In 2026, incident response (IR) will continue its shift away from traditional malware-centric investigations toward identity-driven intrusions, abuse of trusted cloud services, and low-signal, high-impact activity that blends seamlessly into normal business operations. Rather than relying on technical exploits, threat actors are prioritizing legitimate access, persistence, and operational efficiency, enabling them to evade users, security controls, and automated detection.
Over the last 12 months, we saw phishing and social engineering as the initial intrusion vector for 40% of all our cases worldwide, more than double the next two most popular vectors, credential abuse and CVE exploitation. Despite massive advancements in email security, attackers have been able to circumvent traditional defenses by avoiding traditional malware.
As a result, incidents will be defined less by obvious compromise indicators and more by subtle misuse of authentication flows, cloud applications, and established business workflows, challenging defenders to distinguish malicious activity from routine behavior.
By 2026, compromise will look less like an intrusion and more like business as usual.
Modern compromises will increasingly resemble normal user behavior rather than traditional breaches. Threat actors will continue to deprioritize malware in favor of abusing identity systems, cloud access, and trusted applications.
Attackers will increasingly rely on:
Investigations will hinge on identity telemetry, including authentication and sign-in logs, token lifetimes, OAuth grants, consent history, and anomalous access patterns, rather than traditional endpoint artifacts or malware analysis.
Attackers will increasingly establish persistence through API-driven access paths, using OAuth primarily as the authorization layer rather than the end goal. Once access is granted, malicious activity shifts to app-only and background API operations that require no user interaction and often survive password resets, MFA resets, and session revocation.
This enables durable, low-noise persistence that bypasses traditional identity-based remediation and is difficult to detect using login-centric controls.
OAuth gets them in, APIs keep them there.
OAuth-based persistence will mature into a default post-compromise technique, including:
2026 reality: Attackers will increasingly pivot into trusted integrations instead of individual users, relying on API access that blends into normal business operations.
Persistence is no longer about staying logged in, it’s about staying authorized.
Attackers will rely less on passwords and more on authorized access that survives remediation; OAuth apps, API tokens, and third-party integrations that look legitimate and quietly persist. IR timelines will increasingly require app-level analysis, not just account resets. Missed OAuth artifacts will result in re-compromise.
BEC is no longer about tricking users into clicking malicious links. Instead, it has evolved into quietly operating inside trusted business environments using legitimate access. BEC is no longer strictly an email problem, either. It is now an identity and collaboration abuse problem.
BEC will increasingly expand into:
IR teams must correlate email, collaboration platforms, file access, and finance workflows to fully scope impact. BEC no longer lives in the inbox, it lives inside the business.
While there are still plenty of attacks involving living-off-the-land tactics with tools like Powershell or WMI, in cloud-centric incidents, the environment itself becomes the weapon. Rather than deploying malware or external tooling, threat actors increasingly abuse native tenant features, trusted services, and existing configurations to establish and maintain access.
Attackers will increasingly rely on:
When attackers no longer need tools, the tenant itself becomes the attack surface. The absence of malware will no longer imply low risk. Investigators must prove negative evidence, what didn’t happen, as much as what did.
To address the continued shift toward identity-driven and cloud-native attacks, organizations and their risk advisors should prioritize the following:
In 2026, the most dangerous breaches won’t announce themselves. They will blend in, persist quietly, and exploit trust, forcing DFIR teams to become identity investigators, cloud auditors, and storytellers all at once. To counteract that, defense should start with identity, visibility, and the assumption that attackers will operate using trusted access.