ConnectWise
;

3/11/2026 | 15 Minute Read

10 common cybersecurity threats and attacks

Topics:

Contents

    The 2026 MSP Threat Report

    Key takeaways

    • Cybercrime is escalating, with projected global costs reaching $13.82 trillion by 2028. Staying ahead of threats is essential for IT teams.
    • Major cyberthreats for 2026 include ransomware and double extortion, identity threats, VPN compromise, living-off-the-land attacks, supply chain attacks, trojanized software, social engineering attacks, AI-enabled phishing, defense evasion, and backup and recovery infrastructure attacks.
    • Ransomware surged in 2025, with attackers prioritizing speed, disruption, and data extortion over stealth.
    • Identity abuse, social engineering, and trusted tool misuse replaced exploits as the most common paths to compromise.
    • MSPs must shift defenses earlier in the attack lifecycle to detect access abuse before impact occurs. 

    $13.82 trillion dollars. That’s the projected annual cost of global cybercrime by the year 2028. However, with cybercriminals constantly sharpening their skills and honing new attacks, the actual cost could easily be much higher.

    You need to attack potential digital threats from many angles. Remaining up to date on industry trends and the latest hacker tactics, techniques, and procedures (TTPs) is one of the simplest ways to know what you’re up against and stay protected.

    The impact of cybersecurity attacks

    According to Cybersecurity Ventures, if annual cybercrime were a country, it would have the third-largest gross domestic product (GDP) worldwide after the United States and China. These staggering statistics underscore the alarming reality that cybercriminals have turned data into valuable currency.

    In 2025, researchers uncovered what is believed to be one of the largest data exposures on record, with billions of credentials leaked through infostealer malware campaigns. The data, aggregated from thousands of compromised systems, highlighted how credential theft at a massive scale can silently fuel account takeovers, ransomware, fraud, and downstream attacks across countless organizations.

    A 2025 cyberattack on Jaguar Land Rover was estimated to have cost the British economy £1.9 billion (US$2.5 billion), making it one of the most economically damaging cyber incidents in UK history. The attack halted vehicle production for weeks and triggered widespread delays across JLR’s supply chain, demonstrating how a single cyber event can cascade into large-scale operational disruption, third-party impact, and long-term financial loss.

    Together, these incidents highlight how cyberattacks are growing not only in frequency but in scale and consequence. Staying informed about industry trends and the latest TTPs employed by hackers is a fundamental step in ensuring your protection. To help with this, we’ve compiled a list of the 10 most common cybersecurity threats you’re likely to face in 2026 and what you can do to protect against them. 

    Cybersecurity threats and attacks to watch for in 2026

    1. Ransomware and data extortion

    Ransomware remains one of the most disruptive and financially damaging cyberthreats. In 2025, ransomware activity surged to record levels, reversing earlier declines and peaking in the fourth quarter. Looking ahead, Cybersecurity Ventures predicts that global ransomware damage costs will reach $250 billion annually by 2031, with a new attack every two seconds as perpetrators progressively refine their malware payloads and related extortion activities.

    Rather than relying on novel exploits or custom malware, attackers increasingly focused on speed, access, and operational disruption. For many threat actors, ransomware is the endgame. Successful ransomware operations typically follow earlier access gained through identity abuse, remote access compromise, or user-mediated execution. Once attackers secure reliable access, they move quickly to maximize impact before defenders can respond.

    Many threat actors have expanded their ransomware game to include data theft and extortion, a technique known as double extortion. Attackers increasingly exfiltrate data early in the intrusion lifecycle and use leak sites as a primary negotiating tool, shortening timelines and limiting defenders’ ability to respond before impact.

    As we mentioned in our 2025 MSP Threat Report, data extortion as a standalone strategy has also been growing. In Q4 2025, the Cl0p ransomware gang exploited an Oracle E-Business Suite 0-day to steal data from dozens of organizations and then threatened to leak the stolen data unless a ransom was paid. Recent reports show data extortion incidents increased 11X in 2025

    2025 ransomware example

    In 2025, DaVita, a major US healthcare provider, disclosed a ransomware attack that disrupted internal systems and forced the organization to isolate affected environments while remediation was underway. Although patient care continued, the incident required rapid containment and system restoration to maintain operations. Public reporting showed attackers moved quickly once access was established, prioritizing disruption over stealth.

    How to defend against ransomware

    Defending against ransomware requires focusing on both prevention and recovery. Managed service providers (MSPs) and IT teams must disrupt attackers earlier in the attack lifecycle while ensuring they can restore operations even when prevention fails.

    • Early access detection
      Detect abnormal identity behavior, privilege escalation, and lateral movement before ransomware deployment occurs. 
    • Endpoint and network visibility
      Monitor for suspicious execution behavior, credential harvesting, and data exfiltration that often precede encryption. 
    • Incident response readiness
      Establish clear response procedures to contain compromised systems quickly and limit blast radius.
    • Backup protection and resilience
      Secure backup infrastructure against tampering and deletion, and ensure backups are isolated, immutable, and regularly tested. 
    • Recovery planning and testing
      Validate recovery processes regularly to ensure rapid restoration of systems and data without paying ransoms.

    2. Identity threats

    Identity threats, also referred to as identity-based attacks, occur when attackers gain access by abusing legitimate credentials, authentication tokens, or trusted user identities rather than exploiting software vulnerabilities or deploying malware. These attacks have emerged as one of the most prevalent and consequential attack patterns today.

    In 2025, attackers didn’t break in; they logged in. Valid usernames and passwords, stolen session tokens, and compromised identity credentials provided threat actors with immediate access to environments that appeared legitimate to security tools. Once authenticated, malicious activity is often blended into normal user behavior, bypassing traditional perimeter and endpoint defenses.

    How to defend against identity threats

    Defending against identity abuse requires shifting focus from blocking payloads to continuously validating access. MSPs and IT teams should treat identity as a core security control plane and apply layered defenses to reduce the risk of credential abuse.

    Key defensive measures include:

    • Strong identity and access management 
      Enforce least-privilege access and remove standing administrative rights wherever possible.
    • Continuous authentication monitoring 
      Monitor for abnormal login behavior, geographic anomalies, and privilege escalation attempts.
    • Privileged access management 
      Control how administrative access is granted, elevated, and audited to limit the blast radius of compromised credentials.

    3. VPN compromise

    VPN compromise remains one of the most reliable and repeatable ways attackers gain access. As organizations expanded hybrid work and third-party access, VPNs became high-value targets, especially when paired with weak authentication, inherited configurations, or delayed patching.

    2025 VPN compromise example

    One of the most impactful examples observed in 2025 involved the exploitation of SonicWall SSL VPN infrastructure. This vulnerability allowed attackers to log in with valid credentials even when MFA was enabled. Several of these incidents resulted in full domain compromise in under two hours.

    How to defend against VPN compromise

    • Secure remote access configurations
      Many EDR vendors provide tamper protection that can help prevent unauthorized users from disabling or modifying EDR settings. Ensure that tamper protection is enabled for all endpoints, and regularly review the settings to confirm they haven’t been changed without your knowledge. Implement and monitor alerts for any changes made to tamper protection settings.
    • Strong authentication controls 
      Enforce modern, phishing-resistant MFA and avoid authentication methods vulnerable to replay or fatigue attacks.
    • Access scope limitation 
      Apply role-based access control to ensure users and administrators can access only the systems and functions required for their role. Limit remote access privileges by default and remove standing access wherever possible to reduce lateral movement and the impact of compromised credentials.
    • Timely patching and lifecycle management 
      Ensure remote access infrastructure is consistently patched and legacy appliances are retired before they become liabilities.
    • Log monitoring and detection with security information and event management (SIEM)
      Continuously monitor VPN authentication logs, session activity, and configuration changes using a SIEM. Correlating VPN events with identity, endpoint, and network telemetry helps detect abnormal login behavior, suspicious access patterns, and early signs of lateral movement before attackers can escalate or deploy follow-on payloads.

    4. Living-off-the-land attacks

    Living-off-the-land (LotL) attacks are a class of cyberattacks in which threat actors abuse legitimate system tools, administrative utilities, and trusted software already present in the environment to carry out malicious activity. Rather than introducing custom malware, attackers “live off” the tools defenders already trust.

    In MSP environments, living-off-the-land attacks often involve the abuse of RMM solutions and remote access tools. Once attackers gain access, these trusted tools allow them to execute commands, deploy payloads, disable security controls, and move laterally while appearing indistinguishable from legitimate IT activity.

    2025 LotL attack example

    In mid-2025, the SharePoint ToolShell campaign highlighted how modern attackers combine initial access with living-off-the-land techniques to remain stealthy. After exploiting weaknesses in on-premises Microsoft SharePoint servers to gain execution, threat actors relied primarily on legitimate system tools and built-in Windows binaries to persist, move laterally, and evade detection. By operating almost entirely through trusted utilities already present in the environment, the attackers blended into normal administrative activity, making the intrusion difficult to detect until follow-on actions occurred.

    How to defend against living-off-the-land attacks

    • Execution behavior monitoring 
      Monitor command execution, script usage, and process behavior for patterns that deviate from normal administrative activity.
    • Application and script control
      Restrict which tools can execute scripts or elevated commands and enforce execution policies for PowerShell and similar utilities.
    • Least-privilege enforcement
      Limit who can run administrative tools and reduce standing privileges to minimize misuse of trusted utilities.
    • User awareness and execution controls
      Educate users on execution-based social engineering techniques and limit the ability of non-administrative users to execute commands.

    5. Supply chain attacks

    Supply chain attacks occur when threat actors compromise trusted software, vendors, or update mechanisms to gain indirect access to downstream environments. Instead of attacking organizations directly, attackers target the tools, services, and dependencies that those organizations already trust and rely on.

    2025 supply chain attack example

    In September 2025, CISA released an alert regarding a “widespread software supply chain compromise involving the world’s largest JavaScript registry, npmjs.com.” By injecting backdoors into trusted JavaScript libraries, threat actors were able to impact thousands of developers and organizations that unknowingly pulled the compromised packages into their applications through routine dependency updates.

    How to defend against supply chain attacks

    • Vendor risk awareness
      Maintain a clear understanding of third-party software dependencies across client environments by tracking which vendors, packages, and services are in use. Leveraging a software bill of materials (SBOM) helps identify upstream components, prioritize monitoring for high-risk vendors, and quickly assess exposure when new supply chain vulnerabilities or compromises are disclosed.
    • Application governance and validation
      Maintain clear inventories of approved software and continuously validate the integrity and behavior of applications after installation, not just before deployment.
    • Endpoint monitoring and behavior analysis
      Continuously monitor endpoints for abnormal process behavior, suspicious child processes, unexpected persistence mechanisms, and unusual network connections following software installation or updates.

    6. Trojanized software and potentially unwanted programs (PUPs)

    Trojanized software and potentially unwanted programs (PUPs) refer to legitimate-looking applications or installers that have been modified, bundled, or repurposed to perform malicious actions once executed. Unlike traditional malware, these programs often appear trusted, signed, or commonly used, allowing them to bypass security controls and gain a foothold inside IT environments.

    2025 trojanized software example

    In 2025, researchers identified EvilAI, a trojanized application posing as a legitimate AI tool. Once installed, the software abused trusted system components to execute malicious code, establish persistence, and communicate externally while evading detection. By leveraging interest in AI tools, attackers increased the likelihood of installation and bypassed traditional security controls, highlighting how trojanized software can blend into normal activity within MSP-managed environments.

    How to defend against trojanized software and PUPs

    • Application control and safelisting
      Define which applications are permitted to run and review exceptions carefully, especially for installers, updaters, and bundled software.
    • Endpoint monitoring and behavior analysis
      Monitor for abnormal behavior following software installation, including unexpected child processes, persistence mechanisms, and suspicious network connections.
    • Installer and update scrutiny
      Inspect installers and update packages for unexpected execution patterns or privilege escalation during and after installation.
    • User and technician awareness
      Educate both end users and IT staff on the risks associated with bundled software and unnecessary utilities, and discourage the installation of unapproved tools.

    7. Social engineering attacks 2.0

    Social engineering attacks exploit human behavior rather than technical vulnerabilities, using deception, trust, and urgency to manipulate users into taking actions that benefit attackers. These attacks remain one of the most effective and adaptable tactics because they bypass traditional security controls by targeting the decision-making process of users instead of systems.  

    In modern environments, social engineering has evolved beyond simple phishing emails. Attackers now focus on inducing users to authenticate, approve access, or manually execute commands using trusted tools and workflows. This shift has made social engineering a primary driver of initial access in many 2025 intrusion campaigns, especially when combined with user-mediated execution techniques.

    2025 social engineering attack example

    Throughout 2025, ClickFix attacks emerged as one of the most reliable and repeatable initial access methods observed across multiple intrusion campaigns. Rather than relying on exploitation or malicious attachments, ClickFix attacks manipulate users into manually executing attacker-provided commands under the pretense of routine verification steps, CAPTCHAs, browser prompts, or security-related actions.  

    ClickFix does not represent a single lure or campaign style, but a general execution pattern that can be adapted to different themes, interfaces, and delivery contexts. Variants such as FileFix reframed manual execution as a required step to open or repair a downloaded document, while ConsentFix extended the same copy-and-paste social engineering model into browser-based identity workflows by abusing legitimate OAuth consent and authorization flows within the browser rather than delivering endpoint malware. 

    How to defend against social engineering

    • Execution control and restriction
      Limit the ability for users to execute scripts or elevated commands, particularly through command-line tools and scripting engines.
    • Execution visibility and endpoint behavior monitoring
      Enable PowerShell script block logging to capture executed commands and scripts, including those launched through copy-and-paste social engineering. Use a SIEM to centralize and correlate this data with endpoint telemetry, monitoring for abnormal process chains, suspicious child processes, unexpected persistence mechanisms, and misuse of trusted system utilities following user interaction.
    • Least-privilege enforcement
      Ensure users operate without administrative privileges by default to reduce the impact of accidental or manipulated execution. 

    8. AI-enabled phishing attacks

    While phishing has long been a core social engineering technique, the introduction of AI has fundamentally changed its impact. AI-enabled phishing attacks allow threat actors to rapidly generate convincing lures at scale, closely mimicking legitimate users, communications, and workflows. As a result, phishing has become more accessible, more effective, and more difficult to detect, justifying its treatment as a distinct threat category.

    How to defend

    • Advanced email and communication security
      Filter and analyze inbound messages across email and collaboration platforms for impersonation, spoofing, and anomalous language patterns.
    • User education focused on trust manipulation
      Train users to recognize requests that create urgency, bypass normal workflows, or prompt manual execution or credential entry.

    9. Defense evasion

    Defense evasion refers to the tools and techniques attackers use to bypass, disable, or degrade cybersecurity defenses to operate undetected. In modern attacks, it is a deliberate and early-stage objective designed to blind defenders before more disruptive actions occur.

    2025 defense evasion example

    The Defendnot, an EDR Killer, represented one of the most advanced examples of defense evasion observed in 2025. The malware was specifically engineered to bypass modern security controls, including runtime attestation and kernel-level integrity checks that are designed to detect tampering and unauthorized behavior. By operating below traditional detection thresholds, Defendnot was able to persist and execute without triggering alerts from endpoint protection tools. 

    How to defend against defense evasion

    • Enable tamper protection in endpoint detection and response (EDR)
      Many EDR vendors provide tamper protection that can help prevent unauthorized users from disabling or modifying EDR settings. Ensure that tamper protection is enabled for all endpoints, and regularly review the settings to confirm they haven’t been changed without your knowledge. Implement and monitor alerts for any changes made to tamper protection settings.
    • Add SIEM as an additional layer of protection
      Use a SIEM to monitor EDR logs and configuration change events across all endpoints. Centralized log monitoring helps identify gaps in reporting, sudden loss of EDR visibility, or suspicious changes that may indicate attempts to disable or evade endpoint protection, even if the EDR agent itself is impacted.
    • Block vulnerable drivers
      Bring-your-own-vulnerable-driver (BYOVD) based tools are a popular choice for bypassing EDR. Consider blocking drivers that aren’t installed in your environment or creating a safelist for only necessary drivers. Be sure to also review and update the list based on any changes in your environment or new threat intelligence.

    10. Backup and recovery infrastructure attacks

    Backup and recovery systems have become prime targets for attackers seeking to maximize impact and extortion leverage. Rather than encrypting endpoints alone, modern ransomware operators increasingly attempt to disable, delete, or corrupt backups early in the attack lifecycle to prevent recovery.

    How to defend against backup and recovery attacks

    • Backup isolation and access control
      Restrict backup system access, remove standing administrative privileges, and monitor for unauthorized configuration changes.
    • Immutable backups and recovery testing
      Enforce immutability to prevent deletion or encryption of backups, and routinely test restoration processes to ensure recovery remains possible during an incident.

    General cybersecurity best practices for MSPs in 2026

    Here are a few best practices you can follow internally to minimize the chances of one of these attacks infiltrating your clients’ systems:

    • Stay proactive: Remain ahead of the curve when it comes to hacker and cyberattack education, client system updates, and anything else that’s within your grasp. Planning ahead and being prepared are two of the most critical steps in protecting clients’ digital assets.
    • Implement audits: Keep track of any system changes for clients, attacks you’ve dealt with, etc. You’ll be able to avoid any mistakes and continually improve your offerings for clients.
    • Use enterprise-grade software: ConnectWise can help with this. We have a full suite of products to help you give your clients the exact service and protection they need.
    • Keep clients in the loop: Have open lines of communication with your clients. Even in the event of drastic errors, breaking the news right away is always the best course of action. You and your client can work together to get in front of the issue. By not saying anything, you may turn a minor issue into a much bigger problem.
    • Train your staff often: Your team should constantly be renewing their training on cybersecurity trends and news, as well as on your internal company policies and procedures. This way, they’re both knowledgeable about their craft and able to follow company SOPs to provide premium customer service.

    As always, ConnectWise is here to help with a variety of cybersecurity solutions for MSPs. Request a demo of our cybersecurity suite or talk to a cybersecurity expert today to see how we can help you protect your business and your clients. 

    FAQs

    What are the biggest cybersecurity threats right now (2025)?

    The top 10 cybersecurity threats right now are:

    1. Ransomware
    2. Vulnerabilities
    3. Defense evasion
    4. Drive-by compromise
    5. Phishing attacks
    6. Malware
    7. DDoS attacks
    8. Supply chain attacks
    9. Insider threats
    10. Business email compromise

    How many cybersecurity attacks are there per day?

    There is a cyberattack every 39 seconds, according to a 2007 Clark School study at the University of Maryland. This translates to roughly 2,215 cyberattacks per day.

    How can I protect against cybersecurity attacks?

    There are several steps you can take to protect yourself against cyberattacks:

    • Keep your software up to date. Make sure your operating system, web browser, and other software are regularly updated with the latest security patches.
    • Use strong passwords. Choose unique and complex passwords that are difficult to guess. Consider using a password manager to store your passwords securely.
    • Enable two-factor authentication. This adds an extra layer of security by requiring a second form of identification, such as a code sent to your phone, in addition to your password.
    • Be careful with email attachments. Don’t open attachments from unknown senders or suspicious emails. Cybercriminals often use phishing scams to trick you into opening a malicious attachment.
    • Use antivirus software. Install and regularly update antivirus software on your computer to protect against viruses, malware, and other threats.
    • Backup your data. Regularly back up your important files and data to an external hard drive or cloud storage service.
    • Educate yourself. Stay informed about the latest cyberthreats and learn how to recognize and avoid them.

    What is DoS vs DDoS?

    Denial of service (DoS) and distributed denial of service (DDoS) are both types of cyberattacks that aim to disrupt the availability of a targeted system or network. In a DoS attack, the attacker overwhelms the target with a flood of traffic or requests, rendering it unable to respond to legitimate users. This is typically achieved by exploiting vulnerabilities in the target’s infrastructure or by consuming its resources, such as bandwidth or processing power.

    On the other hand, a DDoS attack involves multiple compromised devices forming a botnet to launch the attack simultaneously. These devices, often referred to as “zombies,” are controlled remotely by the attacker. By coordinating the attack from multiple sources, the attacker can generate an even larger volume of traffic or requests, making it more challenging for the target to mitigate the attack.

    The key difference between DoS and DDoS attacks lies in the number of sources used to overwhelm the target. While a DoS attack originates from a single source, a DDoS attack leverages multiple sources, making it more difficult to defend against. DDoS attacks are often more powerful and can cause more significant disruptions due to the increased volume of traffic or requests involved.

    Related Articles