M-Trends 2026 Report
Executive Edition
Mandiant
Foreword
M-Trends serves as a definitive look at the threats and tactics used in breaches, grounded in over 500k hours of frontline incident investigations conducted by Mandiant in 2025. Together with Google Threat Intelligence Group (GTIG), we have a comprehensive view of the modern threat landscape and emerging threats that are driving future attacks.
Recent GTIG reporting confirms adversaries are adopting AI. Threat actors are using large language models (LLMs) for hyper-personalized social engineering, malware that queries LLMs mid-execution to evade detection, and “distillation attacks” targeting proprietary machine learning logic. Mandiant red teams are incorporating AI-driven techniques into engagements to prepare organizations for these emerging threats; however, our M-Trends 2026 findings show that mitigating the human and systemic failures that enable breaches is mission critical.
A major takeaway from our 2025 incident engagements is that a subset of adversaries are remaining undetected on networks for longer periods of time, often by establishing persistence in edge devices that typically lack standard telemetry. Mandiant responded to enough of these types of incidents in 2025 that global median dwell time has risen to 14 days from 11 days in the previous reporting period, driven largely by long-term espionage and DPRK IT worker operations.
Other threat groups prioritize speed. We are observing a rising trend where initial access partners work directly with secondary groups rather than selling access on underground markets. This results in a “hand-off” that sometimes occurs in less than 30 seconds, creating a scenario where “minor” alerts can very quickly become major compromises.
Simultaneously, adversaries are systematically targeting infrastructure such as backups, identity services, and virtualization layers to deny recovery, putting immense pressure on organizations to pay ransom demands or risk losing the ability to recover.
To build true operational resilience, organizations must move at the speed of the adversary. A big part of that is understanding how adversaries are finding success. By closing critical visibility gaps and adopting defenses detailed in M-Trends 2026, enterprises can shift from reactive recovery to proactive containment before a minor alert becomes a catastrophic compromise.
The AI threat landscape
While adversaries are leveraging AI to accelerate their attacks, security teams are already using it as a force multiplier for defense.
A comprehensive overview of the 2025 threat landscape requires addressing adversary use of AI. Ongoing GTIG threat research confirms that threat actors are increasingly leveraging AI to achieve productivity gains, especially during early phases of the attack lifecycle like reconnaissance, social engineering, and malware development. We have observed adversaries using AI-themed lures, stealing credentials for AI applications, and deploying malware like PROMPTFLUX and PROMPTSTEAL that queries LLMs to evade detection. Furthermore, attackers are using “distillation attacks” to extract proprietary intellectual property and relying on AI tools within compromised environments. For example, Mandiant investigated a case where the QUIETVAULT credential stealer used a local AI command-line tool to execute prompts that helped locate and steal GitHub and NPM tokens.
However, we do not consider 2025 to be the year where breaches were the direct result of AI; the vast majority of successful intrusions still stem from fundamental human and systemic failures.
To address these emerging risks, organizations should adopt the Google Secure AI Framework (SAIF), actively incorporate AI-driven techniques like prompt injection into red teaming, and begin leveraging AI-powered defense as a force multiplier for their own security operations. For a deeper dive into securing AI-powered environments, read our recently published paper, AI risk and resilience: A Mandiant special report.
These examples show that adversaries are actively integrating AI into their attacks, adding a new layer of sophistication to their operations. However, these advanced tactics still rely on exploiting fundamental security gaps to succeed. As we now turn to the data from the frontlines, it is clear that while preparing for emerging threats like AI is crucial, mastering the fundamentals remains mission critical.
By the numbers
The metrics reported in M-Trends 2026 are based on Mandiant Consulting investigations of targeted attack activity conducted between Jan 1, 2025 and Dec 31, 2025.
The bottom line
Attackers are shifting their initial access strategies; exploits are still the most common, but rising to the number two spot is highly interactive, voice-based social engineering. At the same time, the global median dwell time has increased as sophisticated espionage groups and insider threats prioritize stealthy, long-term access. As adversaries look for opportunities to leverage and weaponize AI, exploit zero-day vulnerabilities on edge devices, and execute hand-offs between initial access partner and cybercrime groups, organizations should evolve beyond static defenses to continuously monitor identity behavior and infrastructure such as virtualization that has traditionally been outside the scope of EDR and other similar security tools.
What do I need to know?
What do we need to do?
A minor infection today can be a ransomware attack tomorrow
The bottom line
Closer collaboration between cybercriminal partners has collapsed the window for defense, shrinking the median time between opportunistic initial access from one group and the time at which a secondary threat group has access to just 22 seconds; down from previous years where it was closer to eight hours. This shift mandates that organizations treat low-impact alerts as critical indicators, necessitating immediate remediation before high-impact actors can capitalize on the access.
What do I need to know?
What do we need to do?
Ransomware is now a resilience problem
The bottom line
Ransomware groups are no longer just encrypting data; they are actively destroying the ability to recover. They target the most critical systems, effectively forcing a choice: pay or rebuild. True resilience now means designing networks so that recovery tools are segmented and protected. Locking down core systems and making it harder for attackers to move around inside the network gives security teams an advantage against today’s ransomware threats.
What do I need to know?
What do we need to do?
Multi-year intrusions highlighting extreme persistence
The bottom line
Prevention is ideal, but preparation is mandatory. Sophisticated threat actors are maintaining multi-year access by exploiting blind spots and administrative trust. If you cannot prove the scope of an intrusion due to logging gaps, you risk a loss of customer trust by being forced to assume and disclose a worst-case data theft. Treat visibility as a continuous audit to ensure you can detect and remediate these threats before they become unmanageable crises.
What do I need to know?
What do we need to do?
Adversary focus on virtualization infrastructure
The bottom line
Virtualization platforms have shifted from backend infrastructure to frontline targets. Attackers are exploiting the “Tier-0” nature of hypervisors to bypass guest-level defenses, embed deep persistence that survives standard remediation, and deploy ransomware at a level that renders traditional recovery impossible. Protecting this stack requires treating the management plane as an isolated critical asset, and eliminating severe logging blind spots to restore visibility.
What do I need to know?
What do we need to do?
Systematic exploitation of edge and core network devices
The bottom line
Attackers are weaponizing edge and core network devices to evade modern security tools, exploiting vulnerabilities faster than patches are released and abusing native device features to silently steal data. Because these critical gateways are frequently uncatalogued and unmonitored, they grant adversaries invisible, long-term access. Organizations should urgently prioritize comprehensive asset discovery, strict patch management, and centralized logging to reclaim control of their network perimeter.
What do I need to know?
What do we need to do?
The cascading impact of third-party SaaS compromises
The bottom line
The shift to cloud-first infrastructure has transformed SaaS applications into pathways for massive supply chain attacks. Threat actors are bypassing standard defenses by stealing integration tokens and exploiting unvetted third-party apps, turning a single vendor breach into a cascading enterprise crisis. Organizations should shift to continuous identity verification, strictly governing end-user application consent, and enforcing rigorous third-party risk management before procurement.
What do I need to know?
What do we need to do?