IBM: AI-Driven Attacks Surge, North America Becomes Primary Target
Context and Chronology
IBM's latest X-Force study documents a measurable shift in attacker tempo and target selection as automation and large-model techniques compress reconnaissance and exploit cycles. X-Force analysts traced nearly one-third of incident responses to North America and identified a 44% year-over-year rise in attacks against public-facing applications — a trend driven by automated vulnerability discovery, credential harvesting and faster exploit development. Identity compromise and cloud-facing misconfigurations now drive incident volume, with defenders struggling to keep pace with programmatic probing and automatic validation steps that turn discovery into weaponized access in hours or days.
The report quantifies industry concentration: manufacturing accounted for roughly 27.7% of global attacks while finance and insurance together represented about 27%. X-Force also highlights infostealer activity that exposed more than 300,000 conversational-platform credentials, underscoring how AI tooling and chat endpoints have become a new credential reservoir for adversaries.
Complementary industry reporting reinforces the pattern and provides concrete operational examples: researchers elsewhere mapped a campaign that commandeered hundreds of perimeter firewall appliances via automated credential stuffing and probe-validation pipelines, and other disclosed vulnerabilities (for example, rapid exploitation of a Fortinet management bug) moved from public disclosure to active targeting in days. Regulators and investigators have also flagged legacy operational technology and supply-chain misconfigurations — from community water systems to aviation integrations — as tangible, high-impact attack surfaces.
For defenders, the X-Force prescription is immediate: elevate identity and access controls, treat AI platforms and connectors as critical infrastructure, and shift from ad hoc patching to continuous asset discovery and remediation. IBM Canada's security lead, Mr. Sicard, frames the change as attacker-driven prioritization of cloud and identity weaknesses, prompting organizations to modernize authentication and accelerate hygiene. Practical mitigations include conditional access and frequent credential audits, hardware-backed multi-factor authentication where possible, inventory and rotation of service tokens, and external attack-surface management tied to prioritized remediation workflows.
Operationally, the broader industry signal is clear: AI and agentic automation are not creating wholly new attack primitives so much as multiplying the scale and speed at which existing weaknesses — weak authentication, exposed management planes, long-lived tokens and CX/platform ingestion blind spots — can be discovered and exploited. Defenders therefore need cross-domain behavioral telemetry that fuses endpoint, identity, cloud and network signals, tighter governance for agentic tools, and containment playbooks that explicitly revoke service and machine identities in addition to human credentials.
The net effect is a narrower window for detection and remediation; organizations that do not elevate identity controls and inventory their AI and CX integrations will face increased account-takeover risk, automated fraud chains and higher operational and regulatory exposure. In this environment, reducing time-to-exploit requires both technical controls (MFA, segmentation, rate-limiting of admin interfaces, inventory and rotation of keys/tokens) and process changes (shorter patch cycles, human-in-the-loop checks for autonomous workflows, and prioritized vulnerability triage tied to business impact).
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
CX platforms enable AI-driven lateral breaches in enterprise stacks
Customer-experience platforms are becoming unmonitored conduits attackers exploit to move laterally into core systems; a recent token theft exposed access across 700+ Salesforce instances and showed that traditional DLP and perimeter controls miss sensitive, free-text disclosures. Defenders must pair CX-layer input hygiene and API gating with identity-first controls — machine-identity inventories, automated rotation and cryptographic attestations — because stale service tokens and non-human credentials are the fastest-growing enablers of lateral movement.

API Attacks Surge as AI Expands the Blast Radius; Wallarm Flags MCP Risk
APIs were the leading exploitation vector in 2025, with Wallarm finding ~11,000 API-related flaws from 60,000 disclosures and CISA data linking APIs to 43% of actively exploited cases. Advances in generative AI and coordinating agents are compressing the time from disclosure to weaponized exploit and amplifying social-engineering value, pushing defenders toward runtime enforcement, behavioral telemetry, and identity-first controls.
US and Global Outlook: AI Is Rewiring Malware Economics and Attack Paths for 2026
Advances in agentic and generative AI are accelerating attackers’ ability to discover vulnerabilities, craft tailored exploits, and scale precise intrusions, while high‑fidelity synthetic media amplifies social‑engineering at industrial scale. Organizations that rely solely on basic hygiene will be outpaced; defenders must combine rigorous fundamentals with identity‑first controls, behavioral detection, and governed AI playbooks to blunt this shift.
U.S. security roundup: AI-enabled attacks rise, 277 water systems flagged, Disney hit with $2.75M fine
Adversaries are increasingly integrating generative models and automated agents into fast-moving attack chains while federal disclosures and vendor research expose concrete infrastructure and supply‑chain gaps—from 277 vulnerable water utilities to a configuration flaw affecting about 200 airports. Regulators and vendors responded with fines, guidance and new attribution frameworks, but rapid exploit timelines and legacy OT constraints mean systemic exposures will persist without accelerated patching, stronger identity controls and tighter vendor oversight.

Amazon: Hackers Used AI to Breach 600+ Firewalls in Weeks
Security teams at Amazon traced a compact, likely Russian‑speaking operation that used widely available AI tooling and automated agents to compromise more than 600 perimeter firewalls across roughly 55 countries in about five weeks. The campaign—which automated reconnaissance, credential validation and rapid probing—typifies a broader 2026 trend in which off‑the‑shelf AI compresses the time from discovery to exploitation, forcing defenders to treat exposed management interfaces and self‑hosted AI endpoints as high‑risk assets.

TELUS study finds North American publics demand inclusion, safety and regulation as AI use surges
A TELUS-commissioned cross-border survey of over 11,000 people in Canada and the U.S. shows widespread AI adoption and strong public expectations that companies solicit input, test for harms before release, and explain AI in plain terms. The results point to a near-consensus in favour of regulatory frameworks and create a strategic imperative for firms to adopt accountable, human-centred AI practices or face reputational and adoption risks.
North Korea-linked hackers deploy AI deepfakes and new malware against crypto and fintech firms
Security researchers attribute a recent surge of tailored intrusions against cryptocurrency, fintech and venture firms to a North Korea-linked cluster that combined AI-generated deepfakes with social engineering to deliver seven distinct malware families. The campaign introduced multiple novel data-harvesting tools, leveraged automated reconnaissance and trusted collaboration channels, and highlights parallel risks from exposed AI endpoints and unvetted plugin ecosystems that amplify attacker scale.
Patch Rush, Penalties and Power Plays: This Week’s Cybersecurity Events
A fast-exploited Fortinet flaw and an agentic-AI vulnerability in ServiceNow forced urgent remediation, while telecoms, a university, and a logistics provider faced data and security crises that drew enforcement and public scrutiny. National agencies issued OT and zero-trust guidance and investors poured $136M into defense-focused software, highlighting shifting incentives toward resilience and regulatory accountability.