In a world where hackers no longer operate alone but as part of a highly orchestrated system, threats are evolving rapidly—and so must the organizational response. The IBM X-Force Threat Intelligence Index 2025 reveals emerging trends that challenge fundamental assumptions of information security: identity-based attacks have become standard, AI is weaponized by malicious actors, and the lines between phishing, extortion, and data theft are becoming increasingly blurred. This article presents key findings from the report, analyzes their implications for organizations, and proposes actions that every CISO and CEO should be familiar with—before the next threat strikes.
Summary of IBM X-Force Threat Intelligence Index 2025
Key Trends
Shift in Attack Tactics: A significant change in attacker tactics has been observed over the past 18–24 months, with a move toward larger-scale campaigns showing higher levels of coordination, automation, and skill.
Manufacturing Remains the Top Target: For the fourth consecutive year, the manufacturing industry is the most attacked sector (26% of incidents), followed by finance and insurance (23%), and business and consumer services (18%).
Rise in Asia-Pacific Attacks: The Asia-Pacific region experienced the highest share of incidents (34%), a 13% increase from the previous year.
Identity-Based Attacks: These now account for 30% of breaches, with attackers increasingly using stolen credentials instead of breaking into systems.
AI Used by Attackers: Evidence shows that threat actors are using AI to build websites, generate deepfakes for phishing campaigns, craft phishing messages, and write malicious code.
Primary Initial Access Vectors
Exploiting Public Applications and Valid Accounts: 30% of incidents began through exploitation of public apps and another 30% via valid credentials.
Phishing: 25% of incidents started with phishing messages—down from 29% in 2023.
Increase in Infostealers: An 84% year-over-year rise in infostealer malware delivered via phishing, with Lumma being the most prevalent.
Primary Impacts on Organizations
Credential Theft: The leading impact, accounting for 29% of victim cases.
Data Theft: Present in 18% of cases.
Extortion: Detected in 13% of cases.
Ransomware Trends
Decline in Ransomware Incidents: Although ransomware accounts for 28% of malware cases, overall incidents have decreased for the third year in a row.
Most Active Ransomware Groups: CLOP, LockBit 3.0, and RansomHub were the most active.
Cross-Platform Expansion: All leading ransomware groups now support both Windows and Linux platforms.
Dark Web Vulnerabilities and Trends
Overall Vulnerability Growth: The number of vulnerabilities has tripled over the past eight years.
Top Vulnerabilities Discussed on the Dark Web:
CVE-2024-21762 (Fortinet FortiOS)
CVE-2024-3400 (Palo Alto Networks PAN-OS)
CVE-2024-23113 (Fortinet FortiOS)
Critical Infrastructure: 26% of attacks on critical infrastructure exploited public-facing applications.
AI in Cyber Operations
2023: Breakthrough Year for Generative AI: Attackers began incorporating it into their operations.
Only 24% of Generative AI Projects Are Secured: This exposes organizations to new threats.
Expected Rise in AI-related Vulnerabilities: Rapid adoption is likely to increase risks.
Key Conclusions and Recommendations
Move Beyond Ad-Hoc Defenses: Adopt structured threat management rather than reactive risk mitigation.
Limit Exposure to Threat Environments: This includes Dark Web monitoring, employee training on phishing and password hygiene, and improved incident response planning.
Secure AI Workloads and Deployment: Protect AI during development and deployment stages, implement accountability frameworks, and build trust in AI systems.
Protect Credentials by Reducing Identity Sprawl: Implement robust data protection, consolidate identity solutions, and leverage AI for proactive threat detection.
Fix Authentication Gaps Before Breaches Occur: Expand multi-factor authentication, modernize identity strategy, and reduce IT and security complexity.
The report emphasizes that threat actors are becoming more skilled at concealing malicious activity, increasingly using compromised credentials to access networks and leveraging AI to serve their objectives. Effective organizational security today demands broad coordination—not just within the enterprise, but also in collaboration with ecosystem partners to counter the growing sophistication of modern cyber threats.












