Cloudflare's 2026 Threat Report Reveals Strategic Shift to Identity-Based Attacks and Credential Abuse

Cloudflare Report: Attackers Ditch Malware for Stolen Credentials, Shifting from 'Breaking In' to 'Logging In'

INFORMATIONAL
March 4, 2026
March 5, 2026
6m read
Threat IntelligenceThreat ActorCloud Security

Related Entities(initial)

Threat Actors

Salt TyphoonLinen Typhoon

Organizations

Products & Tech

Google CalendarMicrosoft Azure Google DriveMicrosoft TeamsAmazon S3Artificial Intelligence (AI)

Full Report(when first published)

Executive Summary

Cloudflare's 2026 Threat Report, published on March 3, 2026, articulates a pivotal trend in the cyber threat landscape: a strategic migration from 'breaking in' with exploits and malware to 'logging in' with legitimate, stolen credentials. This shift makes identity the new perimeter and credential abuse the primary vector for major security incidents, including ransomware. The report, analyzing data from 230 billion daily threats, finds that attackers are leveraging valid credentials to bypass traditional defenses and operate undetected within networks. The rise of Artificial Intelligence (AI) is further lowering the barrier for sophisticated attacks, while nation-state actors are refining their tactics. Chinese groups like Salt Typhoon and Linen Typhoon are pre-positioning on critical infrastructure, and various actors are abusing trusted cloud platforms like Google Calendar and Microsoft Azure for command-and-control (C2). The report concludes that modern defense must pivot to a zero-trust model focused on identity verification, continuous monitoring, and autonomous response systems.


Threat Overview

The core thesis of the report is that the modern attack surface is no longer just about network ports and software vulnerabilities; it is about human and machine identities. By obtaining and using valid credentials, attackers can circumvent many security layers designed to keep intruders out.

  • Primary Trend: The weaponization of identity has replaced malware as the biggest threat vector leading to ransomware and other major breaches.
  • Attacker Behavior: Instead of noisy 'smash-and-grab' intrusions, adversaries are using stolen credentials to appear as legitimate users, moving stealthily until they achieve their objectives.
  • Enabling Technology: AI and Large Language Models (LLMs) are being used to create realistic deepfakes, map networks, and develop novel exploits, making sophisticated attacks more accessible.
  • Nation-State Activity: Adversaries are specializing their TTPs. Chinese state-sponsored groups focus on long-term persistence in critical sectors, while others abuse legitimate SaaS platforms for C2, making their traffic difficult to distinguish from normal business activity.

Technical Analysis

The report details several key tactics, techniques, and procedures (TTPs) that define this new paradigm.

  • Initial Access: The primary method is T1078 - Valid Accounts. Credentials for these accounts are sourced from infostealer malware logs, previous data breaches, and phishing campaigns.
  • Defense Evasion: By using valid credentials, attackers inherently practice defense evasion. Their activities blend with normal user behavior, bypassing alerts based on anomalous software or network connections. This aligns with the broader goal of T1562 - Impair Defenses.
  • Command and Control: Threat actors are abusing legitimate, trusted cloud services to host their C2 infrastructure. The report cites a China-linked group using Google Calendar for C2 and an Iran-linked group using Microsoft Azure. This is a sub-technique of T1102 - Web Service, where attackers leverage trusted domains to hide their C2 traffic.
  • Persistence: The focus of groups like Salt Typhoon and Linen Typhoon on gaining footholds in telecommunications and IT services points to techniques like T1136.003 - Cloud Account to create new accounts for long-term access.

Impact Assessment

The shift to identity-based attacks has profound implications for organizations:

  • Increased Dwell Time: Attackers can remain undetected for longer periods, allowing them to conduct thorough reconnaissance and exfiltrate more data before being discovered.
  • Higher Impact Breaches: With legitimate access, attackers can more easily locate and exfiltrate or encrypt an organization's most valuable data, leading to more effective extortion.
  • Supply Chain Risk: As seen in one case cited, an attacker used AI to map a network and identify a high-value data location, enabling a supply chain attack that compromised hundreds of corporate tenants in SaaS environments.
  • Erosion of Trust: The abuse of legitimate platforms like Google Calendar, Microsoft Teams, and Amazon S3 for malicious purposes erodes the inherent trust organizations place in these essential business tools.

Detection & Response

Detecting an adversary who 'has the keys to the kingdom' requires a shift from perimeter-based detection to behavior-based analysis.

  1. User and Entity Behavior Analytics (UEBA): Deploy UEBA solutions to baseline normal user activity and detect deviations. This is critical for spotting a compromised account. Look for logins from unusual locations, access to resources outside of normal job functions, or activity at odd hours. This aligns with D3FEND's User Geolocation Logon Pattern Analysis (D3-UGLPA).
  2. Impossible Travel Alerts: Configure alerts for 'impossible travel' scenarios, where a single account logs in from geographically distant locations in a time frame that would be impossible to travel between.
  3. Egress Traffic Monitoring: Closely monitor outbound traffic from trusted cloud services. While the C2 traffic itself may be encrypted, look for anomalous data patterns, such as a user's Google Calendar making consistent, small data connections to an unknown external IP, or unusual data volumes being uploaded to S3. This is a core part of Network Traffic Analysis (D3-NTA).
  4. Assume Breach Mentality: Conduct regular threat hunting exercises based on the hypothesis that an attacker is already inside the network with valid credentials. Hunt for signs of lateral movement, credential dumping, and reconnaissance.

Mitigation

Mitigation strategies must focus on making credentials harder to steal and less useful if they are compromised.

  • Phishing-Resistant Multi-Factor Authentication (MFA): Mandate the use of phishing-resistant MFA, such as FIDO2 security keys, for all users, especially privileged ones. This is the single most effective control against credential theft and abuse. This is a direct implementation of Multi-factor Authentication (D3-MFA).
  • Zero Trust Architecture: Adopt a Zero Trust security model where no user or device is trusted by default, regardless of its location. Every access request should be authenticated, authorized, and encrypted. A key part of this is Network Isolation (D3-NI).
  • Privileged Access Management (PAM): Implement strict controls over privileged accounts. Use just-in-time (JIT) access to grant temporary elevated permissions and enforce session monitoring for all administrative activities. This aligns with Privileged Account Management (M1026).
  • Egress Filtering: Restrict outbound traffic from servers and endpoints to only known-good, required destinations. This can block C2 communication even when it's attempting to use a legitimate service on a non-standard port or to an unknown IP. This is Outbound Traffic Filtering (D3-OTF).
  • Employee Training: Continuously train employees to recognize and report sophisticated phishing and social engineering attempts. This is a foundational part of User Training (M1017).

Timeline of Events

1
March 3, 2026
Cloudflare publishes its 2026 Threat Report detailing the shift to identity-based attacks.
2
March 4, 2026
This article was published

Article Updates

March 5, 2026

Unit 42 report reveals AI-powered attacks shrink breach timelines to 72 minutes, with 89% of incidents involving compromised identity systems.

MITRE ATT&CK Mitigations

Implement phishing-resistant MFA (e.g., FIDO2) to prevent stolen credentials from being successfully used.

Mapped D3FEND Techniques:

Strictly control and monitor the use of privileged accounts to limit an attacker's ability to move laterally and access sensitive data.

Mapped D3FEND Techniques:

Train users to identify and report phishing attempts, reducing the supply of stolen credentials.

Implement egress filtering and a Zero Trust network architecture to block C2 channels and prevent lateral movement.

Mapped D3FEND Techniques:

Use UEBA to detect anomalous user behavior indicative of a compromised account.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Given the report's emphasis on credential abuse, the highest priority is to implement phishing-resistant Multi-Factor Authentication across the entire organization. This specifically means moving beyond SMS or push-based MFA, which are vulnerable to adversary-in-the-middle (AiTM) attacks, and adopting FIDO2/WebAuthn standards (e.g., YubiKeys, Windows Hello). This should be enforced for all access, including to SaaS applications, VPNs, and privileged systems. By requiring a hardware-bound cryptographic authenticator, organizations can effectively neutralize the threat of stolen passwords and session hijacking, directly countering the primary attack vector described in the Cloudflare report. The rollout should be prioritized for administrators, executives, and users with access to sensitive data before expanding to the entire user base.

To detect attackers who have successfully 'logged in', organizations must implement User and Entity Behavior Analytics (UEBA). A key component of this is User Geolocation Logon Pattern Analysis. Security teams should configure their SIEM or IdP to baseline normal login locations for every user. Alerts should be generated for any deviation, such as logins from a new country or city, and especially for 'impossible travel' scenarios. This technique moves detection beyond simple indicators and focuses on behavior. For example, if a US-based employee's account suddenly logs in from an IP address in Eastern Europe, it should trigger an immediate high-priority alert and automated response, such as forcing a password reset and terminating active sessions. This provides a critical detection layer for compromised identities.

To counter the abuse of legitimate cloud services like Google Calendar and Microsoft Azure for C2, organizations must implement strict egress filtering. The default policy should be to deny all outbound traffic from endpoints and servers. Exceptions should be created on an explicit allowlist basis for only necessary business functions. For example, a backend server should not need to communicate with calendar.google.com. By blocking such connections at the network edge, organizations can sever the attacker's C2 channel, even if they are using a trusted domain. This can be implemented using next-generation firewalls (NGFWs) and secure web gateways. This technique is crucial for containing a breach and preventing attackers from maintaining control over compromised assets.

Timeline of Events

1
March 3, 2026

Cloudflare publishes its 2026 Threat Report detailing the shift to identity-based attacks.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

threat intelligenceidentitycredential stuffingransomwarenation-stateC2zero trustAI

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.