Red Canary's 2025 Threat Detection Report highlights top and emerging cybersecurity threats, including fakeCAPTCHA, LLMJacking, and macOS malware
Adversaries have access to more tools than ever to compromise organizations, fueling a rise in attacks and straining security teams
None of the nearly 93,000 threats analyzed in this report were prevented by customers' expansive security controls, including all leading endpoint protection (EPP) and IAM platforms
DENVER, March 18, 2025 /PRNewswire/ -- Red Canary, a leader in managed detection and response (MDR), today unveiled its seventh annual Threat Detection Report, examining the trends, cyber threats, and adversary techniques that organizations should prioritize in the coming months and years. The report tracks the MITRE ATT&CK® techniques that adversaries abuse most frequently, and this year noted four times as many identity attacks compared to the 2024 edition. After debuting in the top 10 in 2024, cloud-native and identity-enabled techniques surged in this year's report, with Cloud Accounts, Email Forwarding Rule, and Email Hiding Rules ranking among the top five.
"2024 marked the rise of cloud-native and identity-enabled attacks, with three of the top five techniques we detected falling into these categories. This highlights the immense value adversaries place on identities – compromise one, and they gain access to countless systems," said Keith McCammon, co-founder and Chief Security Officer at Red Canary. "Unfortunately, the rise of identity and access management (IAM) and identity providers hasn't deterred adversaries. Instead, it has made centralized identities even more lucrative targets as once compromised, adversaries can gain access to numerous disparate systems. Organizations must recognize identities as a frontline for defense and strengthen their security posture to stay ahead of adversaries."
Research highlights major shifts in the threat landscape
The data that powers Red Canary and this report are not mere software signals—this data set is the result of hundreds of thousands of investigations across millions of protected systems and identities. Each of the threats Red Canary detected in 2024 were not prevented by the customers' expansive security controls. They are the result of a breadth and depth that Red Canary leverages to detect the threats that would otherwise go undetected.
Red Canary's 2025 report provides in-depth analysis of nearly 93,000 threats detected within more than 308 petabytes of security telemetry from customers' endpoints, networks, cloud infrastructure, identities, and SaaS applications over the past year. The total number of threats detected increased by more than a third compared to 2024's report as a result of not only more customers, but also Red Canary's expanded visibility into cloud and identity infrastructure.
The analysis shows that while the threat landscape continues to shift and evolve, adversaries' motivations do not. The tools and techniques they deploy remain consistent, with some notable exceptions. Key findings include:
The rise of LLMJacking to attack cloud infrastructure
While cloud attacks rose overall in 2024, the techniques adversaries abused have largely remained the same as in past years. However, adversaries have shifted more of their efforts to attacking and compromising cloud infrastructure and platforms:
Info-stealing malware is the ultimate identity threat
In 2024, stealer malware infections were on the rise across Windows and macOS platforms. Adversaries use stealers to gather identity information and other data at scale. In 2024 there were some interesting variations in the use of infostealers, including:
Mac malware ran rampant
In 2024, macOS experienced the same phenomenon that Windows did: an exponential increase in stealer malware.
"This year's report makes clear that the malware-as-a-service ecosystem has fully matured and is operating at a similar level to the legitimate software industry," continued McCammon. "The sheer accessibility of the tools that adversaries can use to compromise organizations has led to an explosion in attack volume, overwhelming security teams. AI is becoming an essential tool for helping analysts cut through the noise and focus on threats that matter. By streamlining workflows and augmenting human expertise, AI enables security teams to detect and respond to threats faster, preventing adversaries from gaining an advantage."
Recommended actions:
Learn more
About the Threat Detection Report
The full report is intended as a reference library for security practitioners to improve their ability to prevent, mitigate, detect, and emulate cyber threats. It offers detailed guidance on data sources that log relevant evidence of adversary behaviors, tools that collect from those data sources, insight into how security teams can use this visibility to develop detection coverage, and much more deeply actionable information.
The Threat Detection Report sets itself apart from other annual reports by offering unique data and insights, accompanied by recommended actions derived from a combination of expansive visibility and expert, human-led investigation and confirmation of threats.
Each of the nearly 93,000 threats Red Canary detected in 2024 were not prevented by the customers' expansive security controls. They are the result of a breadth and depth that Red Canary leverages to detect the threats that would otherwise go undetected.
About Red Canary
Red Canary is a leader in managed detection and response (MDR). We serve companies of every size and industry, focusing on finding and stopping threats before they can have a negative impact. As the cornerstone security operations partner for nearly 1,000 organizations, we provide MDR with industry-leading threat accuracy and a world-class customer experience across identities, endpoints, and cloud. For more information about Red Canary, visit: https://redcanary.com/.
View original content to download multimedia:https://www.prnewswire.com/news-releases/threat-researchers-detect-4x-more-identity-enabled-attacks-as-infostealers-continue-to-surge-302404711.html
SOURCE Red Canary