Social engineering moves to initial access vector

0

Unit 42 has released its 2025 Global Incident Response Report: Social Engineering Edition, revealing that social engineering was the #1 initial access vector observed over the past year — accounting for more than one-third of all incidents.

Drawing from Palo Alto Networks telemetry, over 700 incident response cases, and Unit 42 threat research, the report explores how cybercriminals and nation-state actors are exploiting human trust — not technical flaws — to disrupt business and inflict financial damage. It also outlines how AI is accelerating and scaling these attacks.

Key insights include:

  • Phishing dominates: 65% of social engineering attacks used phishing, often targeting privileged accounts (66%) and impersonating internal personnel (45%).
  • High data exposure risk: 60% of social engineering incidents led to data loss — 16 percentage points higher than other attack vectors.
  • AI on the offensive: Generative and agentic AI are being used to create personalized lures, voice clones, and synthetic identities
  • Beyond phishing: While phishing still dominates, 35% of attacks now rely on malvertising, SEO poisoning, smishing, and MFA bombing.
  • Financial motivation reigns: 93% of social engineering cases were driven by profit — from BEC to ransomware and extortion.

The report also outlines two social engineering models observed:

  1. High-touch compromises mimicking staff and exploiting help desks — as seen in Muddled Libra and nation-state campaigns.
  2. At-scale deception like ClickFix, fake browser prompts, and blended lures — seen across healthcare, retail, and government sectors — often resulting in credential theft and operational downtime.
Share.