Skip to main content
Sticky

Announcing M-Trends 2026: Data, insights, and strategies from the frontlines

  • March 23, 2026
  • 6 replies
  • 1460 views

ilantz
Staff

Building true operational resilience requires moving faster than the threats you face. That starts with understanding exactly how adversaries are finding success, so you can use that intelligence to stop them.

Today, we are proud to announce the release of the M-Trends 2026 report! Distilling insights from over 500k hours of incident investigations executed by Mandiant in 2025, and supporting Google Threat Intelligence Group (GTIG) research, this year’s edition reveals the critical shifts defining today's threat landscape. 

This post provides a quick preview of the themes from this year's report. Download the M-Trends 2026 report now for a comprehensive dive into our frontline data, and review the supporting resources below for more.

 

The collapse of the "hand-off" window

 

One of the most notable trends identified in Mandiant investigations is the increased specialization within the cybercrime ecosystem. In 2022, the median time between an initial access event and the hand-off to a secondary threat group was more than 8 hours. In 2025, that window collapsed to a median of just 22 seconds. 

Threat groups focused on initial access are bypassing underground markets to partner directly with secondary groups. By pre-staging their preferred malware during the initial infection, the secondary group can launch high-impact operations the moment they first interact with the network.

 

Ransomware evolves into recovery denial

 

Ransomware groups are no longer just encrypting data; they are actively destroying the ability to recover by systematically targeting backup infrastructure, identity services, and virtualization—to create a "recovery deadlock" that maximizes the pressure to negotiate.

Furthermore, attackers are exploiting the "Tier-0" nature of hypervisors to bypass guest-level defenses, targeting the virtualization storage layer directly for data theft and encrypting entire hypervisor datastores that can render all associated virtual machines inoperable simultaneously.

 

Voice phishing and the SaaS identity crisis

 

While exploits remained the most common initial infection vector for the sixth consecutive year (accounting for 32% of intrusions), highly interactive voice phishing saw a significant surge to 11%, becoming the second most commonly observed vector globally. For cloud-related compromises specifically, voice phishing was the number one initial infection vector at 23%. 

M-Trends 2026 reveals the cascading impact of these techniques. Threat actors are bypassing standard defenses by harvesting long-lived OAuth tokens and session cookies. By compromising third-party SaaS vendors, attackers steal hard-coded keys and personal access tokens, using those secrets to seamlessly pivot into downstream customer environments to execute large-scale data theft.

 

Edge devices, zero-days, and extreme persistence

 

While cyber criminals optimize for speed, espionage groups are optimizing for extreme persistence. Sophisticated threat clusters deliberately target edge and core network devices, exploiting their lack of support for traditional security tooling. M-Trends 2026 reveals that the mean time to exploit vulnerabilities dropped to an estimated -7 days, meaning exploitation is routinely occurring before a patch is even released. 

By deploying custom, in-memory malware like the BRICKSTORM backdoor directly, attackers can turn these critical gateways into persistent, invisible vantage points for monitoring corporate traffic and lateral movement. With threats like BRICKSTORM achieving dwell times of nearly 400 days, standard 90-day log retention policies leave organizations completely blind to the initial access vector and the full scope of the intrusion.

 

AI threat landscape

 

A comprehensive overview of the 2025 threat landscape requires addressing adversary use of AI. Ongoing GTIG threat research confirms that threat actors are increasingly leveraging AI, especially during the early phases of the attack lifecycle. 

M-Trends 2026 confirms attackers are abusing AI within compromised environments, however, we do not consider 2025 to be the year where breaches were the direct result of AI. The vast majority of successful intrusions still stem from fundamental human and systemic failures. Our Mandiant special report on AI risk and resilience highlights the adversarial use of AI, key trends and learnings from Mandiant AI red teaming and consulting engagements, and how AI-powered defense is already being used as a force multiplier for security operations.

 

Be ready to respond

 

The Mandiant mission is to help keep every organization secure from cyber threats and confident in their readiness. For 17 years, our annual M-Trends report has been a core component of advancing that mission, sharing frontline knowledge to help defenders close critical visibility gaps.

To learn about the cyber threat landscape, and how we recommend organizations adapt to its ongoing changes, explore our M-Trends 2026 resources:

 

6 replies

Ian Grace Baja
Forum|alt.badge.img

Good


Ian Grace Baja
Forum|alt.badge.img

Nice 


hakim007
Forum|alt.badge.img
  • New Member
  • March 26, 2026

count me in

 


zainkhan23
  • New Member
  • April 1, 2026

One, I’m proud of myself for getting through the entire article without relying on AI to synthesize the info, but as a newbie to GCloud Security, what I am taking away is that bad guys & girls are getting much faster at breaking into computers and trying to lock people out of their own files. It’s a great report that explains how we can watch for their sneaky tricks so we can stop them and keep everyone's information safe. Thanks for the great points ​@ilantz 


windi
Forum|alt.badge.img
  • Bronze 1
  • April 21, 2026

Huge thanks to the team for the M-Trends 2026 report.!!

It was a fascinating read. One thing that really stuck with me from the Executive Edition is the emphasis on » systemic failures «  and the fact that most intrusions still stem from fundamental gaps rather than just high-end AI hacks.


 

This insight perfectly highlights the issue I’ve been observing: SEO Hijacking/Poisoning.

As organizations harden their "front doors" (Cloud, Identity, Virtualization), attackers are getting creative with the "sidewalks"—specifically our search results.

By poisoning SEO data, they can redirect legitimate users before they even reach a secure environment. Never forget the simple gaps; sometimes they are much easier to infiltrate. A small loophole in search integrity can quickly become a massive, disruptive issue for users.

Since Google owns the most powerful search and security platforms on the planet, I’m super motivated to see how we can lead the way in squashing these SEO-based tactics. You guys have the best threat intelligence in the world, as this report shows.!!

and closing this specific gap would be a massive win for the entire ecosystem.

Let’s make the user’s journey from the search bar to the cloud as secure and clean as possible^^ 

Keep up the amazing work, team.!!


__
 

We often talk about hardening » impenetrable «  websites, but as these perimeters get tougher to breach directly, attackers are increasingly targeting the traffic pathways instead.

» If they can’t break through the front door, they poison the search results leading to it.

I’ve attached a screenshot showing a classic example of this on Google Search.

It’s a "simple" yet highly effective technique where attackers hijack SEO data to:

  • Redirect users to malicious clones.

  • Siphon off legitimate traffic from secure domains.

  • Execute credential harvesting before the user even reaches the intended site.

The M-Trends report highlights how the "hand-off" window has collapsed to seconds, and this type of SEO poisoning is the perfect "initial access" catalyst for that. It’s a reminder that security isn't just about the server. . it's about the entire journey the user takes to find you.

Xoxo, 
~W.iP 🐬 

» 

 


lalroshan590
Forum|alt.badge.img

Awesome information