Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Threat detection

Ranking the top threats and techniques for the first half of 2025

Ranking the top threats and techniques for the first half of 2025

Identity detections climbed, color birds swooped in, and two new cloud techniques broke into our top 10 in the first half of 2025

Brian Donohue

We detected a rash of color bird threats in the first half of 2025, led by stealer-like Amber Albatross and dropper Scarlet Goldfinch. Cloud Accounts (T1078.004) continues to dominate our MITRE ATT&CK® technique rankings due increased adoption of identity security products and improvements in detection coverage, and Data from Cloud Storage (T1530) and Disable or Modify Cloud Firewall (T1562.007) also cracked our top 10 list for the first time ever. Further, paste-and-run initial access schemes (aka ClickFix, fakeCAPTCHA) spurred MITRE to create Malicious Copy Paste (T1204.004)

Additionally, we analyzed thousands of user-submitted phishing emails so far this year, identifying novel phishing tradecraft and learning about the phishing landscape generally. We dive into all this and more in the 2025 Midyear Threat Detection Report.

 

A precipitous rise in identity detections

We detected roughly 5 times as many identity-related detections in the first half of this year as we did in all of 2024. While this may sound alarming at face value, this increase is not a direct reflection on changes in the threat landscape. Rather, it’s a reflection of increased adoption of identity security tools and improvements in detection coverage enabled by the implementation of a custom AI tooling across Red Canary.

Cloud Accounts (T1078.004) detections

T1078.004 Cloud accounts detections since July 2024 infographic

Securing an organization’s identity infrastructure requires the ability to detect suspicious or risky logins as well as overtly malicious ones. For many months now, we’ve been leveraging agentic AI to build user baselines for the identities we protect, which, in turn, is allowing us to better identify anomalous logins and prevent identity compromise by comparing the characteristics of a given login to that identity’s baseline activity. As such, we’re able to detect when a user logs in from an unusual IP range, unexpected device or browser, or via an unsanctioned VPN.

While these sorts of logins aren’t necessarily malicious, they represent a potential risk to organizations, and they are frequently the means of initial access that lead to costly breaches.

Color birds dominate threat rankings

For the first time ever, Red Canary-named activity clusters (aka “color birds”) accounted for a full half of the top threats over the first six months of the year. While that’s an interesting novelty, it’s important to understand the risk these and other threats pose collectively.

Top 10 threats Red Canary detected in the first half of 2025

Our top 10 included stealers, loaders, remote monitoring and management (RMM) tools, and ransomware precursors. Adversaries delivered these threats via potentially unwanted programs (PUP), compromised browser extensions, fake browser updates, malvertising, SEO poisoning, and, increasingly, paste-and-run schemes.

The prevalence of these threats across our visibility suggest that most organizations are likely to face them at some point. Further, since they represent a risk that can materialize in a variety of ways (e.g., data theft, ransomware, financial loss, etc.), it’s critical that organizations have a defensive strategy in place to detect and prevent these threats and mitigate the initial access and other techniques they leverage.

Two new cloud techniques and a look at paste and run

As is the case with identity detection, it’s important to detect risks when you’re securing a cloud environment. And the two new techniques in our top 10, Data from Cloud Storage and Disable or Modify Cloud Firewall, are two great (and related) examples of the importance of risk detection in the cloud. Over the last decade, countless breaches have occurred due to overly permissive access policies for cloud resources. Exposed AWS S3 buckets in particular have been a major problem.

Top 10 MITRE ATT&CK techniques detected in the first half of 2025

Organizations might intentionally make an S3 bucket publicly accessible or otherwise enable external access to cloud resources. However, doing so inadvertently is a common misconfiguration issue that’s caused a lot of heartache for organizations. As such, it’s important to understand when broad access is being allowed for cloud resources and why.

Finally, Malicious Copy Paste didn’t make our top 10 technique list due to the art and science of ATT&CK mapping, but it’s probably the technique of the year given just how widely threats leverage it. It’s important that organizations understand this technique, how it’s being leveraged on Windows and macOS alike, and strategies to diminish its efficacy.

What we’re learning from investigating phishing messages

We investigated thousands of user-reported phishing emails this year. Just 16 percent of the emails we investigated were confirmed malicious, suggesting that users are definitely suspicious about phishing emails (good!) but also that regular emails often look quite a lot like phishing emails (not so good!).

The phishing emails we detected involved credential phishing, malicious attachments, and all variety of social engineering. We also investigated some fairly novel phishing tradecraft wherein adversaries leveraged Google Translate services to evade detection, used built-in tooling to conceal payloads, and more.

Phishing remains a major problem, but user education efforts over the years are clearly paying off as skeptical users are reporting suspect emails in droves. Nevertheless, it remains important to understand the ways that adversaries are leveraging phishing so we can develop strategies to counteract the risk that phishing schemes pose to organizations.

 

Understanding OAuth application attacks and defenses

 

12 questions to ask before you buy MDR

 

A defender’s guide to initial access techniques

 

The double-edged sword of MCP: Understanding the threat landscape for AI workflows

Subscribe to our blog

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top