Data Security Wake-Up Call: How Modern Cyberattacks Are Redefining Privacy and Compliance
Key Highlights
- Cloud intrusions have surged 136% in 2025, with 81% of attacks now bypassing malware entirely by exploiting stolen credentials and legitimate cloud tools.
- Threat actors, including state-linked groups, are increasingly blending in as employees or administrators, even using generative AI to secure jobs and maintain insider access to sensitive data.
- Traditional compliance and perimeter-based defenses are failing, making zero-trust architectures, identity-centric security, and real-time data visibility essential for resilience.
The numbers tell a sobering story.
Cloud intrusions surged 136% in just the first half of 2025, according to CrowdStrike's latest Threat Hunting Report. But here's what should keep data protection officers awake at night: 81% of these intrusions used zero malware.
No viruses, no trojans, just stolen credentials and patient adversaries who understand your compliance frameworks better than you might think.
This isn't your traditional cyberattack narrative, and today's threat actors aren't just breaking down digital doors. They're walking through them with legitimate keys, exploiting the very tools and processes organizations rely on for innovation and efficiency.
For those responsible for data security, privacy, and compliance, this evolution demands a fundamental rethinking of protection strategies.
When Legitimate Access Becomes the Weapon
The shift away from malware-based attacks represents a complete reimagining of how data breaches occur. China-nexus groups like GENESIS PANDA and MURKY PANDA have demonstrated sophisticated understanding of cloud infrastructure, using Instance Metadata Services to obtain credentials and then leveraging those credentials for systematic data harvesting.
Consider GENESIS PANDA's approach. After compromising a cloud-hosted server, they query metadata services to obtain cloud control plane credentials. From there, they execute bulk exports from storage buckets, create backdoor accounts for persistent access, and deploy custom tools to automate sensitive data discovery.
All this activity generates minimal security alerts because it uses legitimate cloud management APIs. Your security systems see authorized API calls, not a data breach in progress.
This presents a compliance nightmare. Traditional data loss prevention solutions struggle to distinguish between legitimate administrative activity and malicious data collection when the adversary is using valid credentials and standard tools.
The result? Organizations may not even realize they've experienced a data breach until long after sensitive information has been compromised.
Organizations may not even realize they've experienced a data breach until long after sensitive information has been compromised.
AI-Powered Insider Threat Revolution
Perhaps the most disturbing trend in data security comes from the weaponization of generative AI by insider threats. FAMOUS CHOLLIMA, a North Korea-linked group, has infiltrated over 320 companies in the past year—a 220% increase—by using AI at every stage of their operations. They're not breaking in; they're getting hired.
These operatives use AI to craft compelling resumes, deploy deepfake technology during video interviews, and leverage AI coding assistants to appear productive while systematically harvesting sensitive data. Once inside, they use AI translation tools and chatbots to manage multiple simultaneous employments, responding to communications and maintaining their cover while exfiltrating intellectual property, source code, and customer data.
The privacy and compliance implications are profound. When threat actors become legitimate employees, they gain authorized access to everything from HR systems containing personal information to development environments with proprietary code. They attend meetings where sensitive strategies are discussed. They have valid reasons to access customer databases and financial records.
Traditional insider threat programs, designed to catch disgruntled employees or careless mistakes, are wholly unprepared for AI-enhanced adversaries who can manage three or four simultaneous positions while appearing to be model employees.
What makes this particularly challenging is that these operatives often target roles with elevated data access—software developers, database administrators, and IT personnel. They're not interested in quick theft; they establish long-term positions that provide sustained access to flows of sensitive information.
By the time organizations discover the deception, months of data may have been compromised, affecting not just corporate secrets but also the personal information of employees and customers.
By the time organizations discover the deception, months of data may have been compromised
Cloud Environments: The New Data Exfiltration Highway
The 136% surge in cloud intrusions reflects a fundamental shift in how organizations must think about data protection. Cloud environments offer adversaries multiple advantages: elastic computing resources, legitimate-looking traffic patterns, and often inconsistent security controls across different services and regions.
Consider how modern ransomware groups operate. They've moved beyond simply encrypting endpoint data. Groups like BLOCKADE SPIDER now compromise cloud environments to access backup systems, dump credentials from virtualization platforms, and establish multiple persistence mechanisms across both on-premises and cloud infrastructure. They understand that to maximize leverage for ransom demands, they need to compromise not just primary data but also the backups and disaster recovery systems organizations rely on.
This cross-domain movement is particularly challenging for compliance teams. Data that might be properly protected in one environment becomes vulnerable when accessed through another. A database that's encrypted at rest and protected by strong access controls becomes an open book when an attacker compromises the virtualization layer it runs on.
Building Resilience in a Zero-Trust World
So how do organizations protect data when the perimeter is dead and adversaries hold legitimate credentials? The answer lies in adopting a data-centric security model that assumes breach and builds protection around the data itself, not just the systems that house it.
First, implement true zero-trust architecture for data access. This means encrypting data not just at rest and in transit, but in use. It means attribute-based access controls that consider not just who is accessing data, but when, from where, and in what context. When GENESIS PANDA uses legitimate credentials to execute bulk exports, these contextual factors can flag the activity as suspicious even though the credentials are valid.
Second, rethink identity as your new perimeter. With 81% of intrusions being malware-free, identity and access management becomes your primary defense. This requires continuous verification, behavioral baselines, and the ability to detect anomalous access patterns in real-time. When SCATTERED SPIDER compromises an executive account and immediately downloads years of data, the unusual behavior should trigger alerts—even with valid credentials.
Third, embrace transparency in your data architecture. You can't protect what you can't see. Comprehensive audit logging must track all data interactions across every communication channel. When adversaries can pivot from compromise to exfiltration in minutes, real-time visibility into data flows becomes critical for both security and compliance.
The key is integration. These capabilities must work together seamlessly, with suspicious identity behavior triggering enhanced monitoring, unusual access patterns prompting additional authentication, and every interaction logged and analyzed. This creates a resilient defense that adapts to evolving threats while providing the forensic data essential for compliance.
Compliance Evolution
Most importantly, it means aligning compliance activities with actual threat intelligence rather than theoretical risks.
Traditional compliance frameworks weren't designed for a world where adversaries use legitimate tools and credentials. They assume binary states—you're either compliant or you're not.
But when an attacker with valid credentials exports data through approved channels, when does a compliant system become non-compliant?
Organizations need to evolve their compliance programs from checklist exercises to dynamic risk management. This means continuous monitoring rather than point-in-time assessments. It means assuming that some level of compromise is inevitable and building compensating controls.
Most importantly, it means aligning compliance activities with actual threat intelligence rather than theoretical risks.
Securing Data When the Adversary Already Has the Keys
The data security landscape has fundamentally changed. Adversaries no longer need malware when they can steal or socially engineer their way to legitimate credentials. They don't need to break encryption when they can access data through the same interfaces your administrators use. They don't need sophisticated exploits when patient, persistent presence yields better results.
For organizations serious about protecting data in this new reality, the path forward is clear. Adopt zero-trust principles not as a buzzword but as an operational reality. Invest in identity security with the same rigor previously reserved for network security. Build visibility across all domains where your data lives and moves.
And perhaps most importantly, accept that in a world where legitimate access becomes the attack vector, protecting data requires thinking like an adversary who already has the keys to your kingdom.
The question isn't whether adversaries will target your data—they already are. The question is whether your defenses have evolved to meet them where they operate: inside your environment, using your tools, with legitimate credentials. The 136% surge in cloud intrusions isn't a statistic; it's a wake-up call that the future of data security has already arrived.
About the Author

Tim Freestone
chief strategy officer at Kiteworks
Tim Freestone, the chief strategy officer at Kiteworks, is a senior leader with over 18 years of expertise in marketing leadership, brand strategy, and process and organizational optimization. Since joining Kiteworks in 2021, he has played a pivotal role in shaping the global content governance, compliance, and protection landscape. He can be reached at [email protected].