The Good Tech Companies - SpyCloud’s 2025 Identity Exposure Report: The Scale And Hidden Risks Of Digital Identity Threats
Episode Date: March 19, 2025This story was originally published on HackerNoon at: https://hackernoon.com/spyclouds-2025-identity-exposure-report-the-scale-and-hidden-risks-of-digital-identity-threats. ... The average corporate user now has 146 stolen records linked to their identity, an average 12x increase from previous estimates, reflecting a surge in holistic Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #spycloud, #cybernewswire, #press-release, #spycloud-announcement, #cyber-security-awareness, #cybersecurity-tips, #good-company, and more. This story was written by: @cybernewswire. Learn more about this writer by checking @cybernewswire's about page, and for more stories, please visit hackernoon.com. SpyCloud’s collection of recaptured darknet data grew 22% in the past year, now encompassing more than 53.3 billion distinct identity records and over 750+ billion total stolen assets. A single corporate user now has an average of 146 stolen records linked to their identity – across 13 unique emails and 141 credential pairs per corporate user. In the consumer realm, the numbers are even higher with 229 records per consumer, frequently including exposed PII.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
SpikeCloud's 2025 Identity Exposure Report, The Scale and Hidden Risks of Digital Identity Threats,
by Cyber Newswire. Austin, Texas, United States, March 19,
2025, Cyber Newswire, asterisk SpikeCloud, the leading identity threat protection company,
today released its 2025 Spy Cloud
annual identity exposure report, highlighting the rise of darknet exposed identity data
as the primary cyber risk facing enterprises today.
As cyber criminals move beyond single data points and leverage stolen data from a number
of sources, breaches, malware and phishes, they are embracing a more sophisticated approach
to identity exploitation, and organizations
must shift their focus to a comprehensive and holistic defense strategy that accounts
forth interconnected nature of digital identities.
Holistic Identity The new cyber battleground organizations have
traditionally focused on securing individual account credentials, but SpikeLoud's research
indicates that cybercriminals have expanded their tactics beyond conventional account takeover. Attackers now have access to extensive identity data from
multiple sources, including data breaches, infestular malware infections, phishing campaigns,
and combolists, posing a challenge for organizations whose security measures have not yet adapted to
address the full scope of interconnected identity exposures holistically. Spycloud's collection of recaptured darknet data grew 22% in the past year, no
encompassing more than 53.3 billion distinct identity records and over 750-plus billion
total stolen assets that are now circulating in the criminal underground, fueling identity-based
cybercrime. These assets are a vast array
of personal and professional credentials, session cookies, personally identifiable information,
P, financial data, IP addresses, national IDs and more that criminals are weaponizing
in attacks against individuals and businesses.
Greater Than The cybersecurity industry has spent years
defending against traditional greater-than-credential-based
threats, but the reality is that attackers have advanced as greater than the data they have access
to has exploded in volume," said Damon Fleury, chief product officer, Spy Cloud.
Identity is the ultimate frontier of cyber risk, greater than with users' exposure across past
and present, personal and professional greater than identity's the new attack surface.
It requires organizations to rethink the greater than risks posed by employees,
consumers, partners and suppliers. Greater than Flurry continues, at Spy Cloud,
we've created holistic identity analytics greater than built on the industry's largest collection
of recaptured darknet data, greater than enabling our customers to correlate disparate data points
that encompass in greater than individuals' digital footprint, providing a truly holistic view of identity
greater than risk. New definition for identity risky merges with the explosion of available
identity data. Attackers can now piece together historical and present-day records to bypass
security barriers. Traditionally, cybersecurity teams were only able to see a fraction of an individual's
darknet exposures, primarily only the exposed assets tied to a corporate identity which
were not comprehensive nor in correlation with other exposures.
SpyCloud's report shows that an individual's identity exposure is more expansive than traditional
cyber risk tools would indicate, in fact, it's a sprawling web of interrelated assets that provide cyber criminals with a roadmap to exploit vulnerabilities and the keys to unlock valuable access.
Of particular concern for businesses, a username or email and its associated password,
per corporate user, which highlights how attackers correlate historical data to uncover active
enterprise access points.
In the consumer realm, the numbers are even higher with 229 records per consumer, frequently
including exposed P such as full names, dates of birth, and phone numbers, as well as social security,
ID numbers, addresses, and credit card or bank information.
Consumer exposure averages 27 unique emails and 227 credential pairs per user.
Greater than, the record-breaking breaches of 2024, including the mother of all breaches
greater than, Moab, and the national public data breach, along with the growing use of greater-than-info stealing malware and crafty phishing campaigns
illustrate just how vast greater than the pool of exposed identity data has become,"
said Trevor Hillegos, Sr., Vice President of Security Research, Spy Cloud Labs at Spy
Cloud.
Greater than, by understanding how cybercriminals aggregate stolen data and the new tactics
greater than in trends they are leveraging to assume even more valuable information and
greater than access, organizations can take proactive steps to mitigate identity-based
greater-than threats from these large underground sources before they escalate.
Additional report findings, 17.
Three billion cookies were recaptured from malware-infected devices, enabling attackers to bypass MFA and
hijack active user sessions.
548 million credentials were exfiltrated via infastealer malware, highlighting the growing
role of stealthy, targeted data theft in enterprise attacks.
3.
1 billion passwords were recaptured in 2024, marking a 125% increase from the previous year.
70% of users whose credentials were exposed in breaches last year reused previously compromised
passwords, significantly increasing their risk of account takeover attacks.
A 9-plus jump from 2023.
44,8 billion PE assets, a 39% increase from 2023 are opening the door for new fraudulent activities.
97% of recaptured phished data logs in 2024, from Popular Phishing as a Service,
PHAAS, platforms like Onyx, included an email address and 64% had an associated IP address,
giving criminals direct opportunities to perpetrate as the user and make lateral movements within an organization.
In the public sector, Spy Cloud recaptured 127k.
Gov credentials and observed a 67% all-time password reuse rate, an increase of 13% over
the previous year, highlighting persistent security risks for our federal agencies and
national security.
Evolving cybersecurity strategies The findings highlight that cybercriminals
are moving well beyond their own legacy tactics and businesses must recognize
that traditional defenses are no longer enough.
SpyCloud's approach leverages holistic identity analytics, powered by the
industry's largest collection of recaptured darknet data, to help organizations
correlate disparate identity elements and shore
up identity threat protection measures, while mitigating risk more effectively.
For further insights, the full 2025 SPY Cloud Identity Exposure Report is available here.
About SPY Cloud SPY Cloud transforms recaptured darknet data to disrupt cybercrime.
Its automated holistic identity threat protection solutions leverage advanced analytics to proactively
prevent ransomware and account takeover, safeguard employee and consumer accounts, and accelerate
cybercrime investigations.
SpyCloud's data from breaches, malware-infected devices, and successful phishes also powers
many popular dark web monitoring and identity theft protection offerings. Customers include seven of the Fortune 10, along with hundreds of global enterprises,
mid-sized companies, and government agencies worldwide.
Headquartered in Austin, Texas, Spy Cloud is home to more than 200 cybersecurity experts
whose mission is to protect businesses and consumers from the stolen identity data criminals
are using to target them now.
To learn more and see insights, users can visit spycloud.com, contact Emily Brown R-E-Q
on behalf of Spy Cloud Spy Cloud at Rec.co.tip This story was distributed as a release by
CyberNewswire under Hacker Noon's business blogging program.
Learn more about the program here.
And thank you for listening to this Hacker Noon story, read by Artificial Intelligence. Visit hackernoon.com to read, write, learn and publish.