2026 Sophos Active Adversary Report: Rise of Identity Attacks Amid Growing Threat Groups

Published:

spot_img

Insights from the 2026 Sophos Active Adversary Report

Sophos, a renowned name in cybersecurity solutions, has recently unveiled its 2026 Sophos Active Adversary Report. This comprehensive analysis covered 661 Incident Response and Managed Detection and Response cases from November 2024 to October 2025. The investigation spanned organizations from 70 countries and 34 different industries. One key takeaway is that 67% of the incidents scrutinized involved identity-related attacks.

Key Findings from the Report

Shift to Credential Compromise

A major trend observed in the report is the shift in attack methods. There has been a notable movement away from exploiting software vulnerabilities towards compromised credentials. In fact, brute-force activity, which accounts for 15.6% of cases, is nearly on par with exploitation techniques, which stand at 16% as methods of initial access.

Dwell Time Decreases

The report highlights a significant reduction in median dwell time, now at just three days. This decline can be attributed to faster methods practiced by attackers, as well as more agile responses from defenders, particularly in environments with Managed Detection and Response systems.

Speed of Attackers

Once infiltrators gain access, they are reaching Active Directory systems with alarming efficiency. On average, it takes only 3.4 hours from the moment of breach until they access the Active Directory server.

Ransomware Activity

Interestingly, the report notes that 88% of ransomware deployments occur during non-business hours, and 65% of data exfiltration activities happen when organizations are typically closed. This underlines how attackers often exploit times when their targets are most vulnerable.

Challenges with Telemetry

A critical issue highlighted is the growing lack of telemetry data which hampers defense strategies. The proportion of missing logs due to data retention problems has doubled over the previous year. This issue primarily stems from firewall appliances, many of which default to log retention periods as short as seven or even 24 hours.

The Rise of Identity Attacks

The report underscores an unsettling trend: attacks based on identity compromise, like stolen credentials and phishing, are becoming more prevalent. Traditionally exploited vulnerabilities still play a role; however, attackers are increasingly leveraging valid accounts to breach networks, evading conventional perimeter defenses. Alarmingly, 59% of cases lacked Multi-Factor Authentication (MFA), making it easier for attackers to misuse stolen credentials.

Expert Insights

John Shier, Field CISO and lead author of the report, expressed concern about the continued dominance of identity-related attacks. He stated, “The dominance of identity-related root causes for successful initial access has been developing for years. Addressing weaknesses in identity security requires more than just patch management—organizations need to take a proactive stance.”

Expanding Threat Landscape

The report reflects a growing complexity in cybersecurity threats, showing the highest number of active threat groups ever recorded. This expansion complicates the attribution of attacks and increases risks for organizations.

Shier commented, “Ongoing actions by law enforcement have disrupted the ransomware ecosystem, diminishing the influence of groups like LockBit. However, this has led to a surge of emerging groups, heightening the urgency for organizations to understand their tactics, techniques, and procedures (TTPs) to better safeguard themselves.”

The Role of Artificial Intelligence

Despite much excitement surrounding AI’s potential in cybersecurity, the report found no substantial shift in attack behaviors due to AI innovations. While Generative AI has enhanced the sophistication of phishing and social engineering tactics, it has yet to yield entirely new methods of attack.

Shier noted, “AI has contributed to increasing the scale and sophistication of attacks, but it hasn’t displaced human attackers. Essential defensive strategies remain unchanged: organizations must prioritize strong identity protection, reliable telemetry, and quick response capabilities.”

Recommendations for Strengthening Defense

Based on the findings from the 2026 Active Adversary Report, Sophos provides several actionable recommendations for organizations:

  • Implement phishing-resistant Multi-Factor Authentication (MFA) and verify its configuration.
  • Limit exposure of identity infrastructure and services accessible via the Internet.
  • Address known vulnerabilities promptly, particularly on edge devices.
  • Maintain continuous 24/7 monitoring through Managed Detection and Response strategies.
  • Ensure the retention of security logs for rapid detection and investigation.

These strategies are critical for organizations aiming to fortify their defenses in an increasingly complex threat landscape.

spot_img

Related articles

Recent articles

Exploring Insider Threats in the UAE: 2026 Insights

The Silent Siphon: Unveiling Insider Threats in UAE Businesses In recent years, headlines in the UAE have been saturated with alarming reports of cyberattacks. Yet,...

How ₹590 Crores Were Lost in IDFC First Bank Transfers

CHANDIGARH: In a significant investigation, four individuals, including two former employees of IDFC First Bank, have been apprehended for their involvement in a scheme...

Liquid Intelligent Technologies Secures New Credit Facilities and Confirms Debt Repayment

Liquid Intelligent Technologies Successfully Repays Debt Liquid Intelligent Technologies, a division of Cassava Technologies, announced that it...

Russian Cyber Gang “Diesel Vortex” Strikes Logistics Sector, Harvests 1,600+ Credentials

Major Phishing Operation Exposed: Diesel Vortex Targets Logistics Sector Introduction to Diesel Vortex In a significant cybersecurity revelation, global agencies have uncovered a phishing operation attributed...