SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsIdentity-based attacks have emerged as the dominant threat vector in modern cybersecurity.

Identity-based attacks have emerged as the dominant threat vector in modern cybersecurity, accounting for 60% of cyber incidents in 2024. What began as simple password compromises and social engineering has evolved into sophisticated campaigns targeting the very foundation of organizational security: digital identity.
In the past year alone, 90% of organizations experienced at least one identity-related incident, and 37% of surveyed organizations reported that stolen credentials resulted in a breach, making poorly managed credentials the second-leading cause of breaches in 2024.
This blog examines the intersection of identity attacks with Zero Trust architectures, and the emerging threats that organizations face today. As traditional perimeter-based security models collapse under the weight of cloud adoption and remote work, attackers have adapted their techniques to exploit the new reality: machine identities now outnumber human identities 82:1, with AI projected to be the largest creator of new privileged identities and sensitive access by 2025.
Today's identity-based attacks demonstrate unprecedented sophistication. According to CrowdStrike, 79% of cyber intrusions in 2024 were malware-free, as attackers increasingly leveraged legitimate remote management and monitoring tools to bypass traditional security measures.
The modern threat landscape includes:
2024 also saw an unprecedented rise in infostealers, which played a huge role in attacks on Snowflake customers, where 80% of the accounts were targeted using credentials found in infostealer infections.
Zero Trust emerged as a security model based on the principle "never trust, always verify." It recognizes that traditional network security models trust anyone and anything inside the network, while Zero Trust architecture assumes no user, device, or application should be trusted by default.
This model was developed to address the reality that threats can come from anywhere—both outside and inside the network perimeter.
Not surprisingly, while Zero Trust was designed to mitigate identity-based risks, it has also created new attack vectors:
Identity-based segmentation provides flexible and effective access control, as it is tied directly to the identity of the user or device rather than static network boundaries. However, this creates new opportunities for attackers who successfully compromise identities to move laterally across supposedly segmented environments.
As organizations adapt to changing business needs and well-intentioned exceptions to security policies pile up like digital debt, policy drift occurs. These incremental compromises create vulnerabilities that attackers love to exploit.
Zero Trust implementations often rely on multiple identity providers and cloud services, creating complex webs of trust relationships that attackers can exploit through supply chain attacks.
Zero Trust isn't a project with a completion date—it's a continuous cycle. The "never trust, always verify" principle demands constant vigilance because the threats constantly change, technology stacks evolve, and organizations never stop shifting and growing.
This continuous evolution also means that attackers are constantly probing for new weaknesses in identity implementations, making Zero Trust a moving target for both defenders and attackers.
Several Advanced Persistent Threat (APT) groups have made identity attacks their primary focus:
Russian state-sponsored ATP groups have shifted from destructive wiper malware to spear-phishing campaigns. The Ukrainian Computer Emergency Response Team (CERT) responded to over 1,700 phishing attacks in 2023, including distributing malware, harvesting credentials, and extortion.
North Korea-aligned groups such as DeceptiveDevelopment expanded financially motivated attacks, significantly broadening its targeting using fake job listings primarily within the cryptocurrency, blockchain, and finance sectors.
Modern APT groups employ sophisticated techniques:
Adversaries like FAMOUS CHOLLIMA now use generative AI to supercharge insider threats and social engineering. This represents a fundamental shift in the threat landscape where AI tools democratize sophisticated attack techniques.
The Change Healthcare incident represents one of the most devastating identity-based attacks in healthcare history. The ALPHV/BlackCat ransomware group gained access through compromised credentials, then moved laterally through the network. The attack paralyzed operations for over 67,000 pharmacies and affected more than 100 million individuals.
Key Identity Failures:
The Snowflake breach exemplifies the new reality of interconnected cloud ecosystems. Threat actors leveraged Lumma Stealer, a credential-stealing malware, to gain access to a compromised Snowflake sales engineer's account. This single compromise led to data exposure for major organizations like Santander Bank and Ticketmaster.
Affected Organizations and Impact:
Root Cause: Security investigations revealed that the attackers accessed customer environments by exploiting stolen credentials obtained via infostealer malware, often lacking MFA protection. This allowed attackers to log directly in to Snowflake instances.
ARUP's $25 Million Deepfake Scam demonstrated the evolution of identity attacks into the physical realm. Cybercriminals used sophisticated deepfake video calls to impersonate executives and authorize fraudulent financial transactions. This attack highlights how identity verification must now account for AI-generated impersonation.
MFA remains a critical defense, but its implementation varies significantly in effectiveness:
Traditional MFA Approaches:
SMS MFA Vulnerabilities: The cybersecurity community has increasingly recognized the weaknesses in SMS-based MFA. In December 2024, the FBI and CISA advised Americans to avoid SMS codes for MFA. The CISA Mobile Communications Best Practices Guidance bluntly stating: "Do not use SMS as a second factor for authentication."
Specific SMS Risks:
Recommended Alternatives:
ISPM represents the next evolution in identity security, moving beyond traditional identity and access management (IAM) to continuous monitoring and risk assessment.
ISPM strengthens and maintains the security posture of an organization's identity infrastructure to prevent breaches. It involves monitoring and analyzing identities, access rights, and authentication processes across the entire ecosystem.
The ISPM market is projected to grow from $13.7 billion in 2024 to $33.1 billion by 2029, at a 19.3% Compound Annual Growth Rate (CAGR).
Core ISPM Capabilities:
Key Components:
Passwordless Authentication: Organizations are moving toward eliminating passwords entirely through technologies like:
Behavioral Analytics: Modern identity protection incorporates user and entity behavior analytics (UEBA) to detect anomalous access patterns that may indicate compromise.
Identity Threat Detection and Response (ITDR): Gartner defines ITDR as "a collection of tools and best practices to defend identity systems. ITDR tools can help protect identity systems, detect when they are compromised, and enable efficient remediation."
Common misconfigurations include over-privileging accounts, improper identity lifecycle management, and failing to implement MFA correctly.
Specific Risk Areas:
Visibility First: The identity landscape spans cloud, on-premises, and hybrid environments. It is critical to have identity visibility into all users, accounts (human or service), access rights, and configurations (regardless of where they reside).
Risk-Based Approach: Organizations should prioritize identity protection based on risk assessment, focusing on:
Continuous Monitoring: Given the dynamic nature of cyber threats and constant changes to IT infrastructures, organizations must continuously monitor and assess their identity security posture.
The future of identity security will be heavily influenced by AI and machine learning (ML) technologies:
With machine identities now outnumbering human identities 82:1, organizations must prepare for AI scalability challenges by adopting:
Zero Trust architectures will continue evolving to address identity challenges through:
The identity security market is heading toward:
Immediate Actions
Strategic Initiatives
Long-Term Vision
Organizations should work toward a future state where:
Identity-based attacks have evolved from simple password theft to sophisticated campaigns that exploit the very foundation of digital trust. With 98% of organizations ranking identity protection as a top 10 priority, organizations must recognize that traditional approaches are insufficient for today's threat landscape.
The convergence of AI, cloud computing, and remote work has created both opportunities and challenges. While Zero Trust provides a framework for improvement, it also introduces new attack vectors that adversaries are already exploiting.
Success in this environment requires a fundamental shift from reactive defense to proactive identity security. Organizations must implement comprehensive ISPM strategies, move beyond vulnerable authentication methods like SMS MFA, and prepare for a future dominated by machine identities and AI-enhanced threats.
The cost of inaction is clear: 30 publicly disclosed breaches in 2024 resulted from identity-based initial access vectors, affecting hundreds of millions of customer records. Organizations that invest in modern identity security architecture today will be better positioned to defend against tomorrow's threats.
As we move forward, identity security is not just a technical requirement, it's a business imperative affecting every aspect of digital operations. Organizations that master identity security will not only survive but thrive in the digital age, while those that don't risk becoming the next cautionary tale in cybersecurity history.
As organizations confront the growing challenges of identity-based threats, effective cybersecurity leadership is more essential than ever. Building a resilient, identity-first strategy requires leaders who can align people, process, and technology within a Zero Trust framework. LDR512: Security Leadership Essentials for Managers helps professionals develop the insight and practical skills to lead these efforts—turning identity security from a vulnerability into a strength.


Shawn is responsible for the SOC, cyber threat intelligence, incident response, and threat hunting efforts at Upwork. He previously built SOCs for PayPal and American Express and has led security teams across the globe.
Read more about Shawn Chakravarty