2026 Sophos Active Adversary Report: Rise of Identity Attacks Amid Growing Threat Groups

Published:

spot_img

Insights from the 2026 Sophos Active Adversary Report

Sophos, a renowned name in cybersecurity solutions, has recently unveiled its 2026 Sophos Active Adversary Report. This comprehensive analysis covered 661 Incident Response and Managed Detection and Response cases from November 2024 to October 2025. The investigation spanned organizations from 70 countries and 34 different industries. One key takeaway is that 67% of the incidents scrutinized involved identity-related attacks.

Key Findings from the Report

Shift to Credential Compromise

A major trend observed in the report is the shift in attack methods. There has been a notable movement away from exploiting software vulnerabilities towards compromised credentials. In fact, brute-force activity, which accounts for 15.6% of cases, is nearly on par with exploitation techniques, which stand at 16% as methods of initial access.

Dwell Time Decreases

The report highlights a significant reduction in median dwell time, now at just three days. This decline can be attributed to faster methods practiced by attackers, as well as more agile responses from defenders, particularly in environments with Managed Detection and Response systems.

Speed of Attackers

Once infiltrators gain access, they are reaching Active Directory systems with alarming efficiency. On average, it takes only 3.4 hours from the moment of breach until they access the Active Directory server.

Ransomware Activity

Interestingly, the report notes that 88% of ransomware deployments occur during non-business hours, and 65% of data exfiltration activities happen when organizations are typically closed. This underlines how attackers often exploit times when their targets are most vulnerable.

Challenges with Telemetry

A critical issue highlighted is the growing lack of telemetry data which hampers defense strategies. The proportion of missing logs due to data retention problems has doubled over the previous year. This issue primarily stems from firewall appliances, many of which default to log retention periods as short as seven or even 24 hours.

The Rise of Identity Attacks

The report underscores an unsettling trend: attacks based on identity compromise, like stolen credentials and phishing, are becoming more prevalent. Traditionally exploited vulnerabilities still play a role; however, attackers are increasingly leveraging valid accounts to breach networks, evading conventional perimeter defenses. Alarmingly, 59% of cases lacked Multi-Factor Authentication (MFA), making it easier for attackers to misuse stolen credentials.

Expert Insights

John Shier, Field CISO and lead author of the report, expressed concern about the continued dominance of identity-related attacks. He stated, “The dominance of identity-related root causes for successful initial access has been developing for years. Addressing weaknesses in identity security requires more than just patch management—organizations need to take a proactive stance.”

Expanding Threat Landscape

The report reflects a growing complexity in cybersecurity threats, showing the highest number of active threat groups ever recorded. This expansion complicates the attribution of attacks and increases risks for organizations.

Shier commented, “Ongoing actions by law enforcement have disrupted the ransomware ecosystem, diminishing the influence of groups like LockBit. However, this has led to a surge of emerging groups, heightening the urgency for organizations to understand their tactics, techniques, and procedures (TTPs) to better safeguard themselves.”

The Role of Artificial Intelligence

Despite much excitement surrounding AI’s potential in cybersecurity, the report found no substantial shift in attack behaviors due to AI innovations. While Generative AI has enhanced the sophistication of phishing and social engineering tactics, it has yet to yield entirely new methods of attack.

Shier noted, “AI has contributed to increasing the scale and sophistication of attacks, but it hasn’t displaced human attackers. Essential defensive strategies remain unchanged: organizations must prioritize strong identity protection, reliable telemetry, and quick response capabilities.”

Recommendations for Strengthening Defense

Based on the findings from the 2026 Active Adversary Report, Sophos provides several actionable recommendations for organizations:

  • Implement phishing-resistant Multi-Factor Authentication (MFA) and verify its configuration.
  • Limit exposure of identity infrastructure and services accessible via the Internet.
  • Address known vulnerabilities promptly, particularly on edge devices.
  • Maintain continuous 24/7 monitoring through Managed Detection and Response strategies.
  • Ensure the retention of security logs for rapid detection and investigation.

These strategies are critical for organizations aiming to fortify their defenses in an increasingly complex threat landscape.

spot_img

Related articles

Recent articles

Parkin Strengthens Dubai’s Parking Network with Strategic Collaboration to Integrate Autonomous Mobility Solutions

Parkin Strengthens Dubai's Parking Network with Strategic Collaboration to Integrate Autonomous Mobility Solutions Dubai's urban landscape is set for a transformative shift as Parkin Company...

China-Linked Hackers Spearhead Phishing Campaigns Targeting Journalists and Activists Across 100 Malicious Domains

China-Linked Hackers Spearhead Phishing Campaigns Targeting Journalists and Activists Across 100 Malicious Domains Freelance hackers associated with the Chinese government have orchestrated extensive phishing campaigns...

GitHub Resolves Critical RCE Vulnerability CVE-2026-3854 in Under Two Hours

GitHub Resolves Critical RCE Vulnerability CVE-2026-3854 in Under Two Hours Cybersecurity researchers have uncovered a significant remote code execution (RCE) vulnerability, designated CVE-2026-3854, that impacts...

Automation Advances Female Wellbeing: Insights from OneSun’s CEO on Transforming Work in the UAE

Automation Advances Female Wellbeing: Insights from OneSun's CEO on Transforming Work in the UAE In recent years, the intersection of technology and gender equality has...