BotBeat
...
← Back

> ▌

IBMIBM
INDUSTRY REPORTIBM2026-02-27

IBM Reports 44% Surge in Application Exploits as AI Accelerates Cyber-Attacks

Key Takeaways

  • ▸Application exploits surged 44% in 2025, with vulnerability exploitation becoming the leading incident cause at 40% of cases
  • ▸AI-enabled tools are accelerating attack speed and lowering barriers to entry, with ransomware groups growing 49% year-over-year
  • ▸Supply chain attacks have nearly quadrupled since 2020, increasingly targeting CI/CD pipelines and software build environments
Source:
Hacker Newshttps://www.infosecurity-magazine.com/news/app-exploits-surge-ai-speeds/↗

Summary

IBM X-Force's 2026 Threat Intelligence Index reveals a dramatic 44% increase in cyber-attacks targeting public-facing applications, driven primarily by AI-enabled vulnerability scanning and missing authentication controls. The report identifies vulnerability exploitation as the leading cause of incidents in 2025, accounting for 40% of observed cases, while active ransomware groups grew 49% year-over-year. Mark Hughes, IBM's global managing partner for cybersecurity services, emphasized that attackers are using AI to accelerate existing playbooks rather than developing new ones, with the core challenge remaining software vulnerability management at scale.

The research highlights a significant expansion in supply chain attacks, which have nearly quadrupled since 2020, as threat actors increasingly target software build environments, CI/CD pipelines, and SaaS integrations. Manufacturing remained the most targeted sector for the fifth consecutive year at 27.7% of incidents, while North America became the most attacked region for the first time in six years, representing 29% of cases. The report also documented that infostealer malware exposed over 300,000 ChatGPT credentials in 2025, demonstrating the convergence of AI tools and cybersecurity threats.

IBM's findings underscore how AI is fundamentally changing the threat landscape by lowering barriers to entry for ransomware actors and enabling automation of complex attack tasks. The research notes that leaked tooling and AI capabilities allow smaller, transient groups to reuse established attack patterns while automating reconnaissance and exploitation phases. North Korean IT worker schemes exemplified this trend by employing AI-driven image manipulation for synthetic identity creation and translation tools for global marketplace engagement. As multimodal AI models continue to mature, IBM anticipates adversaries will automate increasingly sophisticated attack components, from reconnaissance to advanced ransomware deployment.

  • Over 300,000 ChatGPT credentials were exposed by infostealer malware in 2025, highlighting AI tools as both attack vectors and targets
  • Manufacturing continues as the most targeted sector (27.7%), while North America became the most attacked region (29%) for the first time in six years

Editorial Opinion

IBM's findings paint a sobering picture of how AI democratization is fundamentally reshaping cybersecurity dynamics. The 44% surge in application exploits isn't about novel attack vectors—it's about AI turning sophisticated techniques into commodity tools accessible to less-skilled actors. Most concerning is the quadrupling of supply chain attacks since 2020, suggesting that as organizations harden perimeter defenses, adversaries are successfully pivoting to trusted third-party relationships and development infrastructure. The exposure of 300,000 ChatGPT credentials reveals an uncomfortable irony: AI tools meant to enhance productivity are becoming high-value targets themselves, creating a feedback loop where AI both enables attacks and becomes their prize.

AI AgentsMachine LearningCybersecurityManufacturingIndustry Report

More from IBM

IBMIBM
PRODUCT LAUNCH

IBM Announces Granite 4.0 3B Vision: Compact Multimodal Model for Enterprise Document Understanding

2026-04-01
IBMIBM
PRODUCT LAUNCH

IBM Introduces Bob: An AI-Powered Development Partner for Enterprise Software Modernization

2026-03-25
IBMIBM
OPEN SOURCE

IBM, Red Hat, and Google Donate Kubernetes Blueprint for LLM Inference to Open Source Community

2026-03-24

Comments

Suggested

AnthropicAnthropic
RESEARCH

Inside Claude Code's Dynamic System Prompt Architecture: Anthropic's Complex Context Engineering Revealed

2026-04-05
OracleOracle
POLICY & REGULATION

AI Agents Promise to 'Run the Business'—But Who's Liable When Things Go Wrong?

2026-04-05
AnthropicAnthropic
POLICY & REGULATION

Anthropic Explores AI's Role in Autonomous Weapons Policy with Pentagon Discussion

2026-04-05
← Back to news
© 2026 BotBeat
AboutPrivacy PolicyTerms of ServiceContact Us