Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Cyber is the Number One Global “People Risk,” Says Marsh

May 1, 2026

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

May 1, 2026

UK: Education Sector Faces Surge in Cyber Breaches

May 1, 2026
Facebook X (Twitter) Instagram
Friday, May 1
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Researchers Track 2.9 Billion Compromised Credentials
News

Researchers Track 2.9 Billion Compromised Credentials

Team-CWDBy Team-CWDApril 29, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The threat landscape in 2025 was characterized by a surge in compromised credentials, extortion and vulnerability exploitation, according to a new report from KELA.  

The threat intelligence firm tracked nearly 2.9 billion compromised credentials last year globally, it said in its latest report, The State of Cybercrime 2026: Emerging Threats & Predictions.

These included usernames, passwords, session tokens, cookies found in URL, login and password (ULP) lists, breached email repositories and cybercrime marketplaces. At least 347 million were originally obtained by infostealers found on around 3.9 million infected machines.

The numbers were boosted by a massive increase in macOS infostealer infections which surged from under 1000 in 2024 to over 70,000 in 2025.

Read more on infostealers: New ‘Storm’ Infostealer Remotely Decrypts Stolen Credentials

Although the credentials themselves may or may not have been valid, the figures reflect “the sheer scale and persistence of the threat,” according to KELA.

Elsewhere, KELA found:

  • A 45% annual increase in ransomware victims to 7549 – although it’s not clear how many of these paid their extorter. Attacks were claimed by 147 active groups, including 80 new entities
  • 238 vulnerabilities added to CISA’s KEV Catalog in 2025, up 29% from 185 in 2024. Markets now favor “fully weaponized mass-exploitation scripts and exclusive exploits over basic PoC code,” the report noted
  • 250 new hacktivist groups and a 400% increase in DDoS to 3500 attacks in 2025, as geopolitical tensions increased
  • The weaponization of the software supply chain, through OAuth compromise and open source worms in developer ecosystems

AI Dominates the Kill Chain

KELA also noted the growing use of AI to power various stages of attacks.

“Cybercriminals and APT groups have moved from using AI merely as a supportive tool in attacks to making it an essential component in the complexity, enhancement, and escalation of those attacks,” it warned.

Specifically, attacks have moved on from basic jailbreaking of LLMs to vibe hacking for autonomous execution of entire workflows, the report claimed. AI-assisted malware and prompt injection attacks designed to hijack agents are also increasingly common, KELA said.

“We’re seeing a fundamental pivot in adversary behavior with the shift from AI-assisted tools to fully autonomous, agentic malicious workflows, where over 80% of operations require minimal human oversight,” said David Carmiel, CEO of KELA.

“Attackers no longer need to break in through a backdoor, they can quickly find the key and walk through the front using stolen credentials. Organizations relying on stale intelligence and legacy defenses instead of AI-powered solutions are leaving the door wide open to attacks.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRansomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
Next Article 22 BRIDGE:BREAK Flaws Expose Thousands of Lantronix and Silex Serial-to-IP Converters
Team-CWD
  • Website

Related Posts

News

Cyber is the Number One Global “People Risk,” Says Marsh

May 1, 2026
News

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

May 1, 2026
News

UK: Education Sector Faces Surge in Cyber Breaches

May 1, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Beware of threats lurking in booby-trapped PDF files

October 7, 2025

How chatbots can help spread scams

October 14, 2025

Find your weak spots before attackers do

November 21, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.