Identity Abuse Now Accounts for Nearly Two-Thirds of All Breaches: Cybersecurity Insights

Identity-Abuse-Now-Accounts-for-Nearly-Two-Thirds-of-All-Breaches-Cybersecurity-Insightsdata

Identity-Based Attacks Remain Primary Entry Point for Cyber Threats

A recent report from Palo Alto Networks’ threat intelligence unit, Unit 42, reveals that nearly two-thirds of breaches begin with identity abuse. The report, which analyzed 750 incidents over a one-year period ending in September 2025, found that social engineering was the leading attack method, accounting for one-third of all initial network intrusions. Compromised credentials, brute-force attacks, overly permissive identity policies, and insider threats were also common tactics used by attackers to bypass security controls.

The Role of Identity in Cyber Attacks

The report highlights the significant role identity plays in the attack lifecycle, with an identity-related element involved in nearly 90% of all incidents. According to Sam Rubin, senior vice president of consulting and threat intelligence at Unit 42,

“Once you have an identity, you’ve got everything. You’ve got the key, and you’re in.”

Rubin notes that enterprises struggle to detect identity-based tactics, as they often don’t involve unauthorized access from a technical telemetry standpoint.

Vulnerability Exploits and Human Error

While vulnerability exploits remain a significant threat, accounting for 22% of initial intrusions, human error remains the weakest link in the security chain. The rise of machine-based identities and AI agents is expanding the attack surface for cybercriminals, who can use these identities to take action. The software supply chain is also vulnerable, particularly when it comes to API access and SaaS integrations.

Consequences of Weak Identity Controls

A recent attack on Salesloft Drift customers demonstrates the potential consequences of weak identity controls. The attack, which impacted over 700 organizations, highlighted the risks of tightly integrated services and the potential for attackers to move laterally through a network. Rubin notes that attackers often jump from branch offices to headquarters or data centers due to over-permissioned accounts and cloud-based accounts with excessive privileges.

Recommendations for Better Identity-Based Practices

The report emphasizes the need for better identity-based practices to constrain the blast radius of attacks. However, this can be a challenge, particularly for large and older organizations with complex, poorly integrated technology stacks. Rubin notes that defenders often focus on individual components of the attack chain rather than considering the entire lifecycle of an attack.

Financially Motivated Attacks

Financially motivated attacks accounted for the majority of incidents analyzed in the report, with median payments increasing 87% year-over-year to $500,000. Attackers are also becoming more efficient, exfiltrating data from victim networks in a median duration of two days. In 22% of cases, attackers stole data in under one hour.

Limited Visibility into the Global Threat Landscape

While the report provides valuable insights into attack trends and techniques, it is limited to incidents that prompted victims to seek help from Unit 42. Rubin notes that t

Blog Image

About Author

en_USEnglish