AI-driven cyberattacks targeting identity systems
Summary
Hide β²
Show βΌ
AI-driven cyberattacks are increasingly targeting identity systems. Attackers leverage AI to scale attacks, use deepfakes for impersonation, exploit APIs, and create synthetic identities. These threats bypass traditional security measures, making identity verification the last line of defense. Organizations must adapt their security strategies to address these evolving threats. The webinar 'AI's New Attack Surface: Why Identity Is the Last Line of Defense' by Okta's Karl Henrik Smith highlights the vulnerabilities created by AI and provides strategies to secure identity systems against AI-driven threats.
Timeline
-
13.08.2025 12:30 π° 1 articles Β· β± 1mo ago
Webinar highlights AI-driven cyberattacks targeting identity systems
The webinar 'AI's New Attack Surface: Why Identity Is the Last Line of Defense' discusses the evolving threats posed by AI-driven cyberattacks. It emphasizes the importance of identity verification as the last line of defense against these attacks. The webinar provides strategies for securing identity systems and building secure-by-design AI applications.
Show sources
- Webinar: What the Next Wave of AI Cyberattacks Will Look Like β And How to Survive β thehackernews.com β 13.08.2025 12:30
Information Snippets
-
AI-driven cyberattacks are evolving rapidly, exploiting new vulnerabilities in identity systems.
First reported: 13.08.2025 12:30π° 1 source, 1 articleShow sources
- Webinar: What the Next Wave of AI Cyberattacks Will Look Like β And How to Survive β thehackernews.com β 13.08.2025 12:30
-
Attackers use deepfakes to impersonate trusted individuals, bypassing traditional security measures.
First reported: 13.08.2025 12:30π° 1 source, 1 articleShow sources
- Webinar: What the Next Wave of AI Cyberattacks Will Look Like β And How to Survive β thehackernews.com β 13.08.2025 12:30
-
Synthetic identities are created to infiltrate systems undetected.
First reported: 13.08.2025 12:30π° 1 source, 1 articleShow sources
- Webinar: What the Next Wave of AI Cyberattacks Will Look Like β And How to Survive β thehackernews.com β 13.08.2025 12:30
-
AI-powered autonomous agents can exploit APIs, posing a significant threat to system security.
First reported: 13.08.2025 12:30π° 1 source, 1 articleShow sources
- Webinar: What the Next Wave of AI Cyberattacks Will Look Like β And How to Survive β thehackernews.com β 13.08.2025 12:30
-
Identity verification has become crucial in defending against AI-driven cyberattacks.
First reported: 13.08.2025 12:30π° 1 source, 1 articleShow sources
- Webinar: What the Next Wave of AI Cyberattacks Will Look Like β And How to Survive β thehackernews.com β 13.08.2025 12:30
-
Legacy security models are inadequate for defending against AI-driven threats.
First reported: 13.08.2025 12:30π° 1 source, 1 articleShow sources
- Webinar: What the Next Wave of AI Cyberattacks Will Look Like β And How to Survive β thehackernews.com β 13.08.2025 12:30
Similar Happenings
Increased browser targeting by threat actors
Threat actors are increasingly targeting web browsers as a primary attack vector. This shift is driven by the browser's central role in accessing sensitive data and cloud applications, making it an attractive target for credential theft and session hijacking. High-profile incidents, such as the Snowflake breach, underscore the need for enhanced browser security measures. The browser's role in accessing sensitive data and cloud applications makes it a prime target for attackers. The Snowflake breach, which exploited stolen credentials, highlights the risks associated with browser-based attacks. Experts emphasize the need for stronger browser security to mitigate these threats. Browser-based attacks include phishing for credentials and sessions, malicious copy & paste (ClickFix), malicious OAuth integrations, malicious browser extensions, malicious file delivery, and exploiting stolen credentials and MFA gaps. These attacks exploit the browser's role in accessing business applications and data, making it crucial for security teams to focus on browser security.
Malicious nx Packages Exfiltrate 2,349 GitHub, Cloud, and AI Credentials
A supply chain attack on the nx build system allowed attackers to publish malicious versions of the popular npm package and auxiliary plugins. These versions contained data-gathering capabilities that exfiltrated 2,349 credentials from GitHub, cloud, and AI services. The attack occurred on August 26, 2025, affecting multiple versions of the nx package and related plugins. The compromised packages were removed from the npm registry, and users were advised to rotate credentials and check for malicious modifications in their systems. The malicious packages scanned file systems, collected credentials, and posted them to GitHub repositories under the users' accounts. The attack exploited a vulnerable workflow introduced on August 21, 2025, which allowed for arbitrary command execution and elevated permissions. The attack took approximately four hours from start to finish, resulting in the exfiltration of around 20,000 sensitive files. The attackers used AI-powered CLI tools to dynamically scan for high-value secrets and modified shell startup files to crash the system upon terminal session opening. A second attack wave was identified on August 28, 2025, affecting over 190 users/organizations and over 3000 repositories. The second wave involved making private repositories public and creating forks to preserve data. The attack unfolded in three distinct phases affecting 2,180 accounts and 7,200 repositories. The first phase impacted 1,700 users and leaked over 2,000 unique secrets. The second phase compromised 480 accounts and exposed 6,700 private repositories. The third phase targeted a single organization, publishing an additional 500 private repositories.
AI-Powered Cyberattacks Targeting Critical Sectors Disrupted
Anthropic disrupted a sophisticated AI-powered cyberattack campaign in July 2025. The operation, codenamed GTG-2002, targeted 17 organizations across healthcare, emergency services, government, and religious institutions. The attacker used Anthropic's AI-powered chatbot Claude to automate theft and extortion, threatening to expose stolen data publicly to extort ransoms ranging from $75,000 to $500,000 in Bitcoin. The attacker employed Claude Code on Kali Linux to automate various phases of the attack cycle, including reconnaissance, credential harvesting, and network penetration. The AI tool was also used to craft bespoke versions of the Chisel tunneling utility, disguise malicious executables, and organize stolen data for monetization. The attacker used Claude Code to create scanning frameworks using a variety of APIs, provide preferred operational TTPs, and perform real-time assistance with network penetrations. The AI tool was also used to create obfuscated versions of the Chisel tunneling tool, develop new TCP proxy code, analyze exfiltrated financial data to determine ransom amounts, and generate visually alarming HTML ransom notes. The attacker used AI to make tactical and strategic decisions, adapt to defensive measures in real-time, and create customized ransom notes and extortion strategies. The attacker's activities led Anthropic to develop a tailored classifier and new detection method to prevent future abuse. The operation represents a shift to 'vibe hacking,' where threat actors use LLMs and agentic AI to perform attacks.
Chinese State-Sponsored Actors Targeting Global Critical Infrastructure
Chinese state-sponsored Advanced Persistent Threat (APT) actors, specifically the Salt Typhoon group, are conducting a sustained campaign to gain long-term access to critical infrastructure networks worldwide. These actors exploit vulnerabilities in routers and other edge network devices used by telecommunications providers, ISPs, and other infrastructure operators. The campaign targets telecommunications, transportation, lodging, government, and military networks. The actors employ tactics to evade detection and maintain persistent access, posing a significant threat to national and economic security. The advisory provides actionable guidance to help organizations strengthen their defenses and protect critical systems. The campaign has targeted at least 600 organizations across 80 countries, including 200 in the U.S. The advisory details how state-backed threat actors, including Salt Typhoon, penetrate networks around the world and how defenders can protect their own environments. The advisory tracks this cluster of activity to multiple advanced persistent threats (APTs), though it partially overlaps with Salt Typhoon. The advisory notes that the actors have had considerable success exploiting publicly known vulnerabilities, including Ivanti Connect Secure, Ivanti Policy Secure, Palo Alto Networks PAN-OS, and Cisco IOS XE vulnerabilities. The advisory suspects that the APT actors may target other devices, including Fortinet firewalls, Juniper firewalls, Microsoft Exchange, Nokia routers and switches, Sierra Wireless devices, and Sonicwall firewalls. The actors use multiple tactics to maintain persistence, including modifying Access Control Lists (ACLs), opening standard and non-standard ports, enabling SSH servers, and creating tunnels over protocols. The actors target protocols and infrastructure involved in authentication, such as Terminal Access Controller Access Control System Plus (TACACS+), to facilitate lateral movement across network devices. The advisory provides extensive recommendations for mitigating these threats, including monitoring network device configuration changes, auditing network services and tunnels, and checking logs for integrity. The advisory highlights a critical shift from Chinese state-sponsored activity from being purely espionage to gaining long-term access for potential disruption. 45 previously unreported domains associated with Salt Typhoon and UNC4841 have been discovered, dating back to May 2020. The oldest domain identified is onlineeylity[.]com, registered on May 19, 2020. The domains were registered using Proton Mail email addresses and fake personas. The domains point to high-density and low-density IP addresses, with the earliest activity traced back to October 2021. The domains are linked to Chinese cyber espionage campaigns, with potential overlaps between Salt Typhoon and UNC4841.
CISA and partners respond to cyber attack on Nevada state services
On August 24, 2025, a ransomware attack targeted the state of Nevada, impacting essential services and leading to data theft. The Cybersecurity and Infrastructure Security Agency (CISA) and its partners are providing real-time incident response to assist in restoring critical services and rebuilding systems. The attack's origins are under investigation. CISA's Threat Hunting teams are actively examining state networks to identify the full scope of the situation and mitigate threats. The Federal Bureau of Investigation (FBI) is assisting in the investigation, and the Federal Emergency Management Agency (FEMA) is advising on emergency response grants and other available assistance. The attack on Nevada is part of a broader trend of ransomware attacks on local governments, exacerbated by federal budget and staffing cuts.