- Cyber criminals are increasingly targeting login -credentials, session cookies and more
- The threat of identity -based attacks is rising
- Costs added and companies are responding slowly with
Companies are facing an increase in identity-based attacks, and junk applications are the supreme guilty, research from the Huntress 2025 ‘Managed ITR report: Identity is the new security ostrich’.
Based on a survey of more than 600 IT and security professionals, Huntress’ new report says two -thirds (67%) of organizations reported an increase in identity -based events in the last three years.
In addition, these attacks accounted for more than 40% of security events for more than one -third (35%) of organizations in the last 12 months alone.
Other increase
Huntress also claims that “junk applications” are the biggest concern here. Almost half (45%) or respondents said they previously encountered junk and/or malicious applications, while 46% described them as a “top identity -based concern”.
To make things worse, detection and response times do not follow. More than half (53%) said they need “hours” to detect such an event, and two -thirds (68%) added that they were unable to detect or respond to the threat until the actors already established persistence.
HUNTRESS also warned that the financial effect of these attacks is “significant.” Apart from downtime and reputation damage, researchers found a third (32%) of companies that lost at least $ 100,000 as a result.
“There is no denial of identity the new endpoint. With widespread cloud -recording, the switch to hybrid work and an increased dependence on Saa’s applications, the identity attack surface has exploded in the last few years,” said Prakash Ramamurthy, chief product manager at Huntress.
“Hackers are no longer wasting time breaking into networking the hard way. They log on using stolen credentials, session cookies and access tokens to bypass endpoint protection and utilize weak multifactor approval.”
However, not everything is lost as there are several methods, including zero-thrust Network Access (ZTNA) that help mitigate this threat.