AI-Powered Cybercrime Surges 1,500%, Report Finds

Flashpoint report finds agentic AI driving a 1,500% surge in cybercrime activity as attackers automate phishing, credential abuse, and ransomware attacks.

Mar 11, 2026
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Cybercrime is entering a new phase where machines, not humans, increasingly run the attacks.

A new 2026 Global Threat Intelligence Report from Flashpoint suggests that threat actors are rapidly adopting AI-powered automated systems to execute entire cyberattack chains with minimal human input.

Threat actors adopt AI tools as cyberattacks become cheaper to automate

One of the report’s most striking findings is a significant spike in underground conversations about using AI for cybercrime

Flashpoint tracked a 1,500% increase in illicit AI-related discussions between November and December 2025, a signal that attackers are moving from experimenting with AI tools to building fully automated attack frameworks.

These so-called “agentic” systems can conduct reconnaissance, create phishing lures, rotate infrastructure credentials, and automatically test stolen credentials. 

“When iteration becomes cheap through automation, attackers can afford to fail repeatedly until they find a successful foothold,” said Ian Gray, Flashpoint’s VP of cyber threat intelligence operations.

Advertisement

3.3 billion stolen credentials make identity the new cyber battleground

The report also highlights that cybercriminals are increasingly relying on stolen login credentials rather than traditional hacking techniques.

Flashpoint observed more than 11.1 million machines infected with information-stealing malware in 2025, producing a motherlode of 3.3 billion stolen credentials, session cookies, and cloud tokens.

“Attackers do not need to escalate privileges or deploy custom malware to gain access; they simply log in,” the report states, pointing to a fundamental shift in how breaches now occur.

In a concerning development, researchers warn these stolen identity stores are being fed into emerging agentic AI systems that can autonomously test credentials against corporate VPNs, SaaS platforms, and cloud providers simultaneously, all without human intervention.

Advertisement

Exploit timelines shrink as vulnerability disclosures surge

The report also warns that defenders are losing the race against vulnerability exploitation.

In 2025 alone, 44,509 vulnerabilities were disclosed, up 12% year over year, and roughly one-third now have publicly available exploit code, making it easier for attackers to weaponize newly discovered flaws. 

Some zero-day vulnerabilities are now being exploited within as few as 24 hours of discovery, significantly shrinking the window for organizations to patch affected systems.

“This systemic instability makes it a business requirement to move beyond generic feeds,” the report advises, noting that the CVE program’s contract expiration in March 2026 could trigger “catastrophic downstream risks” if public databases stall.

Advertisement

Ransomware groups target human trust instead of software flaws

Ransomware attacks surged 53% in 2025, with ransomware-as-a-service operations responsible for 87% of incidents. 

But the tactics are shifting: rather than hunting for software flaws, groups like Scattered Spider are now targeting “human trust and identity” through social engineering and insider recruitment.

Flashpoint documented more than 91,000 instances of threat actors discussing or advertising malicious insiders in 2025, a cheap workaround for bypassing multi-million-dollar security stacks.

Flashpoint Co-Founder and CEO, Josh Lefkowitz, said the convergence of AI, identity theft, and automated attacks is creating a rapidly evolving threat environment.

“As attackers automate exploitation of identity, vulnerabilities, and ransomware, defenders who rely on fragmented visibility will fall behind,” Lefkowitz said. 

“To keep pace, organizations must ground their decisions in primary-source intelligence that is drawn from adversarial environments, so that decision-makers can get ahead of this accelerating threat cycle.” 

thumbnail
Aminu Abdullahi

Aminu Abdullahi is a contributing writer for Channel Insider and an B2B technology and finance writer with over 6 years of experience. He has written for various other tech publications, including TechRepublic, eSecurity Planet, IT Business Edge, and more.

Recommended for you...

Hack the Box: AI Boosts Productivity, Creates Skills Risk
Aminu Abdullahi
Mar 11, 2026
Security Leaders Warn of Cyber Risks Tied to Iran Conflict
David Curry
Mar 9, 2026
DeepKeep Launches AI Agent Security Scanner
Cato Networks Launches Auto-Adaptive Threat Prevention Engine
Jordan Smith
Mar 3, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.