Supply Chain Attacks & AI-Powered Phishing Surge Across Asia-Pacific, Darktrace Warns

Darktrace Report Reveals Escalation of Supply Chain Attacks, Cloud Intrusions, and AI-Enhanced Phishing in APJ Region

INFORMATIONAL
November 19, 2025
7m read
Threat IntelligenceSupply Chain AttackPhishing

Related Entities

Organizations

Products & Tech

Generative AI

Full Report

Executive Summary

A new threat report from Darktrace reveals a significant and complex evolution of the threat landscape in the Asia-Pacific and Japan (APJ) region. The report, analyzing data up to July 2025, identifies three major trends: a sharp increase in attacks targeting the third-party supply chain, a surge in cloud-focused intrusions, and the weaponization of generative AI to enhance business email compromise (BEC) and phishing campaigns. State-affiliated actors, including China's APT40 and APT41 and North Korea's Lazarus Group (specifically the Bluenoroff subgroup), are using AI to craft highly convincing, localized phishing lures, leading to a 1,700% increase in Japanese-language phishing. The report underscores the growing challenge of securing complex, interconnected digital environments.


Threat Overview

Key Threat Trends in APJ:

  1. AI-Powered Social Engineering: Threat actors are using generative AI to automate and scale sophisticated social engineering attacks. This includes creating grammatically perfect, context-aware phishing emails in local languages, which bypass traditional detection methods. This enhances techniques like T1566 - Phishing.
  2. Supply Chain Attacks: Attackers are increasingly targeting smaller, less-secure vendors to gain access to larger, high-value organizations. The report notes that 15% of data breaches are linked to vulnerabilities in upstream vendors, a classic T1195 - Supply Chain Compromise tactic.
  3. Cloud Intrusions: With rapid cloud adoption in the region, attackers are exploiting misconfigurations and vulnerabilities in cloud environments. These incidents are often harder and take longer to investigate and remediate than on-premises breaches.
  4. Advanced Voice Phishing (Vishing): Groups like Scattered Spider are using advanced vishing techniques, often combined with social engineering, to manipulate employees into giving up credentials or MFA codes.

Technical Analysis

State-sponsored groups are at the forefront of these advanced attacks:

  • APT40, APT41 (China): These groups are leveraging generative AI for reconnaissance, malware development, and creating highly targeted spear-phishing emails that are difficult to distinguish from legitimate communications.
  • Lazarus Group/Bluenoroff (North Korea): Known for financial motivation, this group is using AI to enhance its phishing campaigns targeting the financial sector across the APJ region.
  • Scattered Spider: This group specializes in social engineering, often targeting IT help desks. They use vishing calls to convince support staff to reset passwords or MFA tokens for high-privilege accounts, enabling them to gain initial access.

Impact Assessment

  • Increased Attack Sophistication: The use of generative AI lowers the barrier for creating convincing, widespread phishing campaigns, making every organization a potential target.
  • Financial Losses: The average cost of a supply chain breach has risen to US$4.91 million, reflecting the complex and damaging nature of these incidents.
  • Extended Incident Response: Cloud intrusions take, on average, three to five days longer to resolve than on-premises incidents, leading to prolonged operational disruption and increased costs.
  • Geopolitical Risk: The activities of state-linked APT groups are often tied to geopolitical tensions, with government, critical infrastructure, and key economic sectors being primary targets for espionage and disruption.

Detection & Response

  • Behavioral-Based Detection: Traditional signature-based tools are ineffective against AI-generated, novel phishing emails. Organizations need AI-powered security tools that can analyze the context and behavior of emails to detect anomalies, a principle of D3FEND's D3-UBA - User Behavior Analysis.
  • Cloud Security Posture Management (CSPM): Deploy CSPM tools to continuously monitor cloud environments for misconfigurations, vulnerabilities, and compliance violations.
  • Supply Chain Risk Management: Implement a robust third-party risk management program. This includes security assessments of all vendors, contractual security requirements, and monitoring for breaches within your supply chain.
  • Vishing Drills: Incorporate vishing scenarios into security awareness training to prepare employees, especially IT help desk staff, to recognize and resist voice-based social engineering tactics.

Mitigation

  1. Assume Email Compromise: Operate under a Zero Trust model that assumes emails can be malicious. Implement advanced email security that analyzes email headers, sender reputation, and content for signs of phishing.
  2. Phishing-Resistant MFA: Mandate the use of FIDO2/WebAuthn or other phishing-resistant MFA to protect against credential theft, even if an employee is tricked by a sophisticated lure. This implements D3FEND's D3-MFA - Multi-factor Authentication.
  3. Harden the Supply Chain: Scrutinize the security practices of all third-party vendors. Require them to adhere to your security standards and use tools to gain visibility into the security posture of your software supply chain.
  4. Cloud Native Application Protection Platform (CNAPP): For cloud environments, adopt a CNAPP solution that combines CSPM, Cloud Workload Protection (CWPP), and other capabilities into a single platform for comprehensive visibility and protection.

Timeline of Events

1
September 1, 2024
Start of a period showing a 1,700% rise in Japanese-language phishing emails, ending in October 2025.
2
July 1, 2025
End of the 12-month period analyzed in the Darktrace APJ threat report.
3
November 19, 2025
This article was published

MITRE ATT&CK Mitigations

Crucial for defending against sophisticated social engineering, phishing, and vishing attacks.

Implementing phishing-resistant MFA is the best technical control against credential theft.

Mapped D3FEND Techniques:

Extending vulnerability management programs to include third-party vendors and the software supply chain is essential.

D3FEND Defensive Countermeasures

To combat the AI-enhanced social engineering described in the Darktrace report, organizations must adopt User Behavior Analysis. Signature-based email filters will fail against novel, AI-generated lures. A UBA system, however, can detect subtle anomalies that indicate a phishing attempt or a compromised account. It can analyze the linguistic style of an incoming email and compare it to the sender's historical baseline, flagging deviations. More importantly, it monitors post-compromise behavior. If an employee clicks a link and their account suddenly starts accessing unusual files or attempting to connect to a new external service, the UBA system can correlate these events and identify the compromise in near real-time, enabling a swift response.

The rise in supply chain attacks necessitates a programmatic approach to Vendor Security Assessment. Organizations in the APJ region and globally must move beyond simple questionnaires. This involves implementing continuous monitoring of third-party vendors' external attack surfaces, demanding evidence of their security controls (e.g., SOC 2 reports), and writing specific security requirements into contracts. For critical software vendors, organizations should require a Software Bill of Materials (SBOM) to gain visibility into third-party components. This proactive due diligence allows an organization to identify and mitigate risks within its supply chain before they can be exploited by threat actors, directly addressing the trend highlighted by Darktrace.

Sources & References

Darktrace APJ Threat Report shows supply chain at increasing risk
MySecurity Marketplace (mysecuritymarketplace.com) November 19, 2025
Unit 42 Threat Bulletin – November 2025
Unit 42 (paloaltonetworks.com) November 19, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Threat IntelligenceDarktraceAPTSupply Chain AttackPhishingGenerative AIAPJ

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading