Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

FIRST Forecasts Record-Breaking 50,000+ CVEs in 2026

February 11, 2026

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

February 11, 2026

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

February 11, 2026
Facebook X (Twitter) Instagram
Wednesday, February 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»“Digital Parasite” Warning as Attackers Favor Stealth for Extortion
News

“Digital Parasite” Warning as Attackers Favor Stealth for Extortion

Team-CWDBy Team-CWDFebruary 10, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Threat actors favored stealthy persistence and evasion over other techniques, in order to silently exfiltrate data for extortion, according to Picus Security.

The security vendor analyzed over 1.1 million malicious files and more than 15.5 million actions in 2025 to compile its latest study: The Red Report 2026.

It revealed the increasingly sophisticated methods that threat actors are using to stay hidden from network defenders – by blending in with legitimate traffic and operating through trusted processes.

To that end, process injection (30%) was the top malicious technique for the third consecutive year. It enables attackers to hide malicious code inside legitimate, trusted applications.

Read more on Picus Security: Threefold Increase in Malware Targeting Credential Stores

Picus Security warned that threat actors are also routing command-and-control (C2) traffic through high-reputation services like OpenAI and AWS to stay hidden. In a quarter of attacks, they used passwords stolen from browsers to masquerade as legitimate users.

Picus Security co-founder Süleyman Özarslan likened this activity to that of a digital parasite.

“Attackers have realized it is more profitable to inhabit the host than to destroy it. They are embedding themselves inside environments, using trusted identities and even physical hardware to feed on access while staying operationally invisible,” he said.

“If your security relies on spotting a ‘break-in,’ you’ve already lost, because they are already logged in.”

These TTPs are helping to support an evolution in the digital extortion landscape, whereby groups are keener to silently exfiltrate data which they can hold to ransom, rather than set off any alarms by deploying encryption.

The use of “data encrypted for impact” dropped by 38% annually, according to the report.

Under the Radar

The report uncovered other examples of sophisticated evasion techniques used in attacks today, including LummaC2 infostealer malware that uses trigonometry to understand when users are moving their mouse and when it is inside an automated security sandbox.

If the latter, the malware knows it is being observed and will not detonate, the report claimed.

Virtualization/sandbox evasion is now the fourth most prevalent MITRE ATT&CK technique observed, with malware designed to go dormant if it suspects it is being analyzed.

Malware now carries out an average of 14 malicious actions and 12 ATT&CK techniques per sample, the report noted. This levelling up in terms of sophistication increases the level of complexity needed for detection and defense, Picus Security claimed.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNCSC Issues Warning Over “Severe” Cyber-Attacks Targeting CNI
Next Article APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
Team-CWD
  • Website

Related Posts

News

FIRST Forecasts Record-Breaking 50,000+ CVEs in 2026

February 11, 2026
News

Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

February 11, 2026
News

North Korean Hackers Use Deepfake Video Calls to Target Crypto Firms

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Top IRS scams to look out for in 2026

February 10, 2026

Chronology of a Skype attack

February 5, 2026

AI-powered financial scams swamp social media

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.