Attacker Playbooks: How Threat Actors Operate in 2026

Cybersecurity professionals spend significant time studying defensive frameworks, compliance requirements, and security architectures. But understanding how attackers operate — the structured, repeatable methods they use to compromise organizations — is equally critical. Attacker playbooks reveal predictable patterns that defenders can anticipate and disrupt.

82%
of 2025 detections were malware-free — attackers logging in, not breaking in
CrowdStrike 2026 GTR
29 min
average eCrime breakout time from compromise to lateral movement
CrowdStrike 2026 GTR
47%
of initial compromises used ClickFix — the #1 initial access vector
Microsoft Defender Experts 2025
124
unique active ransomware groups tracked in 2025 — a record high
Searchlight Cyber H2 2025

Whether formalized in ransomware-as-a-service (RaaS) affiliate documentation or reconstructed through post-incident forensic analysis, attacker playbooks are the adversary's operational manuals. This article examines what they contain, how they map to MITRE ATT&CK, the dominant playbooks shaping the 2026 threat landscape, and what defenders can learn by studying them systematically. Every statistic here is sourced and verifiable.

What Is an Attacker Playbook?

An attacker playbook is a structured set of tactics, techniques, and procedures (TTPs) that a threat actor or group follows to achieve a specific objective. It defines how they gain initial access, establish persistence, move laterally, escalate privileges, exfiltrate data, and ultimately achieve their end goal — whether that is deploying ransomware, stealing intellectual property, or pre-positioning for future disruption.

Playbooks are not static documents. They are living methodologies that evolve based on what works. When defenders patch a vulnerability or deploy a new control, attackers adapt their playbook accordingly. When a technique proves effective across multiple targets, it gets refined and reused. The ransomware ecosystem has industrialized this process, with affiliate programs distributing playbooks to operators the same way a franchise distributes operations manuals.

Key Concept

The key distinction between a playbook and a random collection of attack tools is repeatability. A playbook turns an intrusion from an improvised event into a systematic, reproducible process. This predictability is simultaneously the attacker's advantage (efficiency and scalability) and their vulnerability (defenders who understand the playbook can anticipate the next move).

The MITRE ATT&CK Framework: Mapping Attacker Behavior

The widely adopted method for documenting and analyzing attacker playbooks is the MITRE ATT&CK framework. Originally developed by the MITRE Corporation in 2013 as an internal research project, it has evolved into a globally recognized knowledge base of adversary behavior drawn from real-world incident observations, with contributors from 226 countries and territories.

The framework organizes adversary behavior into 14 tactics, each representing a high-level objective an attacker pursues during an intrusion. Within each tactic, specific techniques describe how the attacker achieves that objective. Sub-techniques provide even more granular detail. The Enterprise matrix covers 11 platforms including Windows, macOS, Linux, Azure AD, SaaS, IaaS, and containers, with dedicated matrices for mobile environments and industrial control systems (ICS).

The 14 ATT&CK Tactics (Enterprise)

The tactics represent the sequential objectives an attacker pursues:

  • Reconnaissance — Gathering information about the target before any intrusion attempt. This includes scanning for exposed services, harvesting employee email addresses, and identifying technology stacks.
  • Resource Development — Acquiring or building the infrastructure and tools needed for the operation. This might involve registering domains, purchasing credentials from initial access brokers, or configuring command-and-control (C2) servers.
  • Initial Access — The entry point. How the attacker first gets a foothold in the target environment. Phishing, exploiting public-facing applications, and using valid compromised credentials are among the primary vectors. According to the CrowdStrike 2026 Global Threat Report, 82% of detections in 2025 were malware-free, meaning attackers are logging in rather than breaking in.
  • Execution — Running malicious code on the target system. This is where the attacker begins taking active control, often through scripting engines like PowerShell or command-line interpreters.
  • Persistence — Ensuring continued access even if the compromised system is rebooted or credentials are changed. Registry modifications, scheduled tasks, and boot or logon autostart mechanisms are common methods. T1547 (Boot or Logon Autostart Execution) is the 9th most prevalent technique globally, per the Picus Red Report 2026.
  • Privilege Escalation — Gaining higher-level permissions than initially obtained. Exploiting misconfigurations, abusing access tokens, or leveraging kernel vulnerabilities allow attackers to move from a standard user context to administrator or SYSTEM-level access.
  • Defense Evasion — Avoiding detection by security tools and analysts. This includes disabling security software, obfuscating code, injecting into legitimate processes, and masquerading as benign files. Defense evasion techniques dominate the current threat landscape: the Picus Red Report 2026 found that 8 of the top 10 ATT&CK techniques are dedicated to evasion, persistence, or stealthy C2.
  • Credential Access — Stealing authentication credentials. Dumping password hashes, keylogging, extracting credentials from memory (such as from the LSASS process), and Kerberoasting are frequently observed techniques. Credentials from Password Stores (T1555) is the 2nd most prevalent technique in the Picus Red Report 2026.
  • Discovery — Learning about the environment after gaining access. Enumerating Active Directory, identifying file shares, mapping network topology, and discovering security tools in place.
  • Lateral Movement — Moving from the initially compromised system to other systems within the network. Remote Desktop Protocol (RDP), Server Message Block (SMB), and administrative tools like PsExec are standard vehicles. The CrowdStrike 2026 Global Threat Report found the average eCrime breakout time — time from initial compromise to lateral movement — dropped to just 29 minutes in 2025, with the fastest recorded at 27 seconds.
  • Collection — Gathering the data the attacker intends to steal. Staging data in central locations, compressing files, and targeting specific repositories or databases.
  • Command and Control (C2) — Maintaining communication between the compromised environment and the attacker's external infrastructure. Encrypted channels, domain fronting, and protocol abuse help attackers blend C2 traffic with legitimate network activity. A standout finding in the Picus Red Report 2026: attackers are now routing C2 traffic through high-reputation cloud services like OpenAI and AWS to evade network-based detection entirely.
  • Exfiltration — Transferring stolen data out of the target environment. Attackers may use encrypted channels, cloud storage services, or custom tools to move data without triggering data loss prevention (DLP) controls.
  • Impact — The final objective. For ransomware groups, this means encrypting data and demanding payment. The Picus Red Report 2026 recorded a 38% relative decrease in Data Encrypted for Impact (T1486) year-over-year, from 21% of samples in 2024 to 12.94% in 2025 — evidence that attackers are pivoting from encryption to long-term data extortion.

Why ATT&CK Matters for Understanding Playbooks

The framework provides a common language. When a threat intelligence report states that a ransomware group uses T1055 (Process Injection) for defense evasion and T1547 (Boot or Logon Autostart Execution) for persistence, security teams worldwide understand exactly what behavior is being described. This shared vocabulary bridges communication gaps between red teams, blue teams, threat intelligence analysts, and executive stakeholders.

More importantly, ATT&CK enables defenders to map their existing detection capabilities against known adversary behavior and identify gaps. If your detections cover Initial Access techniques well but have limited visibility into Credential Access or Lateral Movement, ATT&CK makes that gap visible and measurable.

The Dominant Attacker Playbooks of 2026

The threat landscape in 2026 is shaped by several converging trends: the fragmentation of major ransomware syndicates into smaller, more agile crews; the industrialization of initial access through dedicated brokers; the convergence of tactics between financially motivated criminals and nation-state actors; and the integration of AI tools into the social engineering kill chain. Within this environment, several distinct playbook archetypes dominate.

Criminal Groups
Adopting patient, extended reconnaissance
Affiliate standardization across targets
Careful target vetting for ROI
LOTL stealth to reduce detection
Converging
Tradecraft
Nation-State Actors
Adopting criminal monetization methods
Using RaaS infrastructure for deniability
Deploying ransomware as disruptive cover
Outsourcing access to criminal IABs

The Ransomware Affiliate Playbook

Ransomware operations in 2026 function as an interconnected marketplace of access, infrastructure, and monetization services. The Ransomware-as-a-Service model remains the dominant operational structure. According to Searchlight Cyber's H2 2025 Ransomware Report, 124 unique active ransomware groups were tracked in 2025 — a record high — with 73 entirely new groups identified that year alone, reflecting the fragmentation of large syndicates into smaller, harder-to-disrupt cells.

The overall ecosystem processed approximately $820 million in tracked on-chain ransom payments in 2025, according to the Chainalysis 2026 Crypto Crime Report. That figure represents an 8% decline year-over-year, yet the scale of attacks tells the opposite story: claimed attacks rose 50 percent year over year (per eCrime.ch data cited in the Chainalysis report), making 2025 the most active year on record. The payment rate dropped to an all-time low of 28 percent — meaning 72 percent of affected organizations refused to pay — while the median ransom payment simultaneously surged 368% from $12,738 in 2024 to $59,556 in 2025. Fewer victims are paying, but those who do are paying far more.

Chainalysis, 2026 Crypto Crime Report

Despite relatively flat total ransom payments, the volume of ransomware activity surged sharply in 2025. Chainalysis reported a 50 percent year-over-year increase in claimed ransomware victims based on eCrime.ch tracking data, calling 2025 the most active year on record for ransomware victim counts. The divergence between payment totals and victim counts signals a deliberate strategic shift: more organizations are refusing to pay, but more organizations are getting hit.

The typical ransomware affiliate playbook follows a predictable chain — and if you want a phase-by-phase technical look at how that chain is executed in 2026, see the companion article on the ransomware kill chain.

Ransomware Affiliate Kill Chain — click any phase to expand
01
Access Acquisition
02
Recon & Lateral Move
03
Privilege Escalation
04
Data Exfiltration
05
Deploy & Encrypt
06
Extortion

Click a phase to see detail — or use keyboard

  1. Access Acquisition. Affiliates either purchase access from initial access brokers (IABs) or obtain it directly. IABs received at least $14 million in on-chain payments in 2025. Chainalysis found that spikes in IAB payment activity typically precede increases in ransomware victims by roughly 30 days — making IAB activity a measurable leading indicator of incoming attacks. The average price for network access on dark web markets fell from $1,427 in Q1 2023 to $439 in Q1 2026, driven by AI-assisted tooling and an oversupply of infostealer credential logs. The three primary entry vectors for ransomware in 2025 were exploited software vulnerabilities (approximately 32–34 percent of incidents), compromised credentials (approximately 22–23 percent), and phishing (approximately 18–20 percent).
  2. Reconnaissance and Lateral Movement. Once inside, affiliates map the environment using legitimate administrative tools. They enumerate Active Directory, identify backup systems, locate high-value data repositories, and assess the organization's security posture. This phase uses living-off-the-land (LOTL) techniques — leveraging PowerShell, WMI, RDP, and other trusted system tools — rather than deploying custom malware. The average lateral movement breakout time dropped to 29 minutes in 2025 per CrowdStrike.
  3. Privilege Escalation and Persistence. Affiliates escalate to domain administrator or equivalent privileges, often using credential dumping tools or exploiting misconfigurations. They establish multiple persistence mechanisms, ensuring continued access even if one vector is discovered and closed.
  4. Data Exfiltration. Before deploying encryption, the affiliate exfiltrates sensitive data. This is the foundation of double extortion — threatening to publish stolen data if the ransom is not paid. In 2026, data-only extortion (skipping encryption entirely) is a growing trend because it requires less technical effort, is harder to detect, and puts organizations under immediate legal, compliance, and reputational pressure. The Picus Red Report 2026 found a 38% relative drop in ransomware encryption deployment, indicating this tactical shift is measurable and accelerating.
  5. Deployment and Impact. The ransomware payload is deployed across as many systems as possible, often targeting virtualized infrastructure for maximum disruption. The median time from initial intrusion to ransomware deployment dropped to approximately 5 days in 2025 according to Sophos incident response data, and in more than 50 percent of engagements tracked by Secureworks, ransomware was deployed within 24 hours. In 10 percent of cases, ransomware deployed within five hours.
  6. Extortion. The victim receives a ransom demand. Some groups have adopted quadruple extortion tactics: encrypting data, threatening to leak stolen data, launching DDoS attacks against the victim's infrastructure, and directly contacting customers, partners, and media to amplify pressure on the organization.
The Fragmentation Shift

The closure of major RaaS brands — including RansomHub (April 2025), 8Base, and BianLian — did not reduce overall victim counts. Instead, their affiliates migrated to smaller, emerging groups. Qilin surged to become the most prolific ransomware group of 2025, recording a 420% year-over-year increase in victims, averaging 75 per month in Q3. The ecosystem is more fragmented, more difficult to disrupt through any single law enforcement action, and no less dangerous for it.

The Vulnerability Exploitation Playbook

The article cannot discuss attacker playbooks without addressing what IBM X-Force identified as the leading cause of attacks in 2025: vulnerability exploitation. It accounted for 40 percent of incidents observed by X-Force, driven by a surge in public-facing application attacks that rose 44 percent year-over-year — largely because authentication controls were absent and AI tools allowed attackers to identify weaknesses at a pace defenders cannot match manually.

The Rapid7 2026 Global Threat Landscape Report adds a critical dimension: exploited high and critical severity vulnerabilities more than doubled year-over-year, climbing 105 percent from 71 in 2024 to 146 in 2025. The more consequential finding is not the count but the timeline. The predictive lead time defenders once relied on — the window between public vulnerability disclosure and confirmed exploitation in the wild — has largely disappeared. Rapid7's data shows attackers are operationalizing vulnerabilities within days of disclosure. Not weeks. Days.

This changes the entire calculus of vulnerability management. The traditional model — scan monthly, patch within 30 days, prioritize by CVSS score — was already straining before this acceleration. In the current environment, it is functionally broken for high-severity vulnerabilities in internet-facing systems. An unpatched critical CVE in a public-facing application is not a 30-day risk; it is a hours-to-days risk.

The exploitation playbook for opportunistic attackers now follows a compressed sequence: continuous scanning of internet-exposed assets for newly disclosed CVEs, automated exploitation tooling updated within 24–72 hours of proof-of-concept publication, and immediate access handoff to either the attacker's own infrastructure or an IAB marketplace. Nation-state actors add a pre-exploitation phase: they often identify and weaponize vulnerabilities before public disclosure, meaning defenders face exploitation before a patch exists.

The Patching Window Is Now Measured in Days

CVSS scores alone are an inadequate triage tool in 2026. A vulnerability rated 9.8 with no known exploitation in the wild is categorically different from a vulnerability rated 8.1 with active exploitation confirmed within 48 hours of disclosure. Defenders need exposure management programs that integrate active exploitation telemetry — sources like CISA's Known Exploited Vulnerabilities catalog, Rapid7's real-time exploitation data, and threat intelligence feeds that flag weaponized POC availability — not just severity scores. Prioritize by exploitation velocity, not just severity.

The Identity-First Intrusion Playbook

A defining characteristic of the 2026 threat landscape is that the overwhelming majority of successful intrusions no longer start with malware. They start with a login. For a detailed look at the data and tactics behind this shift, see the full article on identity-based attacks as the dominant intrusion method. The CrowdStrike 2026 Global Threat Report found that 82 percent of detections in 2025 were malware-free, up from 79 percent the prior year. Groups like Scattered Spider have demonstrated repeatedly that social engineering combined with credential theft can compromise major enterprises without any sophisticated exploit code.

Voice phishing (vishing) attacks skyrocketed 442% between the first and second halves of 2024, per the CrowdStrike 2025 Global Threat Report — and the CrowdStrike 2025 Threat Hunting Report confirmed the trend accelerating into 2025, with Scattered Spider resurging with faster and more aggressive tradecraft. The identity-first playbook typically follows this pattern:

  • Entry via Social Engineering. Attackers call employees, impersonate IT support, and convince them to reveal credentials, reset MFA, or authorize malicious OAuth applications. AI-generated voice content has made vishing attacks significantly more convincing and scalable. In the Scattered Spider campaign that struck multiple UK retailers in 2025 — including Marks & Spencer — attackers used vishing and help desk impersonation to compromise credentials, then moved from initial access to ransomware deployment in under 24 hours.
  • Abuse of Identity Infrastructure. Once authenticated, the attacker operates within the identity layer — cloud consoles, SaaS tenants, and identity providers. A single compromised account can reach far more systems than ever before due to the centralization of access through cloud and SSO platforms. Cloud intrusions rose 37% year-over-year in 2025, with a 266% surge in nation-state cloud activity, per CrowdStrike.
  • Lateral Movement via Legitimate Tools. Attackers deploy remote management tools like AnyDesk, ScreenConnect, and TeamViewer after credential theft to maintain persistence while evading endpoint detection tools entirely.
  • Data Theft and Extortion. The attacker exfiltrates data from SaaS platforms, cloud storage, or CRM systems and demands payment to prevent its release. Because no encryption is involved, organizations often have no immediate indication of compromise.
Defender Priority

This playbook is particularly dangerous because it exploits the human layer — the one area where technical controls are inherently limited. Phishing-resistant multi-factor authentication (MFA) such as passkeys or FIDO2, conditional access policies, and identity threat detection and response (ITDR) tools are essential countermeasures. Standard push-notification MFA is no longer adequate: attackers consistently defeat it through MFA fatigue bombing and help desk impersonation.

The Living-off-the-Land (LOTL) Playbook

Living-off-the-land techniques have become the dominant post-compromise methodology for both financially motivated criminals and nation-state actors. Rather than introducing custom malware that might trigger security alerts, attackers abuse legitimate, trusted system tools already present in the target environment.

Consider This

Your existing security tools likely flag unknown executables and unusual file hashes. Now imagine an attacker who uses none of those. They use PowerShell — the same tool your admins use. They use WMI, certutil, RDP. If your detection logic asks "is this a known bad file?", LOTL makes that question irrelevant. The question that matters is: "is this a known bad behavior?"

The Picus Red Report 2026, based on analysis of 1,153,683 unique malicious files and 15.5 million adversarial actions observed during 2025, found that 8 of the top 10 MITRE ATT&CK techniques are now dedicated to defense evasion, persistence, or stealthy command and control — the highest concentration of stealth-focused tradecraft Picus Labs has ever recorded. The report's headline finding: adversaries have fundamentally traded predatory, smash-and-grab tactics for what Picus terms "parasitic silent residency." The goal is no longer immediate destruction but maximum dwell time.

The top MITRE ATT&CK techniques from the Picus Red Report 2026, ranked by prevalence across analyzed malware samples, are:

  • T1055 — Process Injection T1055 (30% prevalence): The number-one technique for the third consecutive year. Malicious code runs hidden inside trusted system processes, making it nearly impossible to distinguish from legitimate execution.
  • T1555 — Credentials from Password Stores T1555: Credential theft from browsers, password managers, and credential stores.
  • T1071 — Application Layer Protocol T1071: Attackers blend C2 traffic with legitimate HTTPS and other protocols.
  • T1497 — Virtualization/Sandbox Evasion T1497 (surged to #4): The year's most explosive growth. Modern malware like LummaC2 uses trigonometric analysis of mouse movement — calculating Euclidean distance and angles — to detect automated sandbox environments. If mouse movement is too geometrically perfect (indicating a sandbox), the malware refuses to detonate.
  • T1036 — Masquerading T1036: Malicious files and processes disguised to appear legitimate.
  • T1547 — Boot or Logon Autostart Execution T1547: Persistence through reboots and user logins.
  • T1562 — Impair Defenses T1562 (rank #8, 14.18% prevalence): Disabling antivirus, deleting logs, and killing EDR agents. Consistent across recent years, proving that "blinding the target" is a mandatory prerequisite for modern intrusions, not an optional step.
  • T1219 — Remote Access Software T1219: Legitimate remote tools abused for persistent attacker access.

An additional standout finding: attackers are now routing C2 traffic through high-reputation cloud services like OpenAI and AWS — a technique Picus calls "Living Off the Cloud" — to blend malicious traffic with normal business operations and defeat network-level detection.

Common LOTL tools and techniques include PowerShell with encoded or obfuscated commands for execution, reconnaissance, and data exfiltration; certutil.exe for downloading malicious payloads under the guise of certificate management; WMI for remote execution and persistence through event subscriptions; PsExec for lateral movement; scheduled tasks and registry run keys for persistence; and curl.exe combined with TOR proxies for anonymous data transfers.

CISA, NSA, and FBI Joint Advisory AA24-038A (February 2024)

The Volt Typhoon campaign remains the clearest documented illustration of LOTL tradecraft at its most extreme. This PRC state-sponsored threat actor compromised U.S. critical infrastructure across the energy, water, communications, and transportation sectors using native system utilities exclusively — no custom malware. CISA, NSA, and FBI confirmed in their joint advisory that Volt Typhoon maintained undetected access in some victim environments for at least five years, relying entirely on living-off-the-land techniques and legitimate administrator credentials to avoid triggering security controls.

Their toolkit consisted entirely of native utilities — wmic, ntdsutil, netsh, PowerShell — combined with valid administrator credentials for lateral movement via RDP. No custom malware was deployed. CISA's advisory explicitly confirmed that Volt Typhoon avoided malware for network access and activity entirely, and advised defenders to assume extended dwell time and hunt using application event logs, which persist longer than security logs.

Defending against LOTL requires a fundamental shift from signature-based detection to behavioral analysis. Organizations need visibility into how tools are being used, not just which tools are running. Indicators of attack (IOAs) — behavioral patterns suggesting an attack may be in progress — are more effective than traditional indicators of compromise (IOCs) that depend on known malicious signatures.

The Supply Chain Compromise Playbook

Supply chain attacks have become a preferred vector for both criminal and state-sponsored actors because they allow a single compromise to cascade across a broad victim pool. The playbook targets the trust relationships between organizations and their software vendors, managed service providers, or connected SaaS platforms.

Dimension Criminal Groups CaaS Nation-State APT
Primary Goal Financial extortion; ransomware deployment across victim pool Persistent espionage; pre-positioning for disruption
Dwell Time Days to weeks before deployment Months to years — Volt Typhoon: 5+ years undetected
Entry Vector Vendor vulnerabilities, credential theft, IAB purchases Zero-days, pre-disclosure exploits, insider access
Malware Use Custom ransomware payloads + LOTL for lateral movement LOTL exclusively in many campaigns; zero custom malware
Target Selection Volume-based; any reachable vendor with downstream customers Strategic; sectors with geopolitical or infrastructure value
Post-Access Action Rapid exfiltration + payload deployment across all customers Silent collection; maintain access without triggering detection

The CL0P ransomware group has repeatedly demonstrated this playbook at scale, exploiting vulnerabilities in widely deployed file-transfer platforms to reach hundreds of downstream organizations through a single initial compromise. In 2025, supply chain targeting extended to SaaS integration layers, CI/CD pipelines, and managed security providers — any third party with privileged access to multiple customer environments simultaneously.

The supply chain playbook typically involves four stages: identifying a widely used vendor or platform with authenticated access to multiple customers; compromising that vendor through a vulnerability, credential theft, or insider access; leveraging the vendor's trusted network access or software update mechanisms to reach downstream targets; and exfiltrating data or deploying ransomware across the victim pool before any single victim detects the intrusion and notifies others.

From the attacker's perspective, the economics are compelling. One successful vendor compromise can yield hundreds of targets that would each require independent effort to breach directly. The CrowdStrike 2025 Threat Hunting Report confirmed that cloud intrusions rose 136% in the period covered, with nation-state actors responsible for 40 percent of increased activity — much of it focused on cloud service providers used by high-value downstream targets.

The AI-Enhanced Social Engineering Playbook

Generative AI has moved from experimental novelty to core operational infrastructure in the attacker toolkit. The CrowdStrike 2026 Global Threat Report recorded an 89% increase in attacks by AI-enabled adversaries in 2025, and found that more than 90 organizations had legitimate AI tools exploited to generate malicious commands and steal sensitive data. ChatGPT was mentioned in criminal forums 550% more than any other AI model.

In the current threat landscape, AI is being used to generate highly convincing phishing emails with click-through rates of up to 54% (compared to 12% for human-crafted attempts, per LLM benchmarking cited in the CrowdStrike 2025 Global Threat Report); create deepfake audio for vishing attacks that can impersonate specific executives by name and voice; automate reconnaissance by rapidly processing public information about organizational structure and employee roles; produce targeted lures at scale with far less expertise than previously required; and assist North Korean operatives (FAMOUS CHOLLIMA) in automating every phase of insider attack programs using GenAI to pass interviews and maintain fraudulent employment at Western technology companies.

CrowdStrike — Adam Meyers, Head of Counter Adversary Operations (August 2025)

CrowdStrike's Head of Counter Adversary Operations described the current AI-enabled threat environment as a fundamental redefinition of both business operations and attack methods. Meyers noted that threat actors are actively using generative AI to scale social engineering operations, compress attack timelines, and reduce the technical skill required to conduct hands-on-keyboard intrusions — making sophisticated attacks available to a much wider range of adversaries than previously possible.

The Next Question: What Happens When AI Operates Without a Human Operator?

Consider This

Every attacker tactic described above still assumes a human making decisions: choosing a target, reviewing results, deciding the next move. Agentic AI removes that bottleneck. What happens to your mean-time-to-detect when the attacker's decision loop runs in milliseconds — not hours?

The capabilities described above still assume a human attacker directing AI tooling. The threat landscape is already moving past that model. Agentic AI — autonomous systems that can chain decisions, adapt mid-operation, and execute without human input — is being embedded directly into attacker frameworks. Decision loops that once required an operator are being replaced by systems that probe defenses, detect what is blocking them, modify their approach, and retry in seconds.

IBM X-Force's 2026 Threat Index explicitly flags this trajectory: as multimodal AI models mature, the expectation is that adversaries will automate complex tasks including reconnaissance, lateral movement, and the full ransomware deployment chain. The IBM assessment describes the near-term threat as "faster-moving, more adaptive" attacks driven by automation at every phase — not just in crafting lures. Rapid7's 2026 Global Threat Landscape Report notes that APT groups are already embedding AI into evasion workflows, with Earth Kurma pioneering "Living Off the App" techniques that use legitimate platforms like Cisco Webex as C2 infrastructure, and AI helping refactor payloads in real time based on the defensive tools they detect.

The defender implication is significant. AI-driven attacks that adapt faster than human analysts can triage them fundamentally challenge the model of human-reviewed alert queues. When an attack modifies its behavior based on what is blocking it and retries in seconds, mean-time-to-detect figures measured in hours become operationally meaningless. The response must be automated containment — not just automated detection. Isolating a host, revoking a token, or blocking a destination based on behavioral triggers rather than confirmed attribution is the direction threat-informed defense is moving. Whether your organization is ready to execute that depends on whether you have the telemetry, playbooks, and tooling to act at machine speed.

The Democratization Problem: Who Gets Targeted Now

One question the attacker playbook conversation frequently sidesteps is: who is actually at risk? The implicit framing of sophisticated RaaS operations and nation-state tradecraft can suggest that only large enterprises occupy the crosshairs. The data says otherwise.

The barrier to launching a sophisticated attack has collapsed. Cyble's threat research tracked attack kits that once required tens of thousands of dollars in resources now available as monthly subscriptions for approximately $500. Ransomware affiliates receive pre-configured playbooks tuned for specific industries and geographic regions. Infostealer logs — the fuel for credential-based intrusions — are available in bulk for nominal per-record costs. The IBM X-Force 2026 Index found that the average price for network access on dark web markets dropped from $1,427 in Q1 2023 to $439 in Q1 2026, driven partly by AI-assisted tooling and an oversupply of stolen credential data.

This democratization matters because it changes the target pool. The organizations that were never sophisticated enough to target individually are now reachable in bulk through automated scanning, infostealer credential logs, and industry-specific affiliate playbooks. A small accounting firm, a regional healthcare provider, or a municipal utility does not need to be an interesting target to become a victim. It needs only to have an unpatched public-facing application, a credential set available in a stealer log, or an employee susceptible to a ClickFix-style prompt.

The Crime-as-a-Service ecosystem has built the equivalent of a demand-generation machine for ransomware and extortion. Operators compete on conversion rate and return on investment. Targets are selected not purely on strategic value but on likelihood to pay and ease of access. SMBs with limited security resources, no dedicated incident response capability, and no cyber insurance represent the path of least resistance — and the data shows they are being targeted accordingly.

Attacker Economics Versus Defender Economics

The CaaS model means attackers are operating with volume economics: run enough automated campaigns across enough targets and the conversion rate produces reliable revenue even if individual attempts are unsophisticated. Defenders cannot out-resource this model by throwing more people at manual analysis. The correct response is reducing attack surface (patch velocity, MFA, least privilege) to raise the per-target cost to the attacker — making your environment less profitable to attack than the next available option. Organizations that are expensive to compromise get deprioritized. The goal is not to be impenetrable; it is to be unprofitable.

The ClickFix Playbook

ClickFix deserves its own section because it has become one of the most prevalent and rapidly evolving initial access techniques of 2025. What began as an obscure niche tactic has industrialized into a dominant attack vector documented by Microsoft, Proofpoint, ESET, the Center for Internet Security, and Darktrace, among others.

The mechanism is deliberately simple. An attacker presents the victim with a fake CAPTCHA verification, browser error message, or system verification prompt on a compromised or attacker-controlled website. When the victim interacts with the prompt, a malicious command is silently copied to their clipboard using JavaScript. The page then instructs the user to open the Windows Run dialog (Win+R) or a PowerShell terminal, paste the command, and press Enter. The victim executes the payload themselves, bypassing endpoint detection and email security controls entirely.

ClickFix Attack Flow — Anatomy of a Clipboard Exploit
1
Victim Lands on Attack Page

A compromised website or attacker-controlled domain shows a fake CAPTCHA, Cloudflare verification, or browser error. Visual design mirrors trusted, familiar UI patterns to lower suspicion.

Why it works: victims have seen these prompts hundreds of times on legitimate sites.
2
Interaction Silently Copies Payload

When the victim clicks "Verify" or interacts with the prompt, JavaScript executes silently and copies a malicious PowerShell command to the clipboard. No file is downloaded. No browser alert fires.

Why it evades detection: nothing malicious is downloaded — the payload lives only in the clipboard.
3
Page Instructs: "Press Win+R, Paste, Enter"

The page displays step-by-step instructions telling the user to open the Windows Run dialog (or terminal), paste the copied command, and press Enter to "complete verification."

Why it works: the user believes they are completing a legitimate system check — not running attacker code.
4
Victim Self-Executes the Payload

The victim pastes and runs the command, launching PowerShell or mshta.exe with the attacker's payload. Common deliveries: Lumma Stealer, AsyncRAT, DarkGate, XWorm, NetSupport RAT.

ATT&CK coverage: T1204.002 (User Execution), T1059.001 (PowerShell), T1218.005 (mshta.exe proxy execution).

Because the execution originates from a legitimate user action rather than a downloaded file, many security controls do not trigger. Browser protections like Google Safe Browsing do not flag it because the browser is not downloading an executable — the user is. Email security does not catch it because the delivery vehicle is often a clean URL that redirects through a traffic distribution system before reaching the attack page.

The scale of ClickFix is striking. Microsoft's 2025 Digital Defense Report identified ClickFix as the number one initial access method, responsible for 47 percent of all initial compromises observed by Microsoft Defender Experts — surpassing traditional phishing at 35 percent. ESET's H1 2025 Threat Report measured a 517% surge in ClickFix activity over six months, with the technique accounting for 8 percent of all blocked threats. The Center for Internet Security found it comprised over a third of all non-malware Albert Network Monitoring alerts in the first half of 2025.

ClickFix maps directly to MITRE ATT&CK: T1204.002 (User Execution: Malicious File), T1059.001 (Command and Scripting Interpreter: PowerShell), and T1218.005 (System Binary Proxy Execution: mshta.exe). Malware families commonly delivered via ClickFix include Lumma Stealer, AsyncRAT, NetSupport RAT, DarkGate, and XWorm.

The technique has spawned direct variants. FileFix, disclosed in June 2025 and observed in the wild within two weeks of public disclosure, shifts the attack surface from the Windows Run dialog to the File Explorer address bar — a more familiar action that raises less suspicion. TerminalFix and DownloadFix are additional variants using different native system utilities. In January 2026, Huntress identified CrashFix, delivered through a malicious Chrome extension impersonating a legitimate ad blocker.

Why Awareness Training Alone Does Not Stop ClickFix

Traditional security awareness training teaches users not to open unexpected attachments or click unknown links. ClickFix bypasses both rules. The user is not opening an attachment or clicking a malicious link — they are following what appear to be legitimate technical instructions from a trusted-looking page. The familiar visual design of CAPTCHA prompts and Cloudflare verification screens is specifically chosen to lower suspicion. Effective defense requires endpoint controls that monitor for suspicious clipboard content being pasted into terminal processes, not just email filtering.

Studying Attacker Playbooks: What Defenders Should Do

Understanding attacker playbooks is not an academic exercise. It translates directly into improved detection engineering, incident response, and security architecture decisions. The defensive measures below are not a generic checklist — each one maps to a specific attacker behavior documented earlier in this article.

The Core Shift

Defenders who plan for multi-week dwell times and week-long response windows are calibrating to a threat landscape that no longer exists. The playbooks documented here are not aspirational attacker capabilities — they are the baseline. The question is not whether your organization could face a 29-minute breakout time. It is whether your detection and response capability is faster than that.

Build Exploitation Velocity Into Your Vulnerability Program

A CVSS score does not tell you how quickly a vulnerability is being weaponized. A CVE rated 8.1 with a proof-of-concept published 36 hours ago is a fundamentally different risk than a CVE rated 9.8 with no public exploit code. Yet most vulnerability management programs still prioritize purely by severity score. The fix is integrating exploitation velocity data into your triage process. Specifically: subscribe to CISA's Known Exploited Vulnerabilities (KEV) catalog as an automated trigger — any KEV addition that affects your internet-facing asset inventory should immediately initiate emergency patching procedures, not enter a monthly queue. Pair this with Rapid7's AttackerKB, GreyNoise, or Shodan monitoring to detect when scanning activity against a specific CVE spikes, which typically precedes broad exploitation by 24–48 hours. For internet-facing systems with critical severity CVEs that have confirmed public exploit code, the patching or compensating-control window is 24–72 hours, not 30 days. Anything longer treats a confirmed active emergency as a scheduled maintenance item.

Operationalize ATT&CK Coverage Mapping — Then Test It

Mapping your detection stack to ATT&CK is a starting point, not an endpoint. The MITRE ATT&CK Navigator is free and provides a visual layer to identify which techniques your SIEM, EDR, and network detection tools cover. But coverage claims mean nothing without validation. Use Atomic Red Team — an open-source library of ATT&CK-mapped test procedures from Red Canary — to execute actual technique simulations against your own environment and verify that your detection rules fire as expected. Priority techniques to validate based on the Picus Red Report 2026 are T1055 (Process Injection), T1562 (Impair Defenses), T1497 (Sandbox Evasion), and T1071 (Application Layer Protocol for C2 blending). If your tools claim coverage but tests do not produce alerts, your coverage is theoretical, not operational. Run these tests continuously as part of a breach and attack simulation (BAS) program, not as a one-time annual exercise.

Build Scenario-Specific Containment Playbooks With Defined Decision Points

A generic incident response plan is insufficient against playbooks that complete their full kill chain in hours. Organizations need response playbooks with enough specificity to execute without deliberation under pressure. Each scenario — ransomware deployment, identity compromise, supply chain alert, data-only extortion, ClickFix-delivered RAT — should have pre-authorized containment decisions built in. This means defining in advance which actions can be taken without a change management ticket: isolating a host, revoking an OAuth token, disabling an account, blocking a destination IP. The 5-day median dwell time and 29-minute lateral movement window mean that organizations requiring multi-hour approval chains for containment actions will consistently lag behind attacker timelines. Tabletop exercises should simulate time pressure specifically: if your team cannot make a host isolation decision in under 10 minutes without escalation, that is the gap to close. The CrowdStrike 1-10-60 benchmark — detect within 1 minute, triage within 10, contain within 60 — is a useful operational target even if you cannot immediately achieve it.

Redesign Identity Security Around the Assumption of Credential Theft

With 82 percent of detections now malware-free, the credential has replaced the exploit as the primary attacker entry point. The response requires more than deploying MFA — it requires designing identity infrastructure on the premise that credentials will be stolen and MFA fatigue attacks will occur. Practical steps in this direction: replace push-notification MFA on all privileged accounts with phishing-resistant alternatives (FIDO2 hardware tokens or passkeys) immediately, as push-based MFA is routinely bypassed via MFA bombing. Implement conditional access policies that evaluate device compliance, network location, and behavioral anomalies — not just credential validity — before granting access. Deploy an identity threat detection and response (ITDR) capability that monitors for impossible travel, new device enrollments, OAuth application consent grants, and service principal creation events. These are the behavioral signals that precede Scattered Spider-style lateral movement and that pure credential monitoring will miss entirely. For service accounts and privileged roles, enforce just-in-time access and time-limited privilege elevation rather than persistent standing access, reducing the value of any single compromised credential.

Shift LOTL Detection From Signature to Process Lineage

Detecting LOTL tradecraft requires a fundamentally different detection architecture than traditional signature-based tools. The key insight is that a malicious PowerShell invocation is not distinguishable from a legitimate one by the binary itself — only by its context: what process spawned it, what arguments it received, what network connections it made, and what files it touched immediately afterward. This is process lineage analysis, and it is the core of modern EDR behavioral detection. Specifically: build detection rules that alert on PowerShell spawned by Word.exe, Excel.exe, or browser processes; certutil.exe or bitsadmin.exe making outbound network connections; wmic or WScript.exe executing with encoded arguments; and scheduled tasks created by non-standard processes. Additionally, the Picus finding that adversaries are routing C2 through legitimate cloud services like AWS and OpenAI means network-layer detection needs to look for anomalous communication patterns to otherwise-trusted destinations, not just known malicious IPs. DNS query volume anomalies and unusual data transfer sizes to cloud storage endpoints are practical detection signals that do not require blocking legitimate services.

Implement Clipboard and Terminal Execution Controls for ClickFix

ClickFix bypasses email security and browser protections entirely by turning the user's own terminal into the payload delivery mechanism. Generic security awareness training does not close this gap because users are conditioned to interact with CAPTCHA and verification prompts, not to scrutinize them. Technical controls are required. Implement AppLocker or Windows Defender Application Control (WDAC) policies that restrict execution from paths and command patterns associated with ClickFix delivery — specifically: block mshta.exe from executing scripts downloaded from the internet, restrict PowerShell execution via Run dialog invocations where the parent process is explorer.exe, and deploy endpoint monitoring rules that flag paste-to-terminal sequences involving encoded commands (-EncodedCommand, Invoke-Expression, iex). At the network layer, monitor for DNS requests or outbound connections initiated within seconds of powershell.exe or mshta.exe starting from a user session context — this timing pattern is a reliable ClickFix behavioral indicator. For organizations that cannot immediately deploy technical controls, user training should be highly specific: any web page that instructs you to open the Run dialog, PowerShell, or Command Prompt and paste a command is an attack, regardless of how legitimate the page looks.

Apply Supply Chain Security Controls to Every Third Party With Privileged Access

Supply chain attacks succeed because defenders grant trust implicitly based on business relationships rather than verified security posture. The operational response requires treating every vendor, MSP, or SaaS integration with privileged access to your environment as a potential lateral movement path. Concrete measures: audit all third-party connections that have persistent, always-on access to your environment and eliminate any that are not operationally required. For those that remain, require vendor accounts to authenticate through your own identity provider (IdP) with your MFA policies applied, rather than accepting vendor-managed credentials. Implement network segmentation that prevents lateral movement from vendor-accessed systems to high-value internal targets — a compromise of your MSP's tools should not reach your domain controllers or backup infrastructure. Monitor vendor account activity for deviations from established behavioral baselines: commands, access times, and data volumes. Review CI/CD pipeline access permissions quarterly and apply the principle of least privilege to every pipeline credential, since pipeline credentials are a high-value target precisely because they carry code-signing authority and deployment permissions across multiple downstream environments.

Prepare for AI-Speed Attack Timelines With Automated Containment Logic

The near-term trajectory of agentic AI in attacker frameworks means that human-reviewed alert queues will be structurally insufficient for some attack categories. An AI-driven attack that modifies its evasion approach in response to what is blocking it, retrying on an alternative path within seconds, cannot be effectively countered by a human analyst triaging tickets. The appropriate response is not to try to out-speed human review, but to pre-define the conditions under which automated containment actions execute without human approval. This requires a structured approach: categorize your response actions by risk level (isolating a workstation carries different risk than revoking all sessions for an identity provider), pre-approve low-risk automated responses for high-confidence alert conditions, and build human escalation paths for higher-stakes decisions that can still be completed within minutes rather than hours. Security orchestration, automation, and response (SOAR) platforms provide the technical infrastructure for this, but the real work is in defining the decision logic — which alert combinations, at what confidence thresholds, justify which automated actions. Organizations that have done this work before an incident are positioned to contain AI-accelerated attacks; those that have not will find that their response velocity is bounded by human reaction time against an adversary that is not.

Conclusion

Attacker playbooks have become industrialized, repeatable, and increasingly efficient. The ransomware ecosystem operates as a mature supply chain, with specialized roles for access brokering, payload development, negotiation, and laundering. Nation-state actors have adopted the stealth tradecraft of criminal organizations — LOTL persistence, identity-layer exploitation, cloud-native C2. Criminal organizations have adopted the patience and operational discipline of nation-state actors — extended reconnaissance, affiliate standardization, target vetting.

Simultaneously, the playbooks themselves are accelerating. Breakout times measured in minutes, dwell times measured in days, and ClickFix compromising nearly half of all initial accesses observed by Microsoft's threat hunters — the operational tempo has changed. Defenders who plan for multi-week dwell times and week-long response windows are calibrating to a threat landscape that no longer exists.

For defenders, the response to this professionalization must be equally systematic. Understanding how attackers operate — mapping their playbooks, identifying the techniques they favor, and testing defenses against those specific behaviors — is the foundation of threat-informed defense. The organizations that will be most resilient in 2026 are not those with the largest security budgets, but those with the clearest understanding of how attacks unfold and the preparation to disrupt them at every stage.

Sources and Further Reading

Back to all articles