{"id":43987,"date":"2026-02-27T00:17:28","date_gmt":"2026-02-26T16:17:28","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/27\/darktrace-flags-32-million-phishing-emails-in-2025-as-identity-attacks-infosecurity-magazine\/"},"modified":"2026-02-27T00:17:28","modified_gmt":"2026-02-26T16:17:28","slug":"darktrace-flags-32-million-phishing-emails-in-2025-as-identity-attacks-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/27\/darktrace-flags-32-million-phishing-emails-in-2025-as-identity-attacks-infosecurity-magazine\/","title":{"rendered":"Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>More than 32 million high-confidence phishing emails were detected by&nbsp;Darktrace&nbsp;in 2025, showcasing a substantial escalation in identity-driven cyber threats.<\/p>\n<p>The data was&nbsp;collected by Darktrace from incidents across its global customer base and points to a year defined by automation, convergence and accelerating attacker speed.<\/p>\n<p>Over 8.2 million phishing emails targeted VIPs, accounting for more than 25% of all observed phishing attempts.<\/p>\n<p>Meanwhile, 1.6 million phishing emails originated from newly created domains and 1.2 million incorporated<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/hackers-qr-codes-new-quishing\/\" style=\"text-decoration:none;\" target=\"_blank\"> malicious QR codes.<\/a><\/p>\n<p>Notably, 70% of phishing emails successfully passed DMARC authentication, 41% were classified as spear-phishing and 38% contained novel social engineering techniques. One-third exceeded 1000 characters.<\/p>\n<h2><strong>Identity Compromise Dominant Entry Vector&nbsp;<\/strong><\/h2>\n<p>The Darktrace report also showed how identity compromise has overtaken vulnerability exploitation as the dominant entry vector. Common Vulnerabilities and Exposures (CVE) increased by approximately 20% year-on-year (YoY), with exploitation often occurring before public disclosure.<\/p>\n<p>&quot;Identity has become the attacker&#39;s skeleton key. Instead of forcing their way through a firewall, adversaries are logging in with stolen credentials, hijacked tokens and abused permissions, then moving laterally under the cover of legitimacy,&quot; commented Shane Barney, CISO at Keeper Security.<\/p>\n<p>&quot;When identity controls are fragmented or overly permissive, attackers don&#39;t need novel exploits. They just need access that looks routine.&quot;<\/p>\n<p><em><a href=\"https:\/\/www.infosecurity-magazine.com\/blogs\/have-your-users-credentials-been\/\" style=\"text-decoration:none;\" target=\"_blank\">Read more on credential theft: Have Your Users&#39; Credentials Been Leaked on The Dark Web?<\/a><\/em><\/p>\n<p>Across the Americas, SaaS and Microsoft 365 account takeovers accounted for nearly 70% of incidents. Manufacturing represented 17% of recorded cases and 29% of ransomware incidents in the region. About 47% of all global security events tracked by Darktrace in 2025 originated in the Americas alone.<\/p>\n<p> <img decoding=\"async\" src=\"https:\/\/assets.infosecurity-magazine.com\/content\/span\/336fc7b4-507d-49d3-be2f-2fe7cc02f6cd.png\" alt=\"Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks - Infosecurity Magazine\" \/><figcaption>Top 5 Ransomware by Month (2025). Credit: Darktrace.<\/figcaption><h2><strong>Regional and Sector Trends Reveal Expanding Attack Surface<\/strong><\/h2>\n<p>The Darktrace report also highlighted how regional patterns reflect differing levels of digital maturity and geopolitical pressure.<\/p>\n<p>In Latin America, 44% of cases involved malware spreading after credential theft or phishing. Education was the most impacted sector at 18%, with Brazil, Mexico and Colombia reporting the highest volumes over the past three years.<\/p>\n<p>Europe recorded 58% of incidents linked to cloud and email compromise, compared with 42% involving network-based attacks.<\/p>\n<p>Meanwhile, Africa experienced a 60% YoY rise in ransomware and saw 76% of compromises classified as network-based.<\/p>\n<p>In Asia-Pacific and Japan, 84% of organizations said AI-powered threats are already impacting them, yet only 42% reported having formal policies governing safe AI use.<\/p>\n<p>&quot;Identity is no longer about perimeter-based defense. The rise in AI-based agents and the massively accelerating threat landscape has rendered that approach inadequate, and prompted a shift towards identity as the critical element to enterprise security,&quot; SailPoint CEO, Mark McClain, said.<\/p>\n<p>&quot;This report&#39;s findings demonstrate that there is now a need for real-time, intelligent, and dynamic identity security, built to govern and secure not just &#39;who,&#39; or in the case of AI agents, &#39;what,&#39; has access to the enterprise, but what data they can access and what they are able to do once inside.&quot;&nbsp;<\/p>\n<p>Additional findings, regional breakdowns and sector-specific analysis from the report are available on<a href=\"https:\/\/www.darktrace.com\/blog\/what-the-darktrace-annual-threat-report-2026-means-for-security-leaders\" style=\"text-decoration:none;\" target=\"_blank\"> Darktrace&#39;s website.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than 32 million high-confidence phishing emails we [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43987","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43987"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43987\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}