423 financial services organizations named on leak sites
The CrowdStrike 2026 Financial Services Threat Landscape Report, released on May 20, 2026, paints a dire picture of the threats facing the global financial sector. The report highlights a 43% global increase in hands-on-keyboard intrusions against financial institutions over the past two years. State-sponsored actors from the Democratic People’s Republic of Korea (DPRK) are leading the charge, having stolen billions in cryptocurrency in 2025. The DPRK group PRESSURE CHOLLIMA was responsible for the largest single financial theft ever recorded at $1.46 billion, achieved via a supply chain compromise. Concurrently, organized eCrime syndicates like MUTANT SPIDER are scaling their operations, using vishing and a network of initial access brokers to fuel ransomware attacks. Attackers are evolving their tactics, focusing on the exploitation of trusted identities and SaaS applications to circumvent traditional security measures.
The report identifies several key trends and threat actors targeting the financial industry:
DPRK-Nexus Adversaries: North Korean groups remain the most formidable state-sponsored financial threat.
eCrime Syndicates: Financially motivated criminal groups are increasing the volume and sophistication of their attacks.
Attackers are focusing on identity and trusted relationships to bypass defenses:
T1195.002 - Compromise Software Supply Chain: As demonstrated by PRESSURE CHOLLIMA, compromising a single piece of software used by many financial institutions can lead to a massive, widespread breach.T1566.003 - Spearphishing via Service: GOLDEN CHOLLIMA's use of recruitment-themed lures on platforms like LinkedIn is a classic example of this technique.T1648 - Vishing: MUTANT SPIDER's primary initial access method, where they call employees pretending to be IT support to trick them into giving up credentials or MFA codes.T1078 - Valid Accounts: The end goal of many of these initial access techniques is to obtain legitimate credentials, which are then used to access SaaS applications and cloud environments, blending in with normal user activity.The financial impact of these campaigns is staggering, with billions of dollars in cryptocurrency stolen. This not only causes direct financial loss but also undermines trust in the digital asset ecosystem. The 43% increase in hands-on intrusions indicates that attackers are spending more time within victim networks, allowing for deeper compromise and greater data theft. The targeting of SaaS applications is particularly concerning, as these often hold a company's most sensitive data and are managed outside the traditional network perimeter, making them a blind spot for some security teams.
Implement phishing-resistant MFA (FIDO2) to defend against vishing and other credential theft techniques.
Train employees to recognize sophisticated social engineering attacks, including vishing and AI-powered lures.
To counter the 43% spike in hands-on-keyboard intrusions, which rely on compromised identities, financial institutions must implement robust account monitoring, particularly within their cloud and SaaS environments. This goes beyond standard logging. It involves using an Identity Threat Detection and Response (ITDR) solution to baseline normal user behavior and detect anomalies. For example, the system should alert if a user account that has always logged in from the US suddenly authenticates from North Korea, or if an account attempts to access a sensitive SaaS application for the first time. It should also flag impossible travel scenarios, concurrent sessions from different locations, and unusual privilege escalations. This is critical for detecting when legitimate credentials, stolen via vishing or other means, are being abused by an attacker.
The success of MUTANT SPIDER's vishing campaigns highlights the need for advanced user behavior analysis. IT and security teams should monitor for patterns indicative of a vishing attack. This includes a user suddenly making multiple, frantic password reset requests, or a sequence of repeated, rejected MFA push notifications over a short period. These patterns suggest an attacker is on the phone with the user, pressuring them to approve an MFA prompt ('MFA fatigue') or provide a code. An automated system that detects this sequence of events (e.g., >3 MFA rejections in 5 minutes for one user) should trigger an alert and potentially temporarily lock the account, giving the security team time to intervene and contact the user through a separate channel to verify their identity.
Throughout 2025, DPRK-linked actors stole billions in digital assets.
CrowdStrike releases its 2026 Financial Services Threat Landscape Report.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.