Security Can’t Keep Up with Modern Attackers

▼ Summary
– Threat groups like Void Rabisu and Scattered Spider are continuously evolving their tactics, techniques, and procedures (TTPs), expanding their targets and tooling across sectors and platforms.
– Zero-day exploits have become commoditized and are now widely adopted by criminal and hybrid actors, compressing defender response windows from weeks to mere days.
– Social engineering has resurged as a primary intrusion method in 2025, fueled by AI tools that scale phishing and credential harvesting while targeting identity and SaaS access.
– Ransomware operations have fragmented, with many groups focusing less on encryption and more on data theft and multi-faceted extortion, while reusing procedures across different entities.
– A key defensive gap exists at the detailed procedure level, as controls often fail when attackers alter execution steps, making behavioral coverage central to effective security.
The relentless pace of cyber threats continues to outstrip traditional security measures, leaving many organizations vulnerable to novel attack methods. Modern attackers constantly refine their tactics, techniques, and procedures (TTPs), ensuring that defensive strategies based on yesterday’s intelligence often fail to recognize today’s malicious behavior. A comprehensive new analysis of global adversary activity reveals several critical trends that define the current threat landscape, emphasizing a widening gap between attacker innovation and defensive coverage.
Detailed research tracking tens of thousands of observed techniques shows that established threat groups are not static; they adapt and evolve their methods in real-time. For instance, the group known as Void Rabisu has broadened its operations beyond simple ransomware, now engaging in espionage against telecommunications, energy, and government sectors. This shift involved changes in their tools, methods for stealing credentials, and sophisticated techniques to evade detection in cloud environments. Similarly, the group Scattered Spider has steadily expanded its reach since 2022, moving from targeting customer service firms to compromising major retail, technology, and finance companies. Their campaigns show a heavy focus on software-as-a-service (SaaS) platforms like Salesforce and Microsoft Teams, utilizing hundreds of distinct procedures to achieve their goals. Even ransomware operations like Akira demonstrate continuous adaptation, reusing familiar commands while making subtle procedural tweaks to focus on credential access and hindering system recovery.
A significant shift involves the proliferation of zero-day exploits beyond nation-state actors. Recent data indicates that criminal and hybrid groups are now actively leveraging these previously rare vulnerabilities. Over fifty threat objects have been linked to suspected zero-day exploitation. Campaigns have included large-scale attacks on SharePoint systems and compromises of Ivanti VPN platforms. Financially motivated actors are using stolen data from these exploits for extortion, particularly targeting cloud infrastructure. This commoditization of zero-days drastically shortens the time defenders have to respond, compressing reaction windows from weeks to mere days. Effective defense now depends on identifying the behavioral patterns of exploitation rather than waiting for official vulnerability patches.
Social engineering has made a powerful comeback as a preferred intrusion method, largely fueled by advancements in automation and artificial intelligence. Attackers employ AI to create highly convincing and scalable phishing campaigns, fraudulent voice calls, and credential harvesting operations. The primary target has shifted to identity, with campaigns aggressively pursuing access to SaaS applications, cloud administration consoles, and single sign-on systems. Groups like Luna Moth have evolved from basic phishing to complex, multi-channel attacks combining voice, email, and direct infrastructure control. Another campaign, attributed to UNC6040, targeted Salesforce through impersonation and consent abuse, enabling massive data theft without deploying any malware at all. Analysts connected numerous procedures across various software platforms to these social engineering efforts, revealing attack chains that completely bypass conventional endpoint security.
The ransomware ecosystem has also transformed, fragmenting into a larger number of smaller, more agile groups. The research identified over fifty active ransomware groups, with sixteen being newly emerged. There is extensive sharing and reuse of procedures among these groups, with the vast majority of observed activity clustering around previously seen methods. While data encryption remains a component, extortion increasingly relies on stolen data, compromised identities, and direct business disruption. Groups such as Medusa and Qilin employ double and triple extortion tactics, targeting backups and cloud assets to maximize pressure on victims. These smaller teams operate quickly, using multi-platform tools and living-off-the-land techniques to minimize their own infrastructure needs. This evolution underscores that ransomware is now defined more by attacker behavior than by specific malware families, making behavioral analysis central to any defense.
A consistent theme across all these findings is a critical coverage gap at the procedural level of defense. Many security teams effectively track high-level techniques and tools, but the specific execution details that reveal attacker intent often go unnoticed. By mapping defensive controls directly to observed adversary procedures, the research highlights where security measures succeed and where they fail during actual intrusions. Controls frequently do not activate when attackers alter minor execution steps, even if the core technique remains unchanged. This demonstrates that true security strength is measured by the ability to disrupt specific adversary behaviors, starting with a deep, verified understanding of exactly how attackers operate.
(Source: HelpNet Security)




