1

CrowdStrike’s 2025 Threat Report: GenAI Powers Social Engineering Attacks, Chinese Cyber Espionage Jumps 150%

CrowdStrike’s 2025 Global Threat Report highlights a sharp increase in cyber activity linked to China, alongside a rising adoption of GenAI and escalating attacks on cloud infrastructure. The report delivers a stark warning to business leaders: underestimating adversaries comes at a significant cost.

 

Threat actors are evolving, becoming more sophisticated and methodical, leveraging advanced technologies like AI and machine learning not only to bolster their attacks but to commodify these tools for cybercriminal networks.

 

GenAI, for instance, is now widely exploited by state-sponsored actors, eCrime groups, and hacktivists. They weaponize commonly used enterprise tools — like chatbots — to execute highly effective social engineering campaigns.

 

Among nation-states in particular, China–nexus activity has surged by 150% overall, says CrowdStrike – one of many rapidly growing threats businesses must work hard to stay ahead of by reinforcing and fortifying their cybersecurity postures as we move through 2025.

 

China’s Cyber Expansion

 

CrowdStrike reveals a significant escalation in China-linked cyber operations, with state-sponsored attacks increasing by 150%. Targeted intrusions into sectors like finance, media, manufacturing, and industry spiked by as much as 300%.

 

The research identified seven new China-linked advanced persistent threat (APT) groups in 2024, five of which displayed unique, highly specialized tactics. This evolution signals a shift from the so-called “smash-and-grab” attacks to highly targeted, mission-driven intrusions.

 

“China’s increasingly aggressive cyber espionage, combined with the rapid weaponisation of AI-powered deception, is forcing organisations to rethink their approach to security,” says Adam Meyers, head of counter-adversary operations at CrowdStrike.

 

“Adversaries exploit identity gaps, leverage social engineering and move across domains undetected—rendering legacy defences ineffective. Stopping breaches requires a unified platform powered by real-time intelligence and threat hunting, correlating identity, cloud and endpoint activity to eliminate the blind spots where adversaries hide.”

 

Multi-faceted threat landscape

 

Beyond nation-state activity, CrowdStrike’s findings reveal growing vulnerabilities in cloud environments. Unattributed cloud intrusions rose by 26% in 2024, with attackers exploiting valid credentials to gain internal access and move laterally within systems. Misconfigurations, weak access controls, and cloud infrastructure flaws remain prime entry points.

 

Identity-based attacks surged as well, with 75% of breaches now malware-free. Adversaries increasingly leverage stolen credentials to impersonate legitimate users, navigating networks undetected. Underground forums saw a 20% increase in the trade of valid credentials, while AI-fueled phishing and voice scams surged by 442%.

 

GenAI Accelerating Attack Speed

 

Attackers are moving faster than ever. CrowdStrike reports that the average breakout time — the window before adversaries start lateral movement — dropped to just 48 minutes in 2025, with the fastest observed time at 51 seconds.

 

GenAI played a pivotal role in this acceleration. Notable examples include fake IT job candidates infiltrating companies and AI-powered disinformation campaigns orchestrated by Chinese, Russian, and Iranian groups to disrupt elections.

 

Preparing for 2025 and Beyond

 

In light of these evolving threats, business leaders must adopt a proactive, holistic approach to cybersecurity. This includes:

 

  • Unified security platforms: Integrating identity, endpoint, and cloud security with real-time threat intelligence.
  • Enhanced IAM practices: Implementing multi-factor authentication (MFA), regularly auditing user privileges, and continuously monitoring for anomalous access.
  • AI-powered defense tools: Investing in security technologies capable of identifying and neutralizing AI-driven attacks.
  • Employee training & response planning: Equipping teams to recognize evolving threats and rehearsing incident response strategies.

 

CrowdStrike’s 2025 Threat Report makes one thing clear: the cyber threat landscape is more dynamic than ever, and organizations must stay vigilant to outpace increasingly adaptive adversaries.

 

Source: CrowdStrike

Related Posts

card__image

Secure by Design: From Concept to Cybersecurity Imperative in 2025

In a rapidly evolving digital landscape, the Secure by Design (SbD) philosophy is proving strategically essential and measurably effective. A report from Secure Code Warrior, analyzing data from 600 enterprise customers over nine years, found that large organizations that train developers in secure-by-design practices can reduce software vulnerabilities by over 50%. Companies with more than […]

card__image

Zero-Day Vulnerabilities: Unseen Threats and Their Impact

The ultimate guide to zero-day vulnerabilities and their effects in 2025 starts with a clear truth: zero-day vulnerabilities rank among the most severe dangers in the modern digital landscape.   A zero-day vulnerability  — flaws exploited before patches are available. This makes them incredibly challenging to detect and counter, leaving businesses exposed to substantial operational […]