• About
  • Subscribe
  • Contact
Monday, December 29, 2025
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

The industrialisation of cybercrime in 2026

Allan Tan by Allan Tan
December 29, 2025

Photo by cottonbro studio: https://www.pexels.com/photo/woman-in-black-hoodie-using-a-laptop-5473310/

Share on FacebookShare on Twitter

In 2025, Ransomware as a Service (RaaS) underwent a profound shift from opportunistic, volume-driven attacks to highly targeted precision strikes, enabling affiliates to focus on high-value organisations with tailored reconnaissance and rapid execution.

This evolution has accelerated the industrialisation of cybercrime, lowering barriers for even low-skilled operators while amplifying disruption.

As we look to 2026, artificial intelligence is poised to supercharge the entire RaaS ecosystem—from automated victim selection and vulnerability exploitation to AI-driven phishing, polymorphic malware, and even autonomous extortion negotiations—making attacks faster, more evasive, and harder to trace.

For CISOs and cybersecurity leaders in Asia, where rapid digital transformation in sectors like finance, manufacturing, and critical infrastructure has outpaced mature defences in some markets, this convergence demands urgent attention. Prioritising cyber resilience, supply chain scrutiny, and AI-enhanced detection will be essential to counter these sophisticated threats in 2026.

In an exclusive with FutureCISO Martin Zugec, technical solutions director at Bitdefender, emphasised two major trends observed in 2025: opportunistic initial access combined with highly targeted execution. These developments underscore the industrialisation of cybercrime and the need for proactive, prevention-focused defences.

Opportunistic initial access and targeted execution

Zugec highlighted a fundamental shift in attack entry points. “Initial access is much more opportunistic than it used to be in the past, but the execution of the attack, the second stage, once they get inside, is much more targeted than it used to be,” he said. Attackers now exploit widely used software vulnerabilities as soon as proof-of-concept code emerges, rather than targeting specific organisations.

He explained: “Anytime there is one of these vulnerabilities… all the big cybercriminal groups are going to pretty much monitor the situation, and as soon as they have functional code, proof-of-concept code that they can use. They just compromise all the companies that are using that software.” Once inside, attackers focus on critical infrastructure to cause maximum disruption while maintaining secrecy, limiting negotiation leverage.

This rapid exploitation trend has accelerated since 2022, with mainstream adoption by 2025. Zugec noted that patching cycles have shrunk dramatically: “Today, you are down to less than 24 hours for the patching. That is the reality of 2025.”

Independent research supports this, with reports indicating that almost 30% of known exploited vulnerabilities are weaponised within 24 hours of disclosure.

The industrialisation of cybercrime

The industrialisation of cybercrime is directly reflected in Zugec’s observations about the maturation of RaaS into a gig-economy-like model, where low-skilled affiliates can execute sophisticated attacks using standardised playbooks.

Related:  Enhancing identity management for AI and non-human entities

He described the ecosystem as operating “really the same way as Uber or Airbnb,” with affiliates acting as the “drivers” who carry out hands-on operations. He further noted that “all of them are following very similar playbooks,” and “one of the groups discovered new attack, new technique, all of them are going to copy it.”

This rapid dissemination of techniques across groups is a hallmark of industrialised operations, enabling even less experienced actors to achieve high-impact results.

Rethinking business continuity for total paralysis

Precision ransomware targets infrastructure for total operational paralysis, rendering traditional business continuity plans (BCPs) inadequate. Zugec warned that attackers routinely compromise backups: “Every single ransomware group that we are tracking from the top 10… is going to cook up your backups.”

He added that backups, historically designed for natural disasters or errors, fail against malicious actors: “The window of opportunity is up until the attackers get the required permissions on your systems. But once they have it, once they launch the attack, it's really, really hard to get back.”

Zugec urged a shift to prevention: “CISO needs to do is they need to start designing their environments to be hostile for these attackers, to be unpredictable, to have honeypots deployed… start locking down the environment, start hardening it, start making it unpredictable for the attackers.”

The rise of AI-powered precision ransomware

The rise of AI-powered precision ransomware ties into the narrative’s emphasis on the shift to targeted, infrastructure-focused attacks in 2025, which Zugec predicts will continue and intensify into 2026.

While he remains sceptical about widespread offensive AI use today (“We have not seen any attackers in real life using AI”), he highlights emerging risks from agentic AI and rushed deployments creating “long-term security debt.”

The precision aspect is evident in his description of attackers moving from mass encryption to “much more targeted” strikes on critical infrastructure, aiming for “total operational paralysis.”

Zugec described himself as an “AI realist,” noting that AI-generated attacks remain “technically on lower-level text compared to attacks done by humans.”

Defensive AI, he argued, is mature: Bitdefender has used AI since 2008 and adversarial networks since 2019. Polymorphism, often hyped as AI-driven, has existed for over a decade. Real risks lie in agentic AI deployments: “Most of the deployments that exist are unsecured, and the protocol itself… the security included is optional.”

Related:  Retail sector is unable to halt ransomware attacks, study finds

Third-party reports align with Zugec's caution, with limited real-world AI-powered ransomware cases observed in 2025, often limited to proof-of-concepts.

Supply chain risks and third-party AI usage

Supply chain attacks remain challenging, exacerbated by generative AI. Zugec noted upstream compromises like SolarWinds and daily incidents involving vendors. Generative AI worsens this: “Gen AI is making this problem even worse than it was before… a lot of organizations are creating really long-term security debts with approach to AI.”

Large firms have robust processes, but smaller vendors rush implementations: “These smaller companies are taking shortcuts because they have to.” This trend is supported by reports of supply chain attacks doubling since April 2025.

Living-off-the-land dominance and detection challenges

Most attacks are malware-free: “84% of [incidents] were using this living off the land attack techniques,” Zugec said, citing Bitdefender research on 700,000 incidents. Attackers use built-in tools to target domain controllers and backups.

Detection requires human oversight: “If you don't have anyone monitoring these environments, you will not even know someone is in your network.” Zugec recommended cyber threat intelligence and EDR/XDR with monitoring, ideally via MDR for smaller organisations.

Building effective security teams

Zugec advised evaluating teams on people, processes, and technology: “If anyone tells you, we don't need people because we have AI, that is not going to be a really good experience for you.” He stressed threat intelligence to filter hype and prioritise real risks.

Zugec's perspective highlights a mature ransomware ecosystem where prevention, intelligence, and realistic assessments are essential. As threats evolve, organisations must adapt defences to counter opportunistic, targeted attacks effectively.

For cybersecurity leaders in Asia, the message is clear: 2026 demands a proactive pivot from reactive detection to prevention-focused resilience. Prioritise hardening environments against predictable playbooks, as Zugec recommends, while embracing threat intelligence to filter hype from real risks.

Invest in monitoring for living-off-the-land techniques, secure agentic AI deployments to avoid creating "long-term security debt," and strengthen supply chain scrutiny to counter upstream and third-party vulnerabilities.

By building unpredictable, hostile environments and fostering cross-border collaboration, CISOs can turn industrialised threats into managed risks—ensuring operational continuity amid an era of autonomous, precision ransomware.

Tags: BitdefenderRaaSransomware-as-a-service
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • The industrialisation of cybercrime in 2026
  • Security trails agentic AI adoption
  • Skyhigh security to simplify cloud compliance
  • API and identity exploits are the weakest links in Asia's cloud security
  • CrowdStrike extends Falcon to protect AI interactions

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl