2025 Threat Hunting Report by CrowStrike: Adversaries Weaponise and Target AI at Scale
DPRK-nexus Adversaries Infiltrate 320+ Companies Using GenAI Accelerated Attacks; Threat Actors Exploit AI Agents, Exposing Autonomous Systems as the Next Enterprise Attack Surface

CrowdStrike has released the 2025 Threat Hunting Report, highlighting a new phase in modern cyberattacks: adversaries are operationalising GenAI (Generative Artificial Intelligence) to scale operations and accelerate attacks—and increasingly targeting the autonomous AI agents reshaping enterprise operations. The report reveals how threat actors are targeting tools used to build AI agents—gaining access, stealing credentials, and deploying malware—a clear sign that autonomous systems and machine identities have become a core part of the enterprise attack surface.
2025 Threat Hunting Report Highlights
Based on frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts tracking more than 265 named adversaries, the report reveals:
- Adversaries Weaponise AI at Scale: DPRK-nexus adversary FAMOUS CHOLLIMAused GenAI to automate every phase of its insider attack program. From building fake resumes and conducting deepfake interviews to completing technical tasks under false identities—AI-powered adversary tradecraft is transforming traditional insider threats into scalable, persistent operations. Russia-nexus adversary EMBER BEAR used GenAI to amplify pro-Russia narratives and Iran-nexus adversary CHARMING KITTEN deployed LLM-crafted phishing lures targeting US and EU entities.
- Agentic AI Is the New Attack Surface: CrowdStrike observed multiple threat actors exploiting vulnerabilities in tools used to build AI agents, gaining unauthenticated access, establishing persistence, harvesting credentials, and deploying malware and ransomware. These attacks demonstrate how the agentic AI revolution is reshaping the enterprise attack surface—turning autonomous workflows and non-human identities into the next frontier of adversary exploitation.
- GenAI-built Malware Becomes Reality: Lower-tier eCrime and hacktivist actors are abusing AI to generate scripts, solve technical problems, and build malware—automating tasks that once required advanced expertise. Funklocker and SparkCat are early proof points that GenAI-built malware is no longer theoretical, it is already operational.
- SCATTERED SPIDERAccelerates Identity-Based, Cross-Domain Attacks: The group resurged in 2025 with faster and more aggressive tradecraft—leveraging vishing and help desk impersonation to reset credentials, bypass multifactor authentication, and move laterally across SaaS and cloud environments. In one incident, the group moved from initial access to encryption by deploying ransomware in under 24 hours.
- China-nexus Adversaries Drive Continued Surge in Cloud Attacks: The 2025 Threat Hunting Report found that cloud intrusions rose 136%, with China-linked adversaries responsible for 40% of increased activity, as GENESIS PANDAand MURKY PANDAevaded detection through cloud misconfigurations and trusted access.
“The AI era has redefined how businesses operate, and how adversaries attack. We’re seeing threat actors use GenAI to scale social engineering, accelerate operations, and lower the barrier to entry for hands-on-keyboard intrusions,” said Adam Meyers, Head of Counter Adversary Operations at CrowdStrike, about the results of the 2025 Threat Hunting Report. “At the same time, adversaries are targeting the very AI systems organisations are deploying. Every AI agent is a superhuman identity: autonomous, fast, and deeply integrated, making them high-value targets. Adversaries are treating these agents like infrastructure, attacking them the same way they target SaaS platforms, cloud consoles, and privileged accounts. Securing the AI that powers business is where the cyber battleground is evolving.”
Download the CrowdStrike 2025 Threat Hunting Report.