Report Finds Attackers Now Focus on Credential Theft to Access Systems

Hackers are now shifting their focus from "breaking in" to "logging in," according to the 2026 Cloudflare Threat Report.

Sophisticated security tools are harder to penetrate and raise alarms when targeted, the report found. This has forced hackers to steal legitimate credentials to exploit system vulnerabilities, instead.

This method has proven to be quicker, stealthier, and harder to detect. The main identity systems that are vulnerable to theft include usernames, passwords, tokens, and access privileges.

Furthermore, it has become incredibly hard to identify attackers. Once they obtain the target's credentials, they can move around the internal system with ease.

Cloudflare also found that 4% of login attempts are bots automatically testing credentials. The report outlines that 54% of ransomware attacks originate from credential-stealing malware.

Close to 50% of human logins use credentials already exposed to breaches.

Fundamental changes in how organizations manage their IT environments have made this type of attack, which steals login details, more prevalent. These include:

  • Cloud and SaaS ecosystems: Corporate systems are increasingly connected through single sign-on (SSO) and federated identity platforms.
  • Remote and hybrid work: Employees log in from personal devices, home networks, and mobile endpoints.
  • Machine identities and automation: Bots, APIs and service accounts now outnumber human users in many systems.

All these changes have provided a breeding ground for a sophisticated web of targeted attacks on organizations, as attackers seek large troves of usernames and passwords.

These databases are then sold or traded online on the dark web. These attacks come full circle when hackers use stolen credentials to breach IT systems.

AI as a Tool for Hackers

The Cloudflare Threat Report also outlines how hackers are using generative AI to bolster their arsenal. They use it for automated reconnaissance, to create phishing messages or deepfake communications, and to map networks and identify high-value targets more quickly.

The concerning trend here is that it gives attackers access to the arena with sophisticated tools, causing breaches at scale.

In the past, the focus for IT was on keeping attackers out. Now, it is about identifying threats that appear as employees or contractors and who operate within trusted applications like Slack, Google Workspace, or GitHub.

Cloudflare recognizes that the cybersecurity response must utilize autonomous defense systems to use AI and automation to detect suspicious activity and respond instantly.

Cloudflare recommends these systems be used for continuous identity verification, as well as monitoring the behavior of users and devices and the automated containment of compromised accounts.

Attackers are always on the lookout for new and innovative ways to compromise IT systems. This wave of stealing credentials and entering systems under the auspices of legitimate users results in a need for real-time automation rather than manual response.

"Organizations must shift to automated, edge-based mitigation that can respond in seconds," the report's authors wrote. "Legacy scrubbing center models are no longer sufficient for attacks that peak and conclude within 10 minutes."

For the full report, go to the Cloudflare blog.

Featured

  • tool icons with variety of business icons

    SETDA Releases Free EdTech Quality Action Toolkit

    The State Educational Technology Directors Association (SETDA) has put together a free K-12 EdTech Quality Action Toolkit that provides a framework for evaluating education technology products as well as guidance on regulatory compliance, templates for communicating with vendors, training resources, and more.

  • abstract glowing circuit patterns

    Microsoft Scales Back Copilot Integrations in Windows 11

    Microsoft is dialing back its Copilot push in Windows 11, promising a sweeping quality overhaul that puts performance and reliability ahead of AI feature expansion .

  • SXSW EDU

    SXSW EDU 2026: Discover How to Incorporate Technology with Impact

    With the proliferation of AI and advanced technology, education leaders have an opportunity to find and implement the right solutions to make a difference for learners. This March 9-12, SXSW EDU 2026 is your chance to discover innovative edtech, connect with trailblazing peers, and find strategies that make an impact.

  • abstract cybersecurity data protection

    Rubrik Announces Google Workspace Data Protection

    Rubrik has introduced Rubrik Data Protection for Google Workspace, a product the company said is designed to help enterprise customers protect data and restore operations across Google Workspace environments.