Cloudflare's 2026 Threat Report, published on March 3, 2026, articulates a pivotal trend in the cyber threat landscape: a strategic migration from 'breaking in' with exploits and malware to 'logging in' with legitimate, stolen credentials. This shift makes identity the new perimeter and credential abuse the primary vector for major security incidents, including ransomware. The report, analyzing data from 230 billion daily threats, finds that attackers are leveraging valid credentials to bypass traditional defenses and operate undetected within networks. The rise of Artificial Intelligence (AI) is further lowering the barrier for sophisticated attacks, while nation-state actors are refining their tactics. Chinese groups like Salt Typhoon and Linen Typhoon are pre-positioning on critical infrastructure, and various actors are abusing trusted cloud platforms like Google Calendar and Microsoft Azure for command-and-control (C2). The report concludes that modern defense must pivot to a zero-trust model focused on identity verification, continuous monitoring, and autonomous response systems.
The core thesis of the report is that the modern attack surface is no longer just about network ports and software vulnerabilities; it is about human and machine identities. By obtaining and using valid credentials, attackers can circumvent many security layers designed to keep intruders out.
The report details several key tactics, techniques, and procedures (TTPs) that define this new paradigm.
T1078 - Valid Accounts. Credentials for these accounts are sourced from infostealer malware logs, previous data breaches, and phishing campaigns.T1562 - Impair Defenses.T1102 - Web Service, where attackers leverage trusted domains to hide their C2 traffic.T1136.003 - Cloud Account to create new accounts for long-term access.The shift to identity-based attacks has profound implications for organizations:
Detecting an adversary who 'has the keys to the kingdom' requires a shift from perimeter-based detection to behavior-based analysis.
User Geolocation Logon Pattern Analysis (D3-UGLPA).Network Traffic Analysis (D3-NTA).Mitigation strategies must focus on making credentials harder to steal and less useful if they are compromised.
Multi-factor Authentication (D3-MFA).Network Isolation (D3-NI).Privileged Account Management (M1026).Outbound Traffic Filtering (D3-OTF).User Training (M1017).Unit 42 report reveals AI-powered attacks shrink breach timelines to 72 minutes, with 89% of incidents involving compromised identity systems.
Implement phishing-resistant MFA (e.g., FIDO2) to prevent stolen credentials from being successfully used.
Mapped D3FEND Techniques:
Strictly control and monitor the use of privileged accounts to limit an attacker's ability to move laterally and access sensitive data.
Train users to identify and report phishing attempts, reducing the supply of stolen credentials.
Implement egress filtering and a Zero Trust network architecture to block C2 channels and prevent lateral movement.
Mapped D3FEND Techniques:
Use UEBA to detect anomalous user behavior indicative of a compromised account.
Mapped D3FEND Techniques:
Given the report's emphasis on credential abuse, the highest priority is to implement phishing-resistant Multi-Factor Authentication across the entire organization. This specifically means moving beyond SMS or push-based MFA, which are vulnerable to adversary-in-the-middle (AiTM) attacks, and adopting FIDO2/WebAuthn standards (e.g., YubiKeys, Windows Hello). This should be enforced for all access, including to SaaS applications, VPNs, and privileged systems. By requiring a hardware-bound cryptographic authenticator, organizations can effectively neutralize the threat of stolen passwords and session hijacking, directly countering the primary attack vector described in the Cloudflare report. The rollout should be prioritized for administrators, executives, and users with access to sensitive data before expanding to the entire user base.
To detect attackers who have successfully 'logged in', organizations must implement User and Entity Behavior Analytics (UEBA). A key component of this is User Geolocation Logon Pattern Analysis. Security teams should configure their SIEM or IdP to baseline normal login locations for every user. Alerts should be generated for any deviation, such as logins from a new country or city, and especially for 'impossible travel' scenarios. This technique moves detection beyond simple indicators and focuses on behavior. For example, if a US-based employee's account suddenly logs in from an IP address in Eastern Europe, it should trigger an immediate high-priority alert and automated response, such as forcing a password reset and terminating active sessions. This provides a critical detection layer for compromised identities.
To counter the abuse of legitimate cloud services like Google Calendar and Microsoft Azure for C2, organizations must implement strict egress filtering. The default policy should be to deny all outbound traffic from endpoints and servers. Exceptions should be created on an explicit allowlist basis for only necessary business functions. For example, a backend server should not need to communicate with calendar.google.com. By blocking such connections at the network edge, organizations can sever the attacker's C2 channel, even if they are using a trusted domain. This can be implemented using next-generation firewalls (NGFWs) and secure web gateways. This technique is crucial for containing a breach and preventing attackers from maintaining control over compromised assets.
Cloudflare publishes its 2026 Threat Report detailing the shift to identity-based attacks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.