{"id":7875,"date":"2026-04-21T09:01:00","date_gmt":"2026-04-21T09:01:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=7875"},"modified":"2026-04-21T09:01:00","modified_gmt":"2026-04-21T09:01:00","slug":"top-techniques-attackers-use-to-infiltrate-your-systems-today","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=7875","title":{"rendered":"Top techniques attackers use to infiltrate your systems today"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Much of the talk around cybersecurity these days revolves around AI and the threat it poses to corporate systems when used by nefarious actors.<\/p>\n<p>But the reality on the ground remains a little more mundane than <a href=\"https:\/\/www.csoonline.com\/article\/4101491\/polymorphic-ai-malware-exists-but-its-not-what-you-think.html\">polymorphic AI malware<\/a> and criminal masterminds putting machine learning and generative AI to work at scale.<\/p>\n<p>Still, keeping on top of even minor nuances and emerging trends in the techniques cyberattackers are deploying of late can greatly help cyber defenders in their task.<\/p>\n<p>Of note is the fact that attackers are increasingly exploiting identity as a preferred method for infiltrating systems.<\/p>\n<p>While exploiting vulnerabilities also remains an important vector with its own emerging subtleties in practice, phishing, stolen credentials, and social engineering are among the more common root causes of initial attack today, according to threat response experts.<\/p>\n<p>\u201cIdentity-related attack techniques such as phishing (41%), stolen credentials (18%), and social engineering (12%) dominating our incident response engagements,\u201d Alexandra Rose, director at the Counter Threat Unit at Sophos, tells CSO.<\/p>\n<p>Rose adds: \u201cAttackers are increasingly looking to leverage weaknesses that can\u2019t be targeted by patching \u2014 instead going after the human link in the chain: people.\u201d<\/p>\n<p>Entry points created by expanding hybrid and cloud environments, integrations with AI tooling, and new SaaS apps are also particularly attractive to threat actors, allowing them to infiltrate systems without needing to deploy traditional malware.<\/p>\n<p>\u201cAttackers [are exploiting] trusted tools, identities, and user behaviour rather than relying on technical sophistication\u201d to mount attacks, according to threat intel vendor <a href=\"https:\/\/reliaquest.com\/blog\/threat-spotlight-whats-trending-top-cyber-attacker-techniques-december-2025-february-2026\">ReliaQuest\u2019s latest Annual Cyber-Threat Report<\/a><strong>.<\/strong><\/p>\n<p>Here, cyber experts quizzed by CSO identify the most prevalent cyberattack techniques being deployed against enterprises today.<\/p>\n<h2 class=\"wp-block-heading\">Drive-by RMM misuse<\/h2>\n<p>Attackers have increasingly been <a href=\"https:\/\/www.csoonline.com\/article\/3487743\/attackers-increasingly-using-legitimate-remote-management-tools-to-hack-enterprises.html\">abusing legitimate remote monitoring and management (RMM) tools<\/a> to camouflage attacks on corporate networks. Designed to help IT teams manage systems remotely, popular RMM tools, such as ConnectWise ScreenConnect, Tactical RMM, and MeshAgent, are often abused by attackers for command-and-control, lateral movement, and ransomware deployment.<\/p>\n<p>Now, trojanized versions of RMM tools are being dropped directly onto hosts, often through drive-by compromise, according to ReliaQuest. ConnectWise ScreenConnect led RMM-related incidents between December 2025 up until the end of February 2026, according to the threat intel vendor.<\/p>\n<p>A separate <a href=\"https:\/\/blackpointcyber.com\/whitepaper\/2026-annual-threat-report\/\">study by managed detection and response firm Blackpoint<\/a> found that abuse of legitimate RMM tools represented 30% of incidents handled by the firm.<\/p>\n<h2 class=\"wp-block-heading\">Network security device hacking<\/h2>\n<p>Network edge devices have increasingly drawn attackers\u2019 attention over the past two years, establishing a new battleground where the very devices meant to protect the network <a href=\"https:\/\/www.csoonline.com\/article\/4074945\/network-security-devices-endanger-orgs-with-90s-era-flaws.html\">have become attractive targets for exploitation<\/a>.<\/p>\n<p>As a result, flaws in security device, such as SSL VPN systems and other gateways, are among the <a href=\"https:\/\/www.csoonline.com\/article\/3970097\/the-state-of-intrusions-stolen-credentials-and-perimeter-exploits-on-the-rise-as-phishing-wanes.html\">top initial access vectors for attackers<\/a>.<\/p>\n<p>SSL VPN compromises, for example, accounted for 33% of identifiable activity, according to Blackpoint.<\/p>\n<h2 class=\"wp-block-heading\">ClickFix<\/h2>\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3610611\/rising-clickfix-malware-distribution-trick-puts-powershell-it-policies-on-notice.html\">ClickFix<\/a> is a social engineering tactic that aims to trick prospective marks into pasting and executing malicious PowerShell commands from fake \u201cfix\u201d prompts.<\/p>\n<p>Because these bogus prompts come from either compromised websites or manipulated search results, the approach bypasses traditional security controls such as email filters or denylists.<\/p>\n<p>ClickFix scams often uses fake CAPTCHA pages as the lure.<\/p>\n<p>The methodology is most frequently used to distribute remote access trojans or infostealers, but attackers have also begun to feature ClickFix in ransomware attacks.<\/p>\n<p>\u201cClickFix adoption continues to expand across the attacker spectrum, with ransomware operators like <a href=\"https:\/\/reliaquest.com\/blog\/threat-spotlight-casting-a-wider-net-clickfix-deno-and-leaknets-scaling-threat\/\" target=\"_blank\" rel=\"noopener\">LeakNet now using ClickFix lures to run campaigns<\/a> directly rather than purchasing access from initial access brokers,\u201d according to ReliaQuest.<\/p>\n<h2 class=\"wp-block-heading\">Identity-based attacks<\/h2>\n<p>Attackers are increasingly impersonating legitimate users, machines, or services to gain access to systems, data, or infrastructure. The technique is on the upswing in part due to improved security defenses, according to some experts, and also demonstrates attackers\u2019 interest in targeting authentication mechanisms rather than exploiting software vulnerabilities directly.<\/p>\n<p>\u201cEndpoint detection and response technologies have pushed criminals into stealing credentials \u2014 or buying them from thieves \u2014 and then using them for authentication as account users,\u201d says Tom Exelby, head of cybersecurity at UK-based cybersecurity services firm Red Helix. \u201cOnce they have access, they can augment their privileges through systems such as Microsoft Active Directory and Entra ID.\u201d<\/p>\n<p>Instead of stealing passwords, attackers steal active authentication tokens to bypass multi-factor authentication (MFA) protections.<\/p>\n<p>Attackers are increasingly using OAuth consent phishing and reverse proxy kits to steal session tokens and bypass MFA, adds cloud-native security firm Netskope.<\/p>\n<p>\u201cAttackers targeting Microsoft 365 environments are also adopting adversary-in-the-middle attacks,\u201d Red Helix\u2019s Exelby adds. \u201cThey capture credentials, MFA responses, and session cookies by using phishing kits as a proxy between the target and the legitimate authentication service.\u201d<\/p>\n<p>Cybercriminals are using platforms such as the Tycoon 2FA phishing-as-a-service to run adversary-in-the-middle (AiTM) attacks. Many of the victims of this attack vector are \u201clikely to be SMBs with limited cybersecurity resources,\u201d according to Red Helix.<\/p>\n<h2 class=\"wp-block-heading\">Phishing<\/h2>\n<p><a><\/a>Despite a <a href=\"https:\/\/www.csoonline.com\/article\/4080691\/profits-from-ransomware-attacks-are-falling-fewer-people-are-paying.html\">year-over-year decline<\/a> in the number of people clicking on phishing links, in part due to <a href=\"https:\/\/www.csoonline.com\/article\/4071289\/what-to-consider-to-make-your-enterprise-phishing-training-effective.html\">improved user education<\/a>, this traditional form of social engineer <a href=\"https:\/\/www.csoonline.com\/article\/3850783\/11-ways-cybercriminals-are-making-phishing-more-potent-than-ever.html\">remains a problem<\/a>.<\/p>\n<p>According to a recent study by Netskope, <a><\/a>87 out of every 10,000 users click on a phishing link each month. Microsoft remains <a href=\"https:\/\/www.csoonline.com\/article\/2135867\/microsoft-the-brand-attackers-love-to-imitate.html\">the brand attackers impersonate most<\/a>.<\/p>\n<p>Remote and hybrid workforces have given attackers more opportunities for phishing and credential theft, and now the power of AI in facilitating such attacks is becoming a major concern. Cybercriminals have been putting AI to use to develop highly personalized phishing lures, automated reconnaissance, and synthetic voice and <a href=\"https:\/\/www.csoonline.com\/article\/3982379\/deepfake-attacks-are-inevitable-cisos-cant-prepare-soon-enough.html\">deepfake attacks<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">Hacking machine identities<\/h2>\n<p>The rapid profileration of machine identities is proving to be a <a href=\"https:\/\/www.csoonline.com\/article\/3476130\/nhis-may-be-your-biggest-and-most-neglected-security-hole.html\">wellspring for attackers<\/a> seeking inroads into corporate systems. Much of this is due to increased use of service accounts, containers, APIs, and the automation of DevOps, but agentic AI, with its promise of autonomous AI activity, is another <a href=\"https:\/\/www.csoonline.com\/article\/4109999\/agentic-ai-already-hinting-at-cybersecuritys-pending-identity-crisis.html\">rising source of concern for security organizations<\/a>.<\/p>\n<p>\u201cWith non-human identities central to infrastructure, attackers are inevitably focusing on compromise of service accounts and <a href=\"https:\/\/www.csoonline.com\/article\/4148315\/apis-are-the-new-perimeter-heres-how-cisos-are-securing-them.html\">API identities<\/a>, which give them long-lived credentials and a broad range of permissions,\u201d says Red Helix\u2019s Exelby.<\/p>\n<p>Exelby adds: \u201cMachine identities often have weak protection, are notoriously invisible, and poorly managed.\u201d<\/p>\n<p>Managed service providers that hold privileged access to many client\u2019s systems have a magnetic attraction for attackers as a potential route to carry out supply chain attacks. Even a midsize business is likely to have hundreds of SaaS apps and thousands of identities criminals can exploit.<\/p>\n<h2 class=\"wp-block-heading\">Shai-Hulud: The supply-chain attack evolves<\/h2>\n<p>In September 2025, credential-stealing code <a href=\"https:\/\/www.csoonline.com\/article\/4058059\/warning-hackers-have-inserted-credential-stealing-code-into-some-npm-libraries.html\">wormed its way through scores of npm libraries<\/a>, adding a <a href=\"https:\/\/www.csoonline.com\/article\/4081492\/modern-supply-chain-attacks-and-their-real-world-impact.html\">modern twist to the supply chain attack<\/a>. What would become known as Shai-Hulud included self-propagation logic that would eventually spread to hundreds of packages by automatically replicating and injecting itself into projects owned by compromised maintainers.<\/p>\n<p>Later versions of the npm supply-chain worm (\u201c<a href=\"https:\/\/www.csoonline.com\/article\/4095578\/new-shai-hulud-worm-spreading-through-npm-github.html\">Shai-Hulud<\/a> 2.0\u201d) have expanded into cloud credential theft, making it the most significant new entry in ReliaQuest\u2019s attack technique list since the previous edition last year.<\/p>\n<p>\u201cThe self-replicating nature [of the malware] makes containment particularly difficult once it enters a development pipeline,\u201d ReliaQuest warns.<\/p>\n<h2 class=\"wp-block-heading\">Countermeasures<\/h2>\n<p>Defenders should prioritize ClickFix-specific user training, enforce remote monitoring and management (RMM) tool allowlists, and centralize SaaS audit logging, ReliaQuest advises.<\/p>\n<p>Protection against the tide of identity-based attacks requires a shift to layered defenses.<\/p>\n<p>\u201cLayered defences should include phishing-resistant authentication with hardware security keys, FIDO2 password-free approaches or certificate-based methods to reduce credential theft and adversary-in-the-middle attacks,\u201d says Red Helix\u2019s Exelby.<\/p>\n<p>Exelby adds: \u201cZero trust and least privilege access principles are essential, validating continuously using device posture, user behaviour and network context, along with risk-scoring. Time-bound access for accounts should be part of this.\u201d<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Much of the talk around cybersecurity these days revolves around AI and the threat it poses to corporate systems when used by nefarious actors. But the reality on the ground remains a little more mundane than polymorphic AI malware and criminal masterminds putting machine learning and generative AI to work at scale. Still, keeping on [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":7876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-7875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7875"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7875"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/7876"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}