to create increasingly sophisticated malware. My approach: explaining technical complexities in an accessible way without losing the urgency of the topic. When I'm not researching the latest AI-driven threats, I'm probably testing security tools or reading about the next attack vector keeping CISOs awake at night.

You May Also Like

AI Generative

X revises creator policy to combat AI-generated misinformation in war videos, risking monetization and bans for creators who fail to disclose synthetic content.

AI Regulation

Federal judge orders Amazon's legal team to clarify generative AI use in class action errors, spotlighting critical consumer protection concerns.

AI Cybersecurity

Ransomware disrupts Japan's Advantest, delaying order processing as semiconductor demand surges, with prices for memory components climbing 15% amid AI boom.

AI Regulation

Governments worldwide are accelerating digital sovereignty initiatives to mitigate risks from cloud and AI vulnerabilities, as Info-Tech reveals significant control gaps in public sector...

AI Cybersecurity

Cloudflare's 2026 Threat Report reveals 230 billion daily cyber threats, highlighting an unprecedented rise in AI-driven attacks that demand urgent cybersecurity action.

AI Tools

Library vendors like EBSCO and ScienceDirect are integrating AI tools, enhancing research efficiency with features like natural language searching and article summarizers.

Top Stories

Telecom operators must swiftly adopt AI-driven network management to unlock new revenue streams and enhance operational efficiency, or face obsolescence.

AI Finance

AI integration in behavioral finance can enhance investment strategies, potentially boosting returns by up to 6%, as firms navigate emotional biases effectively.

© 2025 AIPressa · Part of Buzzora Media · All rights reserved. This website provides general news and educational content for informational purposes only. While we strive for accuracy, we do not guarantee the completeness or reliability of the information presented. The content should not be considered professional advice of any kind. Readers are encouraged to verify facts and consult appropriate experts when needed. We are not responsible for any loss or inconvenience resulting from the use of information on this site. Some images used on this website are generated with artificial intelligence and are illustrative in nature. They may not accurately represent the products, people, or events described in the articles.