Last Update: 04/05/2026 at 2:50 PM EST
Identity Attacks Fuel Faster Extortion
Coverage from Constella Intelligence, CanadianUnderwriter.ca, and others
Articles
14
Latest Article
03/16
Active Days
551
Executive Summary
Reports show identity theft, AI, and SaaS abuse speeding intrusions while extortion shifts toward data theft and leak threats
- Identity attacks became industrialized in 2025, with record volumes and far more plaintext credentials
- Infostealers and GPU cracking farms turned stolen data into large libraries for account takeover
- Session cookie theft can bypass MFA and enable automated access abuse
- Telegram-based infostealer clouds and RaaS affiliates keep stolen logs moving through underground markets
- Extortion-only attacks rose sharply as groups shifted away from encryption toward data theft and publication threats
- Healthcare, manufacturing, retail, public, and education sectors saw major impact from these tactics
- Unit 42 found AI, stolen credentials, unmanaged tokens, and SaaS integrations are speeding intrusions
Quick Facts
- What: Industrialized identity theft and extortion using credentials, cookies, and AI
- Where: Global enterprises, SaaS environments, and exposed public sector systems
- Why: To enable account takeover, data theft, fraud, and extortion
- Who: Cybercriminals, infostealer crews, RaaS affiliates, and threat actors
- When: 2025 trends shaping threat activity through 2026

