← Back to Tech & Science

Cyberattackers Leverage AI and Stolen Credentials to Bypass Defenses

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

LONDON, April 21 (AP) — Cyberattackers are increasingly using artificial intelligence to amplify identity-based attacks, leveraging stolen credentials to bypass traditional security defenses and execute ransomware operations. The shift marks a significant evolution in breach tactics, as threat actors move away from complex software exploits toward simpler, more scalable methods that target human error and compromised account information.

Identity-based attacks remain the dominant initial access vector for cyber intrusions. By obtaining valid usernames and passwords, attackers can infiltrate networks without triggering alarms designed to detect malicious code or unusual network traffic. The integration of AI tools has accelerated this process, allowing adversaries to automate phishing campaigns and test stolen credentials at a scale previously unattainable. This automation reduces the time between credential theft and network penetration, increasing the likelihood of successful persistence and data exfiltration.

Security experts note that the use of AI makes phishing attempts harder to detect. Machine learning algorithms enable attackers to craft highly personalized messages that mimic legitimate communications, reducing the likelihood of employees identifying fraudulent requests. This sophistication allows threat actors to harvest credentials more efficiently, feeding a cycle of compromise that fuels ransomware deployment and long-term network access.

The trend underscores a growing vulnerability in enterprise security postures. Many organizations rely heavily on perimeter defenses and endpoint protection, assuming that valid credentials indicate legitimate access. However, when credentials are stolen, these controls become ineffective. Attackers exploit this gap to move laterally within networks, escalate privileges, and deploy ransomware payloads without needing to exploit software vulnerabilities.

The rise of AI-driven credential testing also complicates detection efforts. Automated systems can rapidly validate thousands of stolen credentials across multiple platforms, identifying active accounts before security teams can respond. This speed advantage allows attackers to establish a foothold in critical systems before incident response measures are activated.

Industry analysts warn that the convergence of AI and identity theft represents a fundamental shift in the threat landscape. Traditional security measures focused on blocking malware and patching vulnerabilities are insufficient against attacks that rely on legitimate access. Organizations must now prioritize identity protection, including multi-factor authentication, continuous monitoring of user behavior, and rapid response protocols for compromised credentials.

Despite the clear risks, the full extent of AI's role in recent breaches remains unclear. While the technology is widely available, its specific application in high-profile attacks has not been publicly detailed. Security firms are tracking the emergence of new tools and techniques, but the pace of innovation among threat actors continues to outstrip defensive capabilities.

As cybercriminals refine their methods, the question remains whether existing security frameworks can adapt quickly enough to counter the dual threat of AI and stolen credentials. The answer will likely depend on how rapidly organizations can shift from perimeter-based defenses to identity-centric security models.