AI arms race: accelerated threat dynamics in 2026

The unveiling of CrowdStrike's 2026 Global Threat Report highlights a surge in AI-enabled threats, shrinking defenders' response time.

The 2026 Global Threat Report released by CrowdStrike outlines how AI is accelerating adversary capabilities and expanding the enterprise attack surface. In 2025, the average eCrime breakout time fell to 29 minutes, with the fastest observed breakout occurring in 27 seconds.

Adversaries are using AI to target organisations, including injecting malicious prompts into generative AI tools at more than 90 organisations and exploiting vulnerabilities in AI development platforms. The report notes that as technological innovation advances, adversaries continue to adapt their methods to take advantage of new systems.

According to the analysis, AI-enabled adversaries increased their activity by 89% year over year, using AI for reconnaissance, credential theft and evasion. Intrusions are occurring more quickly and are increasingly difficult to detect, moving through trusted identities, SaaS applications and cloud infrastructure while reducing the time available for defenders to respond. In this environment, AI is both a tool used by attackers and a target in its own right.

Key findings from the report include:
  • AI as an Attack Surface: Adversaries injected malicious prompts into legitimate generative AI tools at more than 90 organisations to generate commands for credential theft and cryptocurrency theft. They also exploited vulnerabilities in AI development platforms to establish persistence and deploy ransomware, and created malicious AI servers impersonating trusted services to intercept sensitive data.
  • Record Breakout Times: The average eCrime breakout time fell to 29 minutes, representing a 65% increase in speed compared with 2024. The fastest observed breakout occurred in 27 seconds. In one case, data exfiltration began within four minutes of initial access.
  • Nation-State and eCrime Activity: AI-enabled adversaries increased operations by 89%. Russia-nexus actor FANCY BEAR deployed LLM-enabled malware known as LAMEHUG to automate reconnaissance and document collection. eCrime actor PUNK SPIDER used AI-generated scripts to accelerate credential dumping and remove forensic evidence. DPRK-nexus actor FAMOUS CHOLLIMA used AI-generated personas to scale insider operations. China-nexus activity increased by 38% in 2025, with 67% of exploited vulnerabilities delivering immediate system access and 40% targeting internet-facing edge devices. DPRK-linked incidents rose by more than 130%, and PRESSURE CHOLLIMA’s $1.46 billion cryptocurrency theft was the largest single financial theft reported.
  • Zero-Day and Cloud Exploitation: Forty-two per cent of vulnerabilities were exploited before public disclosure. Cloud-focused intrusions increased by 37% overall, including a 266% rise in activity from state-linked threat actors targeting cloud environments for intelligence collection.

Adam Meyers, head of counter adversary operations at CrowdStrike, said that breakout time reflects how quickly intrusion methods are evolving, and that security teams must operate at greater speed to respond effectively to modern threats.
A partnership between Applied Computing, Wipro and Databricks focuses on deploying AI in energy...
UK businesses focus on AI pricing strategies, but struggle with outdated billing systems.
Smart Communications announces Satish Shenoy as Senior VP to enhance global partner strategy and...
Databricks is set to invest over $850 million in the UK to expand their AI and data ambitions,...
Motive launches an integrated AI analytics platform designed to transform decision-making and...
F5 has introduced new threat intelligence resources designed to support assessment of AI model...
Distology has partnered with Snyk to bring AI security tools to its partner network across Northern...
A survey reveals that ambitious small business owners in the UK view AI as pivotal for their growth...