How Attackers Are Leveling Up in 2026: The Techniques That Changed the Threat Landscape | Lorikeet Security Skip to main content
Back to Blog

How Attackers Are Leveling Up in 2026: The Techniques That Changed the Threat Landscape

Lorikeet Security Team April 8, 2026 12 min read

TL;DR: The attacker playbook in 2026 looks fundamentally different from five years ago. Custom malware has given way to living-off-the-land techniques using legitimate system tools. Phishing has evolved from mass-blasted templates to AI-generated, context-aware messages that bypass both technical controls and human judgment. Identity — not endpoints — is the primary target, with Adversary-in-the-Middle kits stealing session tokens in real-time to bypass MFA. And supply chain attacks have moved from theoretical to routine, targeting CI/CD pipelines, package registries, and developer tooling. The organizations that get breached in 2026 are the ones still defending against 2020's threat landscape.

AI-Assisted Reconnaissance and Exploitation

Large language models have fundamentally changed the economics of offensive operations. Tasks that required specialized expertise and hours of manual work — analyzing leaked source code for vulnerabilities, understanding complex application logic, crafting context-specific social engineering — can now be automated or dramatically accelerated.

Source code analysis at scale: When source code leaks via misconfigured repositories, exposed .git directories, or insider theft, attackers now feed it to LLMs that identify authentication bypass opportunities, hardcoded credentials, SQL injection vectors, and insecure deserialization patterns in minutes rather than days. The LLM understands code structure, follows data flows, and explains how to exploit what it finds.

Phishing content generation: AI-generated phishing emails are grammatically perfect, contextually appropriate, and tailored to the target's role, company, and recent activities. The tell-tale signs of phishing — awkward grammar, generic greetings, implausible urgency — no longer exist in sophisticated campaigns. Voice cloning enables vishing attacks where the caller sounds exactly like the target's CEO, referencing real projects and using the correct internal terminology.

Exploit development: LLMs assist in adapting proof-of-concept exploits to specific target environments, generating payloads that bypass particular WAF rule sets, and automating the tedious parts of exploitation — leaving the attacker to focus on the creative elements that still require human judgment.


Living Off the Land: Why Attackers Stopped Dropping Malware

The most sophisticated attackers in 2026 — both nation-state and criminal — rarely deploy custom malware. Instead, they use tools already present on every Windows system: PowerShell for scripting, WMI for remote execution, certutil for file downloads, mshta for script execution, rundll32 for DLL loading, and BITSAdmin for persistent file transfers.

This approach — called Living Off the Land Binaries (LOLBins) — defeats traditional detection models. These tools are digitally signed by Microsoft, used legitimately by IT administrators every day, and expected in normal system telemetry. An EDR alert on PowerShell execution would generate thousands of false positives per day in any enterprise environment.

Volt Typhoon, the Chinese threat group that pre-positioned itself in US critical infrastructure, operated almost entirely through LOLBins. Their persistence in compromised networks lasted months to years because their activity was indistinguishable from normal administration. No malware to detect, no C2 beacons to block, no suspicious binaries to analyze — just legitimate tools used for illegitimate purposes.

The defensive implication is significant: organizations that rely primarily on signature-based detection and malware sandboxing are blind to the most dangerous threats. Detection must shift to behavioral analytics — not what tool was used, but whether the pattern of activity makes sense for that user, at that time, from that system.


Identity-First Attacks: Credentials Are the New Perimeter

The perimeter dissolved years ago. Remote work, cloud services, SaaS applications, and zero-trust marketing all pushed identity to the center of security architecture. Attackers followed. Why exploit a vulnerability when you can simply log in?

Adversary-in-the-Middle (AiTM) Phishing

AiTM phishing kits — EvilProxy, Evilginx, Modlishka — proxy the entire login experience in real-time. The victim enters their credentials and MFA code on what appears to be a legitimate login page. The phishing proxy forwards everything to the real service, captures the authenticated session cookie, and hands it to the attacker. MFA is completely bypassed because the attacker captures the post-authentication session token, not the MFA code itself. These kits are available as turnkey services for a few hundred dollars per month.

Session Token Theft

Browser infostealers (Raccoon, Vidar, Lumma) extract session cookies and authentication tokens directly from the victim's browser. With a valid session token, the attacker accesses every authenticated service — email, cloud consoles, source code repositories — without needing credentials or MFA. The tokens often remain valid for hours or days, even after the victim changes their password.

Cloud Identity Federation Abuse

Compromising an identity provider (Okta, Azure AD, Google Workspace) provides access to every federated application. The 2023 Okta breach demonstrated this: attackers with access to Okta's support systems could impersonate customer administrator sessions, accessing every SaaS application connected via SSO. In 2026, identity provider compromise is the highest-value target in the attacker ecosystem.


Supply Chain as Attack Vector

Supply chain attacks have moved from headline-grabbing exceptions (SolarWinds, 2020) to a routine attack vector. The targets have expanded from build infrastructure to the entire software development lifecycle:


Cloud-Native Attack Chains

Cloud environments create attack chains that do not exist in traditional infrastructure. A single misconfiguration can cascade into full account compromise:

SSRF to IMDS to lateral movement: A Server-Side Request Forgery vulnerability in a cloud-hosted web application is used to query the Instance Metadata Service (IMDS) at 169.254.169.254, retrieving temporary IAM credentials. Those credentials provide access to S3 buckets, databases, and other AWS services — potentially across the entire account. This was the attack chain behind the Capital One breach, and it remains exploitable in organizations that have not migrated to IMDSv2 or properly scoped IAM roles.

Misconfigured IAM roles: Over-permissioned Lambda functions, EC2 instances with administrator-level IAM roles, and cross-account trust relationships that were configured broadly during initial cloud migration. Attackers enumerate IAM permissions after initial access and identify escalation paths through policy misconfigurations.


Ransomware Evolution: Double Extortion and Beyond

Ransomware in 2026 is a multi-stage operation, not a single event. Modern ransomware groups operate like professional services firms — with recruitment, specialization, quality assurance, and customer support:


EDR Evasion: The Cat-and-Mouse Continues

As endpoint detection and response (EDR) tools become more sophisticated, attackers invest in bypassing them. The techniques are increasingly low-level:

Direct syscalls: Instead of calling Windows API functions (which EDR hooks), attackers invoke system calls directly — bypassing the user-mode hooks that most EDR products rely on for visibility. Tools like SysWhispers generate direct syscall stubs that avoid ntdll.dll entirely.

Kernel callback removal: Attackers with elevated privileges can remove the kernel callbacks that EDR drivers register to receive notifications about process creation, thread injection, and file operations. Without these callbacks, the EDR is effectively blind.

BYOVD (Bring Your Own Vulnerable Driver): Loading a signed but vulnerable kernel driver to gain kernel-level access, then using that access to disable EDR protection. Because the driver is legitimately signed, it loads without issue — and the vulnerability provides the attacker with arbitrary kernel read/write capability.


Attack Technique Evolution: 2020 vs 2023 vs 2026

Category 2020 2023 2026
Initial Access Exploit public-facing vulns, phishing with macros Phishing with ISO/LNK, stolen credentials AI-crafted phishing, AiTM MFA bypass, supply chain
Persistence Scheduled tasks, registry run keys, custom backdoors LOLBins, WMI subscriptions, DLL sideloading Identity persistence (OAuth apps, federation), cloud-native persistence
Lateral Movement PsExec, RDP, SMB with malware WinRM, DCOM, pass-the-hash Cloud IAM pivoting, identity token reuse, SaaS-to-SaaS
Defense Evasion Packers, crypters, process injection Unhooking, direct syscalls, AMSI bypass BYOVD, kernel callback removal, EDR-aware tooling
Exfiltration HTTP/HTTPS to C2 server Cloud storage (S3, Azure Blob), DNS tunneling Legitimate SaaS (OneDrive, Slack), encrypted channels blending with normal traffic
Impact Single extortion ransomware Double extortion, data theft Triple extortion, backup destruction, supply chain propagation

What This Means for Defenders

The evolution of attacker techniques has clear implications for security programs:

Test Against Real-World Attacker Techniques

Lorikeet Security's penetration testing engagements simulate the techniques modern attackers actually use — not outdated playbooks. From assumed-breach internal testing to web application and cloud security assessments, we validate whether your defenses stop today's threats.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!