Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»The Blast Radius Problem: Stolen Credentials Are Weaponizing Agentic AI
    Cybersecurity

    The Blast Radius Problem: Stolen Credentials Are Weaponizing Agentic AI

    adminBy adminFebruary 25, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Threat Hunting
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Weak access controls, AI confusion, and the interconnection of business continue to expand Threat.

    More than half (56%) of the 400,000 vulnerabilities IBM X-Force tracked in 2025 required no authentication before exploitation. This is revealed in the X-Force 2025 Threat Intelligence Index. The report also highlights the continuing success of infostealer credential theft, pointing to the discovery of 300,000 ChatGPT credentials on the dark web (almost certainly stolen by infostealers).

    Clearly, more effective access control is required at the base. But the entire threat ecosystem is being complicated by the complexity of artificial intelligence, which is being used as a force multiplier by attackers. While it can and is being used to provide visibility for defenders, it also complicates other threat areas and increases the overall threat surface. 

    AI helps attackers find weak access points; it provides compelling deepfakes that assist in the theft of credentials as well as performing immediate scams. And defensive use of agentic AI can also be harnessed by attackers. If credential theft gains API keys into in-house agentic AI, the blast radius of a compromise expands beyond the traditional data theft to potential control of the whole system.

    X-Force also notes a fourfold increase in supply chain or third party breaches over the last five years. This is continuing. “I think the Shai-Hulud NPM compromise from last year was a big one that really opened organizations’ eyes to this particular threat,” Michelle Alvarez, manager at X-Force Threat Intelligence, told SecurityWeek. 

    “We’ve been talking about supply chain attacks and their significance for several years now,” she continued. “And I was quite surprised how many major supply chain compromises we saw last year.”

    Advertisement. Scroll to continue reading.

    The report writes, “Adversaries increasingly exploited developer trust and identity integrations to steal credentials, pivot into cloud environments and maintain persistence across interconnected systems. Sprawling third party dependencies create hard to secure attack surfaces – where one weak link can expose many targets. Once largely confined to nation state actors, these supply chain attack techniques are now being adopted by financially motivated and other criminal threat groups, reflecting a clear trickle down of advanced tactics.”

    [ Learn More at SecurityWeek’s Supply Chain Security Virtual Summit ]

    This introduces another related element to the mix – the continuing blurring between financially-motivated criminals and elite state-sponsored attackers. Criminals are using more advanced techniques, but they largely remain smash-and-grab merchants: get in, steal for monetary gain, and get out quickly. State actors are espionage-motivated: enter quietly, lay low, persist as long as possible, and exfiltrate information quietly.

    “This is a parallel theme to everything else,” commented Alvarez. “The importance here is that ‘blurring’ means you don’t see it – you don’t know what you’re defending against. You may detect some commonly used commodity malware, assume a criminal attack, nullify the malware and think everything is fine. But if it’s a nation state, they may remain hidden for a very long time.”

    The importance of the report, she says, is that it counters a natural tendency to look at specific threats in isolation. “It’s when we start to look across the different and parallel trends, that we really start to see the big picture.”

    Understanding the threat is important, but not helpful without a solution. Alvarez effectively mirrors Sun Tzu’s approach: ‘If you know the enemy and know yourself, you need not fear the result of a hundred battles.’

    “When we speak to clients,” she said, “we think about what industry they are in, where are they operating geographically, what is their attack surface. Each organization has a role in identifying their own critical infrastructure and being able to protect that.” Knowing yourself means understanding what you have that the enemy wants, your brand exposure, any credentials being sold on the dark web, your attack surface, what your attack profile looks like, and which threat actors are likely to target you.

    Knowing the enemy that is likely to target you is understanding who they are, the footprint they leave, their TTPs, etcetera; and being able to recognize and expel them.

    The X-Force threat report helps in this by demonstrating that threats should not be considered in isolation – they are not merely isolated parallel threats but often sequentially linked threats leading to a compromise. Not requiring access authentication bypasses most of the other threats. But even if the door is closed it can be opened by stolen credentials. Stealing credentials and using them is exacerbated by AI, which also increases the threat surface, expands the blast radius, and often allows wider supply chain attacks.

    Finding your credentials on the dark web is a signal of a pending attack, facilitated by AI and possibly your own agentic systems, and potentially widening into a large-scale supply chain or third party dependency attack.

    Related: Autonomous AI Agents Provide New Class of Supply Chain Attack

    Related: Cybercriminals Trade 183 Million Stolen Credentials on Telegram, Dark Forums

    Related: New ‘Sandworm_Mode’ Supply Chain Attack Hits NPM

    Related: Cyber Insights 2026: Cyberwar and Rising Nation State Threats

    agentic blast Credentials Problem Radius stolen Weaponizing
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleOpenAI COO says ChatGPT ad rollout will be “iterative”
    Next Article Best Samsung Galaxy S26 cases
    admin
    • Website

    Related Posts

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026

    Vercel confirms breach as hackers claim to be selling stolen data

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026

    The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners

    April 20, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,403)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,686)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    I replaced my entire streaming setup with a $30 device and free apps

    April 20, 2026

    Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games

    April 20, 2026

    The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon

    April 20, 2026
    Most Popular
    • I replaced my entire streaming setup with a $30 device and free apps
    • Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games
    • The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon
    • The best robot vacuum in Australia: reliable, effective, effort-free automated cleaners
    • Monitor spec sheets hide the one thing that actually decides whether a display feels premium
    • Apple account change alerts abused to send phishing emails
    • Apple AirPods Pro 3 review: A masterclass in sound, a lesson in lock-in
    • Samsung Galaxy S23 Ultra versus vivo X300 Ultra
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.