The Next 3–6 Months: Where Threat Actors Will Move Faster Than Defenders
Everyone’s hunting “AI attacks.” Meanwhile the ugly money is still in trusted pages, stolen sessions, and users politely pasting the command for them.
If you are busy, read this for one reason: most teams are still hunting for new malware while attackers are getting better at abusing identity, trusted services, and user behavior. That is where the next few months are likely to hurt.
TL;DR
- The near-term risk is not “AI-only attacks.” It is AI speeding up familiar intrusion paths: reconnaissance, phishing, post-compromise triage, and operator decision-making.
- The most likely pivots are trusted-service staging, OAuth/session and workload identity abuse, and faster user-mediated execution.
- Nation-state ecosystems with mature tradecraft — especially PRC, Russia, Iran, and DPRK — are best positioned to operationalize these gains quickly.
- If you only do three things, hunt for browser-to-terminal chains, OAuth/session misuse tied to SaaS bulk activity, and secret-hunting bursts on endpoints.
AlphaHunt
Stop doomscrolling, start decisioning. We chewed through the muck so your team doesn’t have to. → Subscribe!
Like this? Forward this to a friend!
(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))
Why this is worth your time
There is too much cybersecurity slop right now pretending every attacker innovation is a revolution.
This is not that.
The real issue is simpler: attackers do not need a brand-new playbook if AI helps them run the old one faster. Over the next 3–6 months, the advantage will likely come from tempo, not novelty.
That matters because many defenders are still organized around malware families, static IOCs, and domain blocking, while the higher-yield attacker paths are shifting toward:
- trusted hosted content that looks normal enough to click
- session, token, and OAuth abuse that survives endpoint cleanup
- workload identities and standing privilege that few teams monitor well
- faster post-compromise triage using local tools, scripts, and AI-assisted decision support
The forecast in one sentence
Expect threat actors to get quicker inside proven intrusion paths, not dramatically more original.
AlphaHunt Converge - Plug in your Flight Crew
Get intelligence where it counts. No dashboards. No detours. AlphaHunt Converge teases out your intent, reviews the results and delivers actionable intel right inside Slack. We turn noise into signal and analysts into force multipliers.
Anticipate, Don’t Chase.
What we expect to see next
1) Trusted-service staging becomes more common
Attackers will keep reducing their infrastructure burden.
Instead of standing up obviously malicious pages, they will increasingly abuse public sharing features, collaboration pages, CDNs, and business-friendly hosted services as first-stage infrastructure. The point is not the page itself. The point is getting a user to take the next step — often running a command, authenticating, or granting access.
This is the practical lesson behind the ClickFix-style pattern: shift the risky step onto the user.
2) Identity abuse keeps beating endpoint-only defenses
If defenders are still thinking mainly in terms of malware on a laptop, they are late.
OAuth grants, stolen sessions, refresh tokens, app consent abuse, and workload identities remain higher-yield paths because they scale well, survive reimaging, and often create cleaner access to SaaS data than a noisy endpoint foothold.
3) AI-assisted operator tempo improves phishing and recon
The biggest lift for many actors will be better targeting, better translation, faster pretext iteration, and tighter prioritization of who or what to exploit next.
That makes campaigns more convincing without needing breakthrough tradecraft.
4) AI gets pulled into tooling and malware where it helps variability
This is one of the more interesting near-term developments.
The reports point to experimentation with LLM-assisted tasking inside malware and tooling, especially where runtime command generation or logic variation helps weaken static detections. That does not mean every actor will do it well. It does mean defenders should stop assuming all payload logic will be hardcoded.
5) Non-human identities stay under-defended
A lot of teams have improved human MFA. Fewer have done the same for service accounts, app grants, workload identities, and privileged integrations.
That gap is likely to matter more over the next few months than another round of malware headlines.
Who is best positioned to take advantage
PRC-linked operators
Most likely to use AI as an efficiency layer across reconnaissance, vulnerability analysis, exploitation planning, and post-compromise prioritization. Expect disciplined use in cloud, SaaS, and edge-heavy environments.
Russia-linked operators
Best positioned to push AI deeper into tooling and malware logic, especially where runtime variability improves operational flexibility and weakens static detections.
Iran-linked operators
Well positioned to gain from stronger social engineering, better localization, and faster pretext generation tied to real-world events and impersonation opportunities.
DPRK-linked operators
Likely to keep scaling recruiter-style targeting, persona-driven outreach, and target profiling that supports credential theft and financially motivated access operations.
What most teams still are not thinking about enough
AI tooling is becoming privileged infrastructure
Internal copilots, prompt repositories, transcript-sharing features, connectors, and AI API keys should increasingly be treated like sensitive infrastructure, not just productivity tooling.
If an attacker gets access there, the risk is not just data exposure. It can become access, spend abuse, workflow manipulation, and better internal reconnaissance.
User-mediated execution is still under-modeled
Security awareness has trained people to fear attachments and shady links.
That is not enough.
A growing problem is the user willingly copying a command from a page that looks legitimate, helpful, or business-relevant. That means browser-to-terminal correlation is now more valuable than another list of suspicious domains.
Token misuse is still hard to reconstruct end-to-end
Many teams can see fragments of SaaS abuse. Fewer can cleanly stitch together the full session story across identity, endpoint, browser, SaaS, and cloud logs.
That visibility gap is a real operational weakness.
