Cyberwise Solutions · Internal Review · 2026-04-10

CrowdStrike 2026 Global Threat Report

Team Review — Stacy · Ian · Riley · Morgan
89%
↑ AI-enabled attacks YoY
29 min
Avg. eCrime breakout time
82%
Detections malware-free
42%
↑ Zero-days pre-disclosure
37%
↑ Cloud-conscious intrusions
266%
↑ State-nexus cloud attacks
Stacy · Research & Analysis · Threat Intelligence Summary
Executive Summary
CrowdStrike names 2025 "The Year of the Evasive Adversary." The defining story is speed plus legitimacy: 29-minute average breakout, 82% of attacks with zero malware — adversaries using valid credentials and trusted tools inside the perimeter invisibly. For Cyberwise clients, the most immediately relevant threats are AI-enhanced social engineering, COZY BEAR's direct NGO targeting, MURKY PANDA's MSP supply chain pivot, and vishing as the dominant initial access vector.

The Six Major Themes

🤖 AI-Enhanced Attacks
  • 89% increase in AI-enabled attacks YoY
  • FAMOUS CHOLLIMA doubled activity using ChatGPT, Gemini, Copilot for fake employment operations
  • PUNK SPIDER (198 intrusions, +134%) uses Gemini scripts for credential dumping
  • FANCY BEAR deployed LAMEHUG — first LLM embedded in malware (Hugging Face / Qwen2.5-Coder)
  • Attackers weaponized victims' own Claude/Gemini CLI tools via malicious npm packages
  • 563% increase in fake CAPTCHA lures
  • Malicious MCP server (postmark-mcp) published to steal emails
  • Prompt injection used against AI-based email triage
💀 Ransomware — Cross-Domain
  • SCATTERED SPIDER: vishing → SSO → VMware ESXi; NTDS dump in 3 hours via unmanaged VM
  • PUNK SPIDER: remote SMB encryption; used unpatched webcam to execute Akira ransomware
  • BLOCKADE SPIDER: read victims' cyber insurance policies via compromised SSO to calibrate ransom
  • All three deploy ransomware only on unmanaged hosts to evade EDR
  • Cross-domain gap (endpoint → cloud → SaaS → virtualization) is the attack path
🐼 China-Nexus
  • 38% overall increase; cloud attacks by state-nexus actors up 266%
  • CVE-2025-31324 weaponized in 3 days; CVE-2025-55182 in 2 days
  • WARP PANDA maintained persistent access for 22 months
  • MURKY PANDA targets MSPs via Entra ID partner connections → downstream nonprofit clients
  • Edge devices in 40% of China-nexus exploitations
  • Targeting aligned with China's 14th Five-Year Plan: telecom +30%, logistics +85%
🔗 Supply Chain
  • PRESSURE CHOLLIMA stole $1.46B from Bybit via Safe{Wallet} supply chain — largest crypto theft in history
  • FAMOUS CHOLLIMA: 30+ malicious npm packages; 8,000+ downloads
  • ShaiHulud self-propagating stealer hit 690 npm packages; 2M+ downloads
  • Salesloft intrusion: OAuth token theft affecting Drift integrations
  • Notepad++ update weaponized for targeted RAT delivery
🎯 Zero-Day Exploitation
  • 42% increase in zero-days exploited before public disclosure
  • VICE SPIDER (targets academic, healthcare, local govt) used its first-ever zero-day: CVE-2025-32706 (Windows CLFS LPE)
  • GRACEFUL SPIDER: consistent zero-day use against internet-facing enterprise apps
  • FANCY BEAR exploiting Zimbra/Roundcube XSS (relevant for self-hosted email)
  • CVE-2025-59287: Windows WSUS RCE exploited in the wild
☁️ Cloud & Identity
  • COZY BEAR targeted U.S.-based NGOs: multi-day social engineering → OAuth device code phishing to real Microsoft login pages
  • AiTM kits steal Microsoft 365 session tokens — bypasses MFA entirely
  • Valid account abuse = 35% of cloud incidents
  • BLOCKADE SPIDER + SCATTERED SPIDER both abused Entra Connect Sync and AD FS
  • CRM instances emerging as primary exfiltration target

What's Genuinely New vs. Already Known

FindingNew / ConfirmationSignificance
LLM embedded in malware (LAMEHUG)NewFirst confirmed instance — signals where adversaries are investing
Victims' own AI CLI tools weaponizedNewAI tools as attack surface, not just attack aid
Malicious MCP server in package registryNewDirect threat to orgs using MCP-based AI workflows
COZY BEAR targeting U.S. NGOs directlyEscalationMission-driven orgs explicitly in crosshairs of nation-state actor
AiTM phishing bypassing MFAEscalationMFA no longer sufficient as sole control
Ransomware deployed only on unmanaged hostsEscalationEDR is being deliberately avoided; visibility gaps are the exploit
82% malware-free detectionsConfirmationTrend continues — AV is not a meaningful control
Vishing as primary initial accessConfirmationHuman-layer remains the weakest point

2026 Outlook

Ian · Developer & Technical Lead · Defensive Playbook for Cyberwise Clients
Framing
These controls are prioritized for mission-driven orgs with limited IT staff and budget, heavy M365 reliance, and little to no dedicated security tooling. Every item maps directly to a 2025 observed attack pattern.

🚀 Quick Wins — Start Here

  1. 1
    Disable legacy authentication in M365 — Free · 1 hour · Blocks a whole class of MFA bypass attacks
  2. 2
    Implement help desk identity verification — Free · Process change · Callback + code word before any password reset or MFA change. SCATTERED SPIDER's primary entry point.
  3. 3
    Audit and revoke unused OAuth app permissions — Free · 2–4 hours · Remove third-party SaaS integrations that aren't actively used. Salesloft/Drift-style breaches pivot through these.
  4. 4
    Enable Unified Audit Log in M365 — Free · 30 min · Required for any post-incident investigation. 29-minute breakout means you need logs retroactively.
  5. 5
    Vishing + fake CAPTCHA awareness training — Low cost · 1 session · 563% increase in fake CAPTCHAs; vishing is #1 initial access vector.
  6. 6
    Conditional Access baseline policies — Requires Entra P1 (~$6/user/mo) · COZY BEAR spent 31 days trying to bypass these — they work when configured.

Identity & Access

Microsoft 365 / Cloud Hardening

Endpoint & Network

Awareness & Process

Riley · Client Engagement · Impact Assessment & Service Opportunities

Immediate Talking Points for Client Calls

Service Opportunity Assessment

Threat PatternMost Affected Client TypeService Opening
AI-enhanced vishing & social engineeringAll clients; especially those with small/shared IT staffSocial engineering tabletop + vishing awareness training
AiTM MFA bypassAny client using M365 TOTP/SMS MFA as primary controlConditional Access audit + FIDO2 migration roadmap
MSP supply chain risk (MURKY PANDA)Clients using shared IT providersMSP vendor security review as add-on service
COZY BEAR NGO targetingAdvocacy orgs, faith-based orgs with international presenceCloud identity hardening; Entra ID configuration review
Unmanaged device / EDR gapClients with BYOD policies, volunteers, remote staffAsset inventory + device management consultation
OAuth token theft / SaaS supply chainAny client using CRM, donor mgmt, marketing automationSaaS integration audit; OAuth permissions review
Help desk social engineeringAny client with IT staff who handle password resetsProcess redesign: verified identity protocols
Fake CAPTCHA + AI phishingAll clients with limited security awareness cultureAnnual security awareness training refresh

Client Risk Tiers

🔴 Tier 1 — Highest Immediate Risk
  • International advocacy or politically sensitive missions (COZY BEAR targeting profile)
  • Using an MSP who serves multiple clients (MURKY PANDA supply chain vector)
  • M365 with no Conditional Access policies configured
  • Legacy authentication still enabled
  • No formal help desk identity verification procedure
🟡 Tier 2 — Elevated Risk
  • Significant donor databases or CRM systems
  • Large volunteer / BYOD footprint
  • Recently expanded SaaS integrations
  • Academic institutions (VICE SPIDER explicitly targets academic sector)
  • Healthcare-adjacent orgs
🟢 Tier 3 — Baseline
  • Strong Conditional Access configured
  • Phishing-resistant MFA deployed
  • Regular security awareness training in place
  • Still: update vishing/fake CAPTCHA training, audit OAuth permissions

Foundations Assessment Updates

Six controls that are under-addressed in most current assessments and directly map to 2025's top attack vectors:

#New ControlSectionWhy It Matters Now
1Help desk identity verification proceduresProcesses#1 initial access vector — most orgs have nothing in place
2OAuth / non-human identity auditSaaS SecuritySalesloft/Drift-style breaches pivot through forgotten OAuth grants
3Unmanaged device inventoryEndpointRansomware now deploys specifically from unmanaged hosts to evade EDR
4Legacy authentication status (disabled?)IdentityFree, high-impact — many orgs still haven't done this
5MFA type (SMS/TOTP vs. FIDO2)IdentityAiTM bypasses TOTP/SMS; FIDO2 is the actual protection
6MSP security postureThird-Party RiskMURKY PANDA pivots to downstream clients via MSP Entra ID connections
7AI tool usage policyGovernanceStaff using AI tools = new attack surface; prompt injection + MCP risks
Morgan · Communications & Content · Mission Critical Newsletter + Content Strategy

Newsletter Story Candidates

Story 1 — Lead Candidate
"The Phone Call That Took Down a Company in Under an Hour"
Hook for Our Audience
No malware. No suspicious link. An attacker called the help desk, impersonated a staff member, asked for a password reset — and had full access within minutes. This is the #1 way sophisticated attackers are getting into organizations like ours right now.
Core Takeaway
Vishing is the dominant initial access vector in 2025. The counter isn't technical — it's one process change: verify identity before acting on any IT request. Walk readers through what the call sounds like and what the procedure looks like.
Story 2
"Your MFA Isn't Enough Anymore — Here's What Actually Is"
Hook for Our Audience
Most nonprofit leaders think MFA is the gold standard of account protection. It was — until attackers figured out how to bypass it without ever touching your password. The good news: the fix is simpler than you think.
Core Takeaway
AiTM phishing steals the live session after MFA succeeds. FIDO2/passkeys are the real solution — not an upgrade, a replacement. Frame as: MFA is still necessary, just not sufficient. Here's the next step.
Story 3
"When Your Antivirus Does Nothing: The Rise of the Invisible Attack"
Hook for Our Audience
82% of cyberattacks in 2025 involved no malware whatsoever. Attackers signed in with valid credentials, used your own tools, and left through the front door. Your antivirus never blinked.
Core Takeaway
The "we have antivirus" posture is no longer defensible. What does protection look like when the attacker looks like a legitimate user? Leads naturally into identity-first security and visibility controls.
Story 4
"The AI Arms Race Has Hit Your Inbox"
Hook for Our Audience
AI-enabled cyberattacks increased 89% in 2025. Attackers are using the same tools your staff uses — to write more convincing phishing emails, generate fake personas, and run more attacks faster than ever before.
Core Takeaway
The threat isn't robots taking over — it's that phishing emails no longer feel off. The "this looks suspicious" instinct your staff relies on is being systematically undermined. Human resilience training needs to catch up.

LinkedIn Post

JR
Jim Rispin
Founder & Chief Cybersecurity Advisor · Cyberwise Solutions
The CrowdStrike 2026 Global Threat Report dropped this week. 80 pages of threat intelligence. Here's what actually matters for mission-driven organizations: Russian intelligence (COZY BEAR) specifically targeted U.S.-based NGOs this year. Not Fortune 500 companies — nonprofits and advocacy organizations. The method: a weeks-long conversation over Slack and email, building trust, then sending a Microsoft login link. A real Microsoft login link. No suspicious URL to catch. This is the threat landscape your organization is operating in right now. At Cyberwise, we work specifically with mission-driven organizations because the stakes of getting this wrong aren't just financial — it's mission continuity, constituent trust, and the ability to do the work that matters. Three things you can do this week: → Disable legacy authentication in Microsoft 365 (free, takes one hour) → Implement a callback verification before any IT help desk request → Talk to your team about what vishing actually sounds like Or reach out — we'll walk through your posture together. #cybersecurity #nonprofitsecurity #missiondriven

Webinar / Workshop Concept

They Called the Help Desk: Social Engineering Tabletop for Nonprofit Teams
Your staff is your most targeted asset — and right now, attackers are specifically calling mission-driven organizations and impersonating their own colleagues to get in. This 90-minute workshop runs two live scenarios based on real 2025 attack patterns, then builds a simple playbook your organization can implement before you leave.
Format
  • 20 min — What vishing and social engineering look like in 2025 (real examples, no jargon)
  • 45 min — Guided tabletop: Scenario 1 (the help desk call) + Scenario 2 (the fake CAPTCHA)
  • 25 min — Debrief + action planning: what procedures does your org leave with?
Designed for 4–12 participants: executive director, IT point person, finance director, key operations staff. Virtual delivery. No technical prerequisites.

Content Warnings — Handle Carefully

FindingRisk If Handled PoorlyFraming That Works
AiTM bypasses MFA Clients who just invested in MFA rollout will feel it was wasted "MFA is still necessary but not sufficient. FIDO2 is the next step forward — not a full redo."
COZY BEAR targeting NGOs Sounds like every nonprofit is a priority target of Russian intelligence "The techniques used against NGOs are now being adopted by lower-tier criminal actors. The tactics matter regardless of who's using them."
82% malware-free attacks "Antivirus is useless" causes panic and erodes confidence in existing tools "Antivirus addresses a shrinking portion of the threat surface. Identity and behavior-based controls matter more now — here's what to add."
27-second breakout time Induces helplessness, not action Use the 29-minute average, not the 27-second outlier. Frame around response readiness, not doom.