• 00DAYS
  • 00HRS
  • 00MINS

WEBINAR

Stop Employee Data Exfiltration with AI

eBook: 2025 Threat Hunting Report by Crowdstrike

Last year, 81% of interactive intrusions happened without a single piece of malware. While your legacy security tools scanned for known threats, adversaries walked through the front door using legitimate credentials and living-off-the-land techniques. The question isn’t whether you’ll be targeted—it’s whether you’ll detect them in time.

The CrowdStrike 2025 Threat Hunting Report reveals what happens when threat intelligence meets continuous hunting across thousands of customer environments. From July 2024 to June 2025, CrowdStrike OverWatch tracked a 27% year-over-year increase in interactive intrusions, with 73% attributed to eCrime operations. These aren’t automated attacks. These are hands-on-keyboard adversaries who understand your environment better than you might expect.

The Threat Landscape Just Shifted

Cloud environments saw a staggering 136% increase in intrusions during the first half of 2025 compared to all of 2024. China-nexus adversaries demonstrated a 40% year-over-year increase in cloud-conscious operations, specifically targeting telecommunications providers with surgical precision. Meanwhile, vishing attacks already exceeded 2024’s total volume—and we’re only halfway through the year.

Consider this: the government sector experienced a 71% year-over-year increase in overall interactive intrusions and a 185% spike in targeted intrusion activity. Technology remains the most frequently targeted industry for the eighth consecutive year, but telecommunications saw a 130% increase in nation-state activity. The adversaries aren’t rotating targets—they’re expanding operations.

Threat Hunting Report: AI Attacks Rise 81% | CrowdStrike

GenAI Changes Everything

Nation-state adversaries and eCrime operators alike are weaponizing generative AI across three primary vectors: social engineering, technical operations, and information campaigns. Iran’s CHARMING KITTEN likely adopted AI for phishing content generation. Russia’s EMBER BEAR financed AI infrastructure for pro-Russia propaganda. The DPRK’s FAMOUS CHOLLIMA conducted over 320 fraudulent employment schemes as remote software developers, leveraging GenAI tools throughout the entire hiring and employment process.

This isn’t theoretical. These adversaries are already inside networks, using AI to draft convincing emails, generate synthetic identities, optimize social engineering campaigns, accelerate vulnerability research, and enhance malware capabilities. They’re operating faster, staying hidden longer, and adapting in real-time.

What Defenders Need Now

This report delivers actionable intelligence from CrowdStrike’s Counter Adversary Operations team—the integrated force combining CrowdStrike Intelligence analysts with CrowdStrike OverWatch threat hunters. You’ll discover:

  • How cross-domain threat hunting detects adversaries operating across identity, endpoint, and cloud environments simultaneously
  • Why traditional security tools miss 81% of modern intrusions
  • Specific tactics, techniques, and procedures (TTPs) used by the most intrusive adversaries, including GLACIAL PANDA, GENESIS PANDA, and MURKY PANDA
  • Six critical recommendations for defending against AI-augmented attacks
  • Real-world case studies showing how threat hunters identify adversaries living off the land

The telecommunications sector provides a compelling example. CrowdStrike OverWatch routinely identifies multiple threat actors conducting concurrent operations on the same target network. Deep knowledge of adversaries’ characteristic behaviors enables threat hunters to separate and track these activities—leading to the discovery of GLACIAL PANDA, the latest China-nexus adversary specializing in long-game intelligence collection.

Cybersecurity Threat Hunting Report by Crowdstrike

Your Next Move

The adversaries already adapted. They’re faster, stealthier, and more sophisticated than ever. The CrowdStrike 2025 Threat Hunting Report provides the intelligence-driven insights your security team needs to detect, disrupt, and stop today’s enterprising adversaries.

Download your complimentary copy now and discover why proactive, intelligence-informed threat hunting is no longer optional—it’s essential.

eBook: 2025 Threat Hunting Report by Crowdstrike

Download

Name

Real Results

Small Business, Midsized Teams, and Enterprise
image

The City of Asheville was extremely impressed with the depth of knowledge and the project management capabilities of Ridge IT Cyber. Their engineers presented solutions to our issues while educating our team along the way. They excel in both their technical expertise as well as their customer service skills. It was a pleasure to work with Ridge IT Cyber.

Jessica Nash
The City of Asheville
image

In all matters under our current SOW, Ridge IT Cyber has consistently delivered above and beyond our expectations. I can confidently state that Ridge IT Cyber is an exemplary partner for managed IT services, particularly for cloud-centric and security-focused organizations.

Hatef Yamini
Dexis
image

We worked with Ridge IT Cyber when implementing a zero trust environment within our globally diverse workforce. They were professional from the start and ensured we were 100% operational. They continue to provide immediate support even though we don’t have a managed service contract with them. I’d highly recommend Ridge IT Cyber!

Walter Hamilton
OWT Global
image

We used Ridge for the implementation of Zscaler to provide improved cyber security for our home working staff, during the COVID-19 Pandemic. Ridge completed configuration quickly and easily, providing clear guidance at every step so we gained an understanding of the system. Ridge also helped us resolve additional firewall rule issues. At all stages of the implementation, Ridge has been responsive and patient.

Nigel Keen
Veracity Group
image

The team at Ridge IT Cyber was methodical and efficient during all phases of our Zscaler ZPA solution deployment, as well as during debugging sessions. I would like to thank you for your professionalism and I wish the entire Ridge team continued success.

Mohamed Amine
Saft Batteries

Uncover threats.

Rapid response times, with around the clock IT support, from Inc. Magazine’s #1 MSSP.

Cloud-first protection in one slim bill.

Rapid response times, with around the clock IT support, from Inc. Magazine’s #1 MSSP.