LogoAgentHunter
  • Submit
  • Industries
  • Categories
  • Agency
Logo
LogoAgentHunter

Discover, Compare, and Leverage the Best AI Agents

Featured On

Featured on yo.directory
yo.directory
Featured on yo.directory
Featured on Startup Fame
Startup Fame
Featured on Startup Fame
AIStage
Listed on AIStage
Sprunkid
Featured on Sprunkid
Featured on Twelve Tools
Twelve Tools
Featured on Twelve Tools
Listed on Turbo0
Turbo0
Listed on Turbo0
Featured on Product Hunt
Product Hunt
Featured on Product Hunt
Game Sprunki
Featured on Game Sprunki
AI Toolz Dir
Featured on AI Toolz Dir
Featured on Microlaunch
Microlaunch
Featured on Microlaunch
Featured on Fazier
Fazier
Featured on Fazier
Featured on Techbase Directory
Techbase Directory
Featured on Techbase Directory
backlinkdirs
Featured on Backlink Dirs
Featured on SideProjectors
SideProjectors
Featured on SideProjectors
Submit AI Tools
Featured on Submit AI Tools
AI Hunt
Featured on AI Hunt
Featured on Dang.ai
Dang.ai
Featured on Dang.ai
Featured on AI Finder
AI Finder
Featured on AI Finder
Featured on LaunchIgniter
LaunchIgniter
Featured on LaunchIgniter
Imglab
Featured on Imglab
AI138
Featured on AI138
600.tools
Featured on 600.tools
Featured Tool
Featured on Featured Tool
Dirs.cc
Featured on Dirs.cc
Ant Directory
Featured on Ant Directory
Featured on MagicBox.tools
MagicBox.tools
Featured on MagicBox.tools
Featured on Code.market
Code.market
Featured on Code.market
Featured on LaunchBoard
LaunchBoard
Featured on LaunchBoard
Genify
Featured on Genify
Copyright © 2025 All Rights Reserved.
Product
  • AI Agents Directory
  • AI Agent Glossary
  • Industries
  • Categories
Resources
  • AI Agentic Workflows
  • Blog
  • News
  • Submit
  • Coummunity
  • Ebooks
Company
  • About Us
  • Privacy Policy
  • Terms of Service
  • Sitemap
Friend Links
  • AI Music API
  • ImaginePro AI
  • Dog Names
  • Readdit Analytics
Back to News List

CrowdStrike Report Warns of AI-Powered Cyber Threats in 2025

August 4, 2025•Counter Adversary Operations•Original Link•2 minutes
Cybersecurity
AI
ThreatHunting

The CrowdStrike 2025 Threat Hunting Report highlights how adversaries are leveraging AI to scale attacks, target cloud systems, and refine long-term cyberattack strategies.

AI Weaponization on the Rise

Adversaries are increasingly weaponizing AI to scale operations, accelerate attacks, and target autonomous AI agents in modern businesses. The CrowdStrike 2025 Threat Hunting Report reveals how threat actors are using AI to:

  • Automate tasks like malware development and technical problem-solving.
  • Gain unauthorized access, steal credentials, and deploy malware.
  • Exploit vulnerabilities in AI software to expand the attack surface.

Notably, FAMOUS CHOLLIMA, a DPRK-nexus adversary, infiltrated over 320 companies in the past year—a 220% increase—by using generative AI (GenAI) for resume creation, deepfake video interviews, and AI-powered coding tools.

Cross-Domain Attacks and Cloud Vulnerabilities

Adversaries are bypassing traditional defenses to move across endpoint, identity, cloud, and unmanaged systems. Key findings include:

  • SCATTERED SPIDER resurfaced with faster tradecraft, using vishing and help desk impersonation to bypass MFA and deploy ransomware in under 24 hours.
  • Cloud intrusions surged 136% in H1 2025 compared to all of 2024, with China-nexus actors like GENESIS PANDA exploiting misconfigurations.
  • Identity attacks are critical, with adversaries using stolen PII to impersonate employees and pivot to SaaS applications.

Key Trends and Statistics

The report highlights alarming trends:

  • 81% of interactive intrusions were malware-free.
  • eCrime accounted for 73% of interactive intrusions.
  • Vishing attacks are on track to double in volume by end of 2025.
  • Government sector intrusions rose 71% YoY, with targeted intrusions up 185%.

Prolific Threat Actors

CrowdStrike now tracks 265+ named adversaries and 150+ activity clusters, including:

  • EMBER BEAR and CHARMING KITTEN: Using GenAI for pro-Russia narratives and phishing lures.
  • GLACIAL PANDA: Driving a 130% rise in telecom-sector espionage.

Recommendations and Resources

To combat these threats, CrowdStrike recommends:

  1. Adopting advanced threat intelligence solutions like CrowdStrike’s platform.
  2. Staying informed via the Adversary Universe podcast.

For deeper insights, download the full report or attend the CrowdCast.

Related News

August 18, 2025•ABcontributor

Zscaler CAIO on securing AI agents and blending rule-based with generative models

Claudionor Coelho Jr, Chief AI Officer at Zscaler, discusses AI's rapid evolution, cybersecurity challenges, and combining rule-based reasoning with generative models for enterprise transformation.

ArtificialIntelligence
Cybersecurity
GenerativeAI
August 18, 2025•Kaydence Shum

Lenovo Wins Frost Sullivan 2025 Asia-Pacific AI Services Leadership Award

Lenovo earns Frost Sullivan's 2025 Asia-Pacific AI Services Customer Value Leadership Recognition for its value-driven innovation and real-world AI impact.

AI
Lenovo
Asia-Pacific

About the Author

Dr. Emily Wang

Dr. Emily Wang

AI Product Strategy Expert

Former Google AI Product Manager with 10 years of experience in AI product development and strategy formulation. Led multiple successful AI products from 0 to 1 development process, now provides product strategy consulting for AI startups while writing AI product analysis articles for various tech media outlets.

Expertise

AI Product Management
User Experience
Business Strategy
Market Analysis
Experience
10 years
Publications
65+
Credentials
2
LinkedInMedium

Agent Newsletter

Get Agentic Newsletter Today

Subscribe to our newsletter for the latest news and updates