For years, the cybersecurity headlines have been dominated by news of sophisticated phishing campaigns and zero-day exploits. But behind these attention-grabbers lurks a far more subtle and explosive evolution in adversarial behavior. Today, we are proud to introduce the Red Report 2025, the fifth edition of our annual threat analysis from Picus Labs. This year’s key revelation? A massive uptick in infostealing malware and multi-stage “heist-style” campaigns that are pushing the boundaries of stealth and persistence, while actual AI-driven attacks remain more hype than reality.
From Infostealers to AI Myths: 2025’s Cyber Threat Reality Check
The Red Report 2025 is based on an analysis of over 1 million real world malware samples collected throughout 2024. These samples revealed more than 14 million malicious actions, 93% of which were related to the top 10 MITRE ATT&CK® techniques. We call these the top ten due to their consistent use by adversaries, underscoring how vital they are to attackers’ efforts to infiltrate and burrow deep into a victim’s environment.
Key Data Points at a Glance:
-
A 3X increase in malware targeting credentials stored in password vaults and managers
-
93% of all malicious actions mapped to just 10 MITRE ATT&CK techniques
-
No significant use of AI, yet, in real-world malware campaigns
-
Rise of “SneakThief” style infostealers that rely on stealth, automation, and persistence
-
Malware now executes an average of 14 malicious actions
![]()
|
|
Red Report 2025 in Numbers
Meet “SneakThief” and the Art of the Perfect Heist
This year’s report shines a spotlight on a new wave of infostealer malware we’ve dubbed “SneakThief,” infamous for an attack sequence so effective it’s been likened to “The Perfect Heist.” While the name is fictitious, the techniques are alarmingly real: multi-stage infiltration, advanced process injection, secure channel exfiltration, and boot persistence. The result? An attacker’s dream scenario where precious credentials—and entire networks—can be siphoned off without actually tripping any alarm bells.
Credentials: The Crown Jewels
One of the most alarming shifts we uncovered is a 3X surge in malware that specifically targets credential stores, such as password managers and browser-stored login data. In fact, 25% of the malware examined last year exhibited behaviors mapped to T1555 (Credentials from Password Stores). This means threat actors aren’t just prying open your vault, they’re going after the master keys inside. Once they snag your credentials, lateral movement and privilege escalation within your environment are practically guaranteed.
The Top 10 Techniques Driving Cybercrime
It’s easy to get overwhelmed by the hundreds of MITRE ATT&CK techniques out there in the wild. But if you were to focus on just the top 10, you’d have addressed 93% of the malware activity we observed in 2024. Of these, T1055 (Process Injection) stands out with a 31% prevalence rate, enabling attackers to hide malicious code in legitimate processes. Other heavy hitters include T1059 (Command and Scripting Interpreter) for malicious scripting, T1071 (Application Layer Protocol) for encrypted exfiltration, and T1547 (Boot or Logon Autostart Execution) for its persistence through reboots. Together, they form the backbone of modern cyber heists.
Debunking the Myth: AI-Driven Malware Not Yet a Real Threat
Amid a seemingly never ending media frenzy, our findings actually show no evidence of AI-driven malware playing a significant role in active cyber campaigns. Attackers do leverage AI-like capabilities for tasks such as creating realistic phishing lures or debugging malicious code, but we haven’t seen new or disruptive AI-based attack vectors. Oh it’s coming, but for now, the “dark AI” storyline remains more fiction than fact.
Why Your Security Priorities Need to Shift
Credential theft, encrypted data exfiltration, and stealthy process injection underscore a clear directive for defenders: traditional patchwork defenses, where disparate tools and processes operate in isolation, simply aren’t enough. Organizations need continuous security validation, advanced behavioral monitoring, and a threat-informed strategy that focuses on the TTPs most favored by attackers. Proactive alignment of your defenses to the top 10 MITRE ATT&CK techniques can dramatically reduce the real-world impact of threats like SneakThief.
Get the Full Story
The Red Report 2025 goes beyond threat statistics and highlights the exact ways attackers execute high-stakes exfiltrations of enterprise data. It also provides actionable insights for defenders, including:
-
Threat-informed defense strategies to align your security controls to adversaries’ top TTPs
-
Best practices for credential hardening and multi-factor authentication
-
How to detect and more importantly disrupt Stealth + Persistence combos
-
Real-world examples of “The Perfect Heist,” so you can learn from others before it’s too late
Ready to dive into the world of modern heists and unstoppable infostealers?
Download the Picus Red Report 2025 to get the latest actionable intelligence and join our upcoming live webinar on February 27, 2025, at 1:00 p.m. EST. You’ll hear directly from Picus Labs researchers themselves about the data that shapes modern cyber defenses.