Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ghost Identities, Poisoned Accounts, & AI Agent Havoc

Posted on October 29, 2025October 29, 2025 By CWS

BeyondTrust’s annual cybersecurity predictions level to a yr the place outdated defenses will fail quietly, and new assault vectors will surge.
Introduction
The subsequent main breach will not be a phished password. It is going to be the results of a large, unmanaged id debt. This debt takes many kinds: it is the “ghost” id from a 2015 breach lurking in your IAM, the privilege sprawl from 1000’s of recent AI brokers bloating your assault floor, or the automated account poisoning that exploits weak id verification in monetary programs. All of those vectors—bodily, digital, new, and outdated—are converging on one single level of failure: id.
Primarily based on evaluation from BeyondTrust’s cybersecurity consultants, listed below are three vital identity-based threats that can outline the approaching yr:
1. Agentic AI Emerges because the Final Assault Vector
By 2026, agentic AI will likely be related to almost each expertise we function, successfully changing into the brand new middleware for many organizations. The issue is that this integration is pushed by a speed-to-market push that leaves cybersecurity as an afterthought.
This rush is creating a large new assault floor constructed on a traditional vulnerability: the confused deputy downside.
A “deputy” is any program with respectable privileges. The “confused deputy downside” happens when a low-privilege entity—like a consumer, account, or one other utility—tips that deputy into misusing its energy to realize excessive privileges. The deputy, missing the context to see the malicious intent, executes the command or shares outcomes past its authentic design or intentions.
Now, apply this to AI. An agentic AI software could also be granted least privilege entry to learn a consumer’s e mail, entry a CI/CD pipeline, or question a manufacturing database. If that AI, appearing as a trusted deputy, is “confused” by a cleverly crafted immediate from one other useful resource, it may be manipulated into exfiltrating delicate information, deploying malicious code, or escalating increased privileges on the consumer’s behalf. The AI is executing duties it has permission for, however on behalf of an attacker who doesn’t, and might elevate privileges primarily based on the assault vector.
Defender Tip:

This menace requires treating AI brokers as probably privileged machine identities. Safety groups should implement strict least privilege, guaranteeing AI instruments solely have absolutely the minimal permissions essential for particular duties. This consists of implementing context-aware entry controls, command filtering, and real-time auditing to stop these trusted brokers from changing into malicious actors by proxy.
2. Account Poisoning: The Subsequent Evolution of Monetary Fraud
Within the coming yr, count on a big rise in “account poisoning”, the place menace actors discover new methods to insert fraudulent billers and payees into client and enterprise monetary accounts at scale.
This “poison” is pushed by automation that permits for the creation of payees and billers, the requesting of funds, and linking to different on-line cost processing sources. This assault vector is especially harmful as a result of it exploits weaknesses in on-line monetary programs, leverages poor secrets and techniques administration to assault in bulk, and makes use of automation to obfuscate the transactions.
Defender Tip:
Safety groups should transfer past flagging particular person account takeovers and concentrate on high-velocity, automated modifications to payee and biller data. The bottom line is implementing tighter diligence and id confidence checks for any automated course of that requests to change these monetary fields.
3. Ghosts in Your IAM: Historic Identification Compromises Catch Up
Many organizations are lastly modernizing their id and entry administration (IAM) applications, adopting new instruments, like graph-based analytics, to map their advanced id landscapes. In 2026, these efforts will uncover skeletons within the closet: “ghost” identities from long-past options and breaches that have been by no means detected.
These “backdated breaches” will reveal rogue accounts—some years outdated—that stay in lively use. As a result of these compromises are older than most safety logs, it could be unattainable for groups to find out the total extent of the unique breach.
Defender Tip:
This prediction underscores the long-standing failure of primary joiner-mover-leaver (JML) processes. The rapid takeaway is to prioritize id governance and use fashionable id graphing instruments to seek out and remove these dormant, high-risk accounts earlier than they’re rediscovered by attackers.
Different Tendencies on the Radar
The Loss of life of the VPN
For years, the VPN was the workhorse of distant entry, however in fashionable distant entry, VPN is a vital vulnerability ready to be exploited. Risk actors have mastered VPN exploitation strategies, utilizing credential harvesting and compromised home equipment for persistent entry. Utilizing conventional VPNs for privileged entry presents a threat that organizations can now not afford.
The Rise of AI Veganism
As a cultural counterforce, 2026 will witness the rise of “AI veganism”, the place staff or prospects abstain from utilizing synthetic intelligence on precept. This motion, pushed by moral considerations over information sourcing, algorithmic bias, and environmental prices, will problem the idea that AI adoption is inevitable. Corporations must navigate this resistance by providing clear governance, human-first options, and clear opt-outs. Nonetheless, in relation to cybersecurity, opting out of AI-driven defenses could also be much less of an choice and will even shift legal responsibility again to the consumer.
An Identification-First Safety Posture is Non-Negotiable
The widespread thread by way of these 2026 predictions is id. The brand new AI assault floor is an identity-privilege downside, account poisoning is an id verification downside, whereas backdated breaches are an id lifecycle downside. Because the perimeter widens, organizations should undertake an identity-first safety posture by making use of ideas of least privilege and 0 belief to each human and non-human id.
Need to get a deeper have a look at all of BeyondTrust’s 2026 cybersecurity predictions? Learn the total report right here.
Be aware: This text was written and contributed by Morey J. Haber, Chief Safety Advisor; Christopher Hills, Chief Safety Strategist; and James Maude, Subject Chief Expertise Officer at BeyondTrust.

Discovered this text fascinating? This text is a contributed piece from considered one of our valued companions. Observe us on Google Information, Twitter and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Accounts, Agent, Ghost, Havoc, Identities, Poisoned

Post navigation

Previous Post: Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics
Next Post: AI Security Firm Polygraf Raises $9.5 Million in Seed Funding

Related Posts

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution The Hacker News
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login The Hacker News
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools The Hacker News
CISO’s Guide To Web Privacy Validation And Why It’s Important The Hacker News
5 Lessons from River Island The Hacker News
Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
  • 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester
  • MITRE Unveils ATT&CK v18 With Updates to Detections, Mobile, ICS
  • AI Security Firm Polygraf Raises $9.5 Million in Seed Funding
  • Ghost Identities, Poisoned Accounts, & AI Agent Havoc

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
  • 10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester
  • MITRE Unveils ATT&CK v18 With Updates to Detections, Mobile, ICS
  • AI Security Firm Polygraf Raises $9.5 Million in Seed Funding
  • Ghost Identities, Poisoned Accounts, & AI Agent Havoc

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News