On February 18, 2026, cybersecurity firm Huntress released its 2026 Cyber Threat Report, painting a picture of a cybercrime ecosystem that has fully embraced industrialization. Based on an analysis of over 4.6 million endpoints, the report concludes that threat actors are operating like efficient businesses, standardizing their tactics to maximize scale and revenue. The key trend identified is a strategic shift away from high-cost, complex zero-day exploits towards simpler, more scalable techniques that abuse legitimate tools and compromised identities. This 'living off the land' methodology has proven highly effective and profitable.
The report also sounds the alarm on two significant trends: a massive 88% surge in attacks targeting the manufacturing sector and the increasing integration of AI into attacker tradecraft. Cybercriminals are now using AI for more than just writing phishing emails; they are using deepfakes for impersonation and weaponizing shared AI tools to deceive employees.
The core finding of the Huntress report is that cybercrime has become a 'business.' Threat actors are optimizing their operations for efficiency and return on investment. This involves:
The report specifically calls out an 88% year-over-year increase in attacks against the manufacturing industry, suggesting a concerted effort to target this sector, possibly due to its perceived lower security maturity and high potential for disruption.
The report warns of a new wave of AI-driven attack techniques:
T1078 - Valid Accounts: The report emphasizes the focus on compromising and using legitimate identities.T1059 - Command and Scripting Interpreter: A key part of 'living off the land' is the abuse of built-in scripting tools like PowerShell and Bash.T1566 - Phishing: Remains a primary initial access vector, now enhanced with malicious PDFs and AI-crafted lures.T1027 - Obfuscated Files or Information: Even when using legitimate tools, attackers use obfuscation to hide their commands and scripts.The industrialization of cybercrime has several key impacts:
D3-PA - Process Analysis.D3-UGLPA - User Geolocation Logon Pattern Analysis is a key technique here.D3-EAL - Executable Allowlisting.D3-MFA - Multi-factor Authentication.Use EDR and behavioral analytics to detect malicious use of legitimate tools, rather than relying on file signatures.
Mapped D3FEND Techniques:
Use application control to restrict which applications and scripts can be executed, preventing abuse of dual-use tools.
Mapped D3FEND Techniques:
Protecting identities with MFA is the most effective defense against attacks focused on credential compromise.
Mapped D3FEND Techniques:
Educate users about the increasing sophistication of phishing and social engineering, including AI-powered threats.
To counter the 'living off the land' trend, security operations must shift from signature-based detection to behavioral Process Analysis. Deploy an EDR solution capable of monitoring process lineage and command-line arguments. Create detection rules that alert on anomalous behavior involving legitimate tools. For example, trigger an alert when powershell.exe is spawned by a Microsoft Office application and makes a network connection, or when psexec.exe is used by an account outside of the IT administrators group. This focus on how tools are used, rather than what they are, is essential for catching attackers who are blending in with normal administrative activity.
Implement a policy of application control or executable allowlisting, especially on servers and critical workstations. This prevents any unauthorized software from running. More granularly, use policies to restrict who can run powerful scripting tools. For example, Windows Defender Application Control (WDAC) can be configured to block PowerShell execution for standard users while allowing it for administrators. This directly mitigates the risk of attackers abusing these built-in tools for execution and lateral movement, forcing them to use custom malware that is easier to detect.
As attackers focus on identity, defending identities becomes paramount. Implement Identity Threat Detection and Response (ITDR) capabilities that analyze logon patterns. This includes User Geolocation Logon Pattern Analysis, which can detect 'impossible travel' scenarios (e.g., a user logging in from North America and then Asia within an hour). It also includes baselining normal login behavior and alerting on deviations, such as logins from new devices, locations, or at unusual times. This is a powerful tool for detecting compromised credentials before they can be used for widespread access.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats