The Good Tech Companies - SpyCloud’s 2025 Identity Exposure Report: The Scale And Hidden Risks Of Digital Identity Threats

Episode Date: March 19, 2025

This story was originally published on HackerNoon at: https://hackernoon.com/spyclouds-2025-identity-exposure-report-the-scale-and-hidden-risks-of-digital-identity-threats. ... The average corporate user now has 146 stolen records linked to their identity, an average 12x increase from previous estimates, reflecting a surge in holistic Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #spycloud, #cybernewswire, #press-release, #spycloud-announcement, #cyber-security-awareness, #cybersecurity-tips, #good-company, and more. This story was written by: @cybernewswire. Learn more about this writer by checking @cybernewswire's about page, and for more stories, please visit hackernoon.com. SpyCloud’s collection of recaptured darknet data grew 22% in the past year, now encompassing more than 53.3 billion distinct identity records and over 750+ billion total stolen assets. A single corporate user now has an average of 146 stolen records linked to their identity – across 13 unique emails and 141 credential pairs per corporate user. In the consumer realm, the numbers are even higher with 229 records per consumer, frequently including exposed PII.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. SpikeCloud's 2025 Identity Exposure Report, The Scale and Hidden Risks of Digital Identity Threats, by Cyber Newswire. Austin, Texas, United States, March 19, 2025, Cyber Newswire, asterisk SpikeCloud, the leading identity threat protection company, today released its 2025 Spy Cloud annual identity exposure report, highlighting the rise of darknet exposed identity data as the primary cyber risk facing enterprises today. As cyber criminals move beyond single data points and leverage stolen data from a number
Starting point is 00:00:38 of sources, breaches, malware and phishes, they are embracing a more sophisticated approach to identity exploitation, and organizations must shift their focus to a comprehensive and holistic defense strategy that accounts forth interconnected nature of digital identities. Holistic Identity The new cyber battleground organizations have traditionally focused on securing individual account credentials, but SpikeLoud's research indicates that cybercriminals have expanded their tactics beyond conventional account takeover. Attackers now have access to extensive identity data from multiple sources, including data breaches, infestular malware infections, phishing campaigns,
Starting point is 00:01:16 and combolists, posing a challenge for organizations whose security measures have not yet adapted to address the full scope of interconnected identity exposures holistically. Spycloud's collection of recaptured darknet data grew 22% in the past year, no encompassing more than 53.3 billion distinct identity records and over 750-plus billion total stolen assets that are now circulating in the criminal underground, fueling identity-based cybercrime. These assets are a vast array of personal and professional credentials, session cookies, personally identifiable information, P, financial data, IP addresses, national IDs and more that criminals are weaponizing in attacks against individuals and businesses.
Starting point is 00:01:59 Greater Than The cybersecurity industry has spent years defending against traditional greater-than-credential-based threats, but the reality is that attackers have advanced as greater than the data they have access to has exploded in volume," said Damon Fleury, chief product officer, Spy Cloud. Identity is the ultimate frontier of cyber risk, greater than with users' exposure across past and present, personal and professional greater than identity's the new attack surface. It requires organizations to rethink the greater than risks posed by employees, consumers, partners and suppliers. Greater than Flurry continues, at Spy Cloud,
Starting point is 00:02:34 we've created holistic identity analytics greater than built on the industry's largest collection of recaptured darknet data, greater than enabling our customers to correlate disparate data points that encompass in greater than individuals' digital footprint, providing a truly holistic view of identity greater than risk. New definition for identity risky merges with the explosion of available identity data. Attackers can now piece together historical and present-day records to bypass security barriers. Traditionally, cybersecurity teams were only able to see a fraction of an individual's darknet exposures, primarily only the exposed assets tied to a corporate identity which were not comprehensive nor in correlation with other exposures.
Starting point is 00:03:15 SpyCloud's report shows that an individual's identity exposure is more expansive than traditional cyber risk tools would indicate, in fact, it's a sprawling web of interrelated assets that provide cyber criminals with a roadmap to exploit vulnerabilities and the keys to unlock valuable access. Of particular concern for businesses, a username or email and its associated password, per corporate user, which highlights how attackers correlate historical data to uncover active enterprise access points. In the consumer realm, the numbers are even higher with 229 records per consumer, frequently including exposed P such as full names, dates of birth, and phone numbers, as well as social security, ID numbers, addresses, and credit card or bank information.
Starting point is 00:04:10 Consumer exposure averages 27 unique emails and 227 credential pairs per user. Greater than, the record-breaking breaches of 2024, including the mother of all breaches greater than, Moab, and the national public data breach, along with the growing use of greater-than-info stealing malware and crafty phishing campaigns illustrate just how vast greater than the pool of exposed identity data has become," said Trevor Hillegos, Sr., Vice President of Security Research, Spy Cloud Labs at Spy Cloud. Greater than, by understanding how cybercriminals aggregate stolen data and the new tactics greater than in trends they are leveraging to assume even more valuable information and
Starting point is 00:04:48 greater than access, organizations can take proactive steps to mitigate identity-based greater-than threats from these large underground sources before they escalate. Additional report findings, 17. Three billion cookies were recaptured from malware-infected devices, enabling attackers to bypass MFA and hijack active user sessions. 548 million credentials were exfiltrated via infastealer malware, highlighting the growing role of stealthy, targeted data theft in enterprise attacks. 3.
Starting point is 00:05:19 1 billion passwords were recaptured in 2024, marking a 125% increase from the previous year. 70% of users whose credentials were exposed in breaches last year reused previously compromised passwords, significantly increasing their risk of account takeover attacks. A 9-plus jump from 2023. 44,8 billion PE assets, a 39% increase from 2023 are opening the door for new fraudulent activities. 97% of recaptured phished data logs in 2024, from Popular Phishing as a Service, PHAAS, platforms like Onyx, included an email address and 64% had an associated IP address, giving criminals direct opportunities to perpetrate as the user and make lateral movements within an organization.
Starting point is 00:06:06 In the public sector, Spy Cloud recaptured 127k. Gov credentials and observed a 67% all-time password reuse rate, an increase of 13% over the previous year, highlighting persistent security risks for our federal agencies and national security. Evolving cybersecurity strategies The findings highlight that cybercriminals are moving well beyond their own legacy tactics and businesses must recognize that traditional defenses are no longer enough. SpyCloud's approach leverages holistic identity analytics, powered by the
Starting point is 00:06:38 industry's largest collection of recaptured darknet data, to help organizations correlate disparate identity elements and shore up identity threat protection measures, while mitigating risk more effectively. For further insights, the full 2025 SPY Cloud Identity Exposure Report is available here. About SPY Cloud SPY Cloud transforms recaptured darknet data to disrupt cybercrime. Its automated holistic identity threat protection solutions leverage advanced analytics to proactively prevent ransomware and account takeover, safeguard employee and consumer accounts, and accelerate cybercrime investigations.
Starting point is 00:07:14 SpyCloud's data from breaches, malware-infected devices, and successful phishes also powers many popular dark web monitoring and identity theft protection offerings. Customers include seven of the Fortune 10, along with hundreds of global enterprises, mid-sized companies, and government agencies worldwide. Headquartered in Austin, Texas, Spy Cloud is home to more than 200 cybersecurity experts whose mission is to protect businesses and consumers from the stolen identity data criminals are using to target them now. To learn more and see insights, users can visit spycloud.com, contact Emily Brown R-E-Q on behalf of Spy Cloud Spy Cloud at Rec.co.tip This story was distributed as a release by
Starting point is 00:07:56 CyberNewswire under Hacker Noon's business blogging program. Learn more about the program here. And thank you for listening to this Hacker Noon story, read by Artificial Intelligence. Visit hackernoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.