Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Phishing reclaims the top initial access spot, attackers experiment with AI tools
    Cybersecurity

    Phishing reclaims the top initial access spot, attackers experiment with AI tools

    adminBy adminApril 22, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Phishing reclaims the top initial access spot, attackers experiment with AI tools
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Phishing returned as the leading method attackers used to break into organizations in the first quarter of 2026, accounting for over a third of engagements where initial access could be determined, according to Cisco Talos. It is the first quarter phishing has led the category since Q2 2025, when exploitation of public-facing applications took over following widespread attacks against on-premises Microsoft SharePoint servers.

    That SharePoint exploitation wave, collectively tracked as ToolShell, drove public-facing application exploitation to a peak of 62 percent of engagements. The rate dropped to 18 percent in Q1 2026, a decline Talos attributes to the broad availability of emergency patches and improved detection coverage.

    AI tool used to build credential harvesting page

    One phishing incident this quarter involved a technique Talos had not previously documented in its casework. Attackers targeting a public administration organization used Softr, an AI-powered web application development platform, to build a credential harvesting page that mimicked Microsoft Exchange and Outlook Web Access login screens. The page was built using a form template and a vibe coding feature, requiring no custom code.

    Softr pages can send captured data to external storage such as Google Sheets and trigger email alerts for new entries, also without code. Talos has moderate confidence that malicious actors have used Softr’s platform for similar purposes since at least May 2023, based on Cisco Umbrella data and other telemetry, with usage increasing over time.

    State-sponsored and criminal groups have been observed using large language models to develop phishing lures and malicious scripts. DDoS-as-a-service operators have adopted AI algorithms for attack orchestration. The Softr incident is the first time Talos documented a specific AI tool being used in a confirmed phishing engagement.

    Public administration targeted for third consecutive quarter

    Public administration and healthcare each accounted for 24 percent of all engagements, tying as the most targeted sectors. Public administration has held the top position since Q3 2025. Organizations in that sector frequently run legacy systems, operate with limited security budgets, handle sensitive data, and have low tolerance for downtime, making them attractive to both financially motivated attackers and espionage-focused groups.

    Crimson Collective makes its first appearance in Talos casework

    Talos responded to its first engagement involving Crimson Collective, a cyber extortion group that emerged in September 2025. The incident began when a GitHub Personal Access Token was accidentally published on a public-facing website, exposing the organization for several months.

    After gaining access, the attacker used TruffleHog, a legitimate open-source secrets scanning tool, to search thousands of GitHub repositories for credentials and sensitive data. The discovered client secrets enabled access to the victim’s Azure cloud storage, where the attacker used Microsoft Graph API calls to authenticate, enumerate, and exfiltrate data. The attacker also attempted to inject malicious code into multiple GitHub repositories designed to harvest any secrets committed in the future. Expired secrets and existing security controls limited the damage.

    Talos attributes the activity to Crimson Collective based on IP addresses associated with the group that were used to scan the victim’s ASA firewalls, along with overlap with publicly reported Crimson Collective tactics and techniques.

    MFA weaknesses remained the top security gap

    MFA weaknesses appeared in 35 percent of engagements this quarter, up from the prior quarter. Attackers bypassed MFA by registering new devices to compromised accounts and, in one case, configuring an Outlook client to connect directly to an Exchange server, sidestepping Duo MFA requirements entirely.

    phishing initial access 2026

    Vulnerable or exposed infrastructure appeared in 25 percent of engagements. Exploited weaknesses included CVE-2025-20393 in Cisco Secure Email Gateway and CVE-2023-20198 in Cisco IOS XE, along with exposed WinRM management ports accessible from the internet.

    Insufficient logging affected 18 percent of engagements, limiting investigators’ ability to reconstruct attacker activity. Talos recommends deploying a SIEM for centralized log storage so that logs deleted or modified on individual hosts remain available for forensic review.

    Pre-ransomware activity made up 18 percent of engagements. No ransomware encryption occurred this quarter due to early containment. Talos assesses with moderate confidence that Rhysida and MoneyMessage ransomware were involved in two of those engagements.

    Webinar: The True State of Security 2026

    access attackers experiment Initial Phishing reclaims spot tools Top
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleWhat Multi-Location Brands Must Do
    Next Article How to Build a WooCommerce Sales Funnel That Converts
    admin
    • Website

    Related Posts

    Microsoft releases emergency patches for critical ASP.NET flaw

    April 22, 2026

    Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster

    April 22, 2026

    Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023

    April 22, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    10 Tactics That Actually Work

    April 22, 2026

    Most Pixel owners are ignoring one of the phone’s strangest built-in sensors

    April 22, 2026

    How to Build a WooCommerce Sales Funnel That Converts

    April 22, 2026

    Phishing reclaims the top initial access spot, attackers experiment with AI tools

    April 22, 2026
    Categories
    • Blogging (67)
    • Cybersecurity (1,443)
    • Privacy & Online Earning (176)
    • SEO & Digital Marketing (878)
    • Tech Tools & Mobile / Apps (1,730)
    • WiFi / Internet & Networking (238)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    10 Tactics That Actually Work

    April 22, 2026

    Most Pixel owners are ignoring one of the phone’s strangest built-in sensors

    April 22, 2026

    How to Build a WooCommerce Sales Funnel That Converts

    April 22, 2026
    Most Popular
    • 10 Tactics That Actually Work
    • Most Pixel owners are ignoring one of the phone’s strangest built-in sensors
    • How to Build a WooCommerce Sales Funnel That Converts
    • Phishing reclaims the top initial access spot, attackers experiment with AI tools
    • What Multi-Location Brands Must Do
    • Gboard – the Google Keyboard (Wear OS) 5.2.03.872026769 APK Download by Google LLC
    • Microsoft releases emergency patches for critical ASP.NET flaw
    • Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.