Cybersecurity Threats on the Rise: A Growing Concern for Users
Malware Analysis Reveals Alarming Trends
In a recent analysis of over a million pieces of malware collected in 2024, researchers have found that 25% of them target user credentials. This is a significant increase from 2023, with three times the number of malicious attacks. As a result, stealing credentials from password stores has become one of the top 10 techniques listed in the MITRE ATT&CK framework, accounting for 93% of all malicious cyber activity in 2024.
The Evolution of Malware: A New Generation of Threats
According to "The Red Report 2025" conducted by Picus Security, researchers have observed that attackers are prioritizing complex, prolonged, multi-stage attacks that require a new generation of malware to succeed. This new type of malware, dubbed "SneakThief," focuses on increased stealth, persistence, and automation. The researchers believe that threat actors are looking to revolutionize info-stealing malware, making it more difficult for users to detect and prevent.
The Perfect Heist: A New Era of Malware
The researchers add that threat actors likely have their sights set on these malware attributes in order to pull off "the perfect heist." With the ability to complete over a dozen malicious actions, malware samples can now evade defenses, exfiltrate data, and more. The researchers also report that they found no evidence that cybercriminals are using AI-driven malware, and that malware samples on average can complete 14 malicious actions.
The Rise of Stealthy Malware
The researchers found that exfiltration and stealth tactics made up 11.3 million cybercrime acts seen in 2024. This highlights the growing concern of stealthy malware, which can remain undetected for extended periods. According to Volkan Ertürk, CTO and co-founder of Picus, "Focusing on Top 10 MITRE ATT&CK techniques is the most viable way to stop the kill chain of sophisticated malware strains as early as possible." He also notes that enterprise security teams can stop 90% of malware by focusing on just 10 of MITRE’s entire library of techniques.
Conclusion
The rise of sophisticated malware strains, such as "SneakThief," poses a significant threat to users and organizations alike. By understanding the evolving nature of malware and the tactics used by threat actors, users can take steps to protect themselves and their organizations from these emerging threats.
Source Link