Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

UK’s Data Watchdog Gets a Makeover to Match Growing Demands

February 27, 2026

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

February 27, 2026

Exploitable Vulnerabilities Present in 87% of Organizations

February 27, 2026
Facebook X (Twitter) Instagram
Friday, February 27
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks
News

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks

Team-CWDBy Team-CWDFebruary 26, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


More than 32 million high-confidence phishing emails were detected by Darktrace in 2025, showcasing a substantial escalation in identity-driven cyber threats.

The data was collected by Darktrace from incidents across its global customer base and points to a year defined by automation, convergence and accelerating attacker speed.

Over 8.2 million phishing emails targeted VIPs, accounting for more than 25% of all observed phishing attempts.

Meanwhile, 1.6 million phishing emails originated from newly created domains and 1.2 million incorporated malicious QR codes.

Notably, 70% of phishing emails successfully passed DMARC authentication, 41% were classified as spear-phishing and 38% contained novel social engineering techniques. One-third exceeded 1000 characters.

Identity Compromise Dominant Entry Vector 

The Darktrace report also showed how identity compromise has overtaken vulnerability exploitation as the dominant entry vector. Common Vulnerabilities and Exposures (CVE) increased by approximately 20% year-on-year (YoY), with exploitation often occurring before public disclosure.

“Identity has become the attacker’s skeleton key. Instead of forcing their way through a firewall, adversaries are logging in with stolen credentials, hijacked tokens and abused permissions, then moving laterally under the cover of legitimacy,” commented Shane Barney, CISO at Keeper Security.

“When identity controls are fragmented or overly permissive, attackers don’t need novel exploits. They just need access that looks routine.”

Read more on credential theft: Have Your Users’ Credentials Been Leaked on The Dark Web?

Across the Americas, SaaS and Microsoft 365 account takeovers accounted for nearly 70% of incidents. Manufacturing represented 17% of recorded cases and 29% of ransomware incidents in the region. About 47% of all global security events tracked by Darktrace in 2025 originated in the Americas alone.

Regional and Sector Trends Reveal Expanding Attack Surface

The Darktrace report also highlighted how regional patterns reflect differing levels of digital maturity and geopolitical pressure.

In Latin America, 44% of cases involved malware spreading after credential theft or phishing. Education was the most impacted sector at 18%, with Brazil, Mexico and Colombia reporting the highest volumes over the past three years.

Europe recorded 58% of incidents linked to cloud and email compromise, compared with 42% involving network-based attacks.

Meanwhile, Africa experienced a 60% YoY rise in ransomware and saw 76% of compromises classified as network-based.

In Asia-Pacific and Japan, 84% of organizations said AI-powered threats are already impacting them, yet only 42% reported having formal policies governing safe AI use.

“Identity is no longer about perimeter-based defense. The rise in AI-based agents and the massively accelerating threat landscape has rendered that approach inadequate, and prompted a shift towards identity as the critical element to enterprise security,” SailPoint CEO, Mark McClain, said.

“This report’s findings demonstrate that there is now a need for real-time, intelligent, and dynamic identity security, built to govern and secure not just ‘who,’ or in the case of AI agents, ‘what,’ has access to the enterprise, but what data they can access and what they are able to do once inside.” 

Additional findings, regional breakdowns and sector-specific analysis from the report are available on Darktrace’s website.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleDell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
Next Article Operating in a World of Permanent Instability
Team-CWD
  • Website

Related Posts

News

UK’s Data Watchdog Gets a Makeover to Match Growing Demands

February 27, 2026
News

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

February 27, 2026
News

Aeternum Botnet Shifts Command Control to Polygon Blockchain

February 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is Poshmark safe? How to buy and sell without getting scammed

February 19, 2026

Top IRS scams to look out for in 2026

February 10, 2026

Is it time for internet services to adopt identity verification?

January 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.