Cyber attackers are now in full swing of executing AI for quicker and more difficult-to-detect attacks. CrowdStrike’s 2025 Global Threat Report, released on February 27, 2025, identifies a 442% growth in voice phishing (vishing) attacks with an average eCrime breakout time of only 48 minutes. These statistics show that traditional security protocols are no longer sufficient.
The CrowdStrike 2025 Global Threat Report offers valuable insights into evolving threats and vulnerabilities. This article will break down key takeaways from the report and explain why organisations need AI-enhanced cybersecurity solutions to counteract the now rapidly more dispersed AI-facilitated threats in 2025.

Source: Crowdstrike
How is AI used in cyber attacks?
AI-driven phishing attacks are still the most potent attack vectors, and AI-driven phishing has taken this to a new level. Phishing attackers use machine learning algorithms to create personalised, extremely realistic-looking phishing emails that can evade traditional filters. Because they look like ordinary business communications, it becomes increasingly complex for employees to spot threats.
The evolution of deepfake scamming and voice cloning means that cybercriminals can clone voices and edit videos to make victims send money or share confidential information. The threat report shows a staggering 150% surge in Chinese-backed cyber espionage operations worldwide in 2024. Critical industries saw up to a 300% spike in targeted attacks. High-profile executives and finance personnel are the most common targets of these scams.
The Risks of Automated and AI-Powered Malware
AI’s Role in Bypassing Security Defences
AI enables adversarial machine learning, where cybercriminals train AI models to evade detection. For example, malware can now adapt in real-time, modifying its behaviour based on the cyber security tools in place. This makes signature-based security solutions ineffective against evolving AI-powered threats.
How AI Is Changing the Threat Landscape
Traditional cyber attacks were manual and time-consuming, but AI-driven cybercrime automates reconnaissance, exploitation, and persistence. This shift enables cybercriminals to launch large-scale attacks with minimal effort. Notably, the report states that in 2024, 79% of cyber intrusions were malware-free, relying instead on hands-on keyboard tactics and AI-driven exploits.
Historically, cyberattacks were tedious and time-consuming, but AI-enabled cybercrime applies automated reconnaissance, exploitation, and persistence. As a result, it allows massive attacks to be carried out with greater ease. Interestingly, the report states that 79% of cyber intrusions in 2024 were malware-free and used hands-on keyboard activity and AI-enabled exploits instead.
Cyber Security Strategies to Combat AI-Powered Threats
Using AI for Cyber Defence
As much as AI has empowered cybercriminals, the double-edged sword cuts the other way in defence of these threats. Advanced AI-driven cyber security solutions engage machine learning to foresee threats, detect anomalies, and automate response actions before any intrusion. Real-time monitoring and behavioural analysis reduce risks by identifying suspicious behaviour as it happens.
Best Practices to Detect and Prevent AI-Driven Attacks:
- Implement AI-Powered Threat Detection – Use AI-enhanced intrusion detection systems (IDS) and endpoint detection and response (EDR) solutions to monitor unusual behaviour.
- Educate Employees on AI-Generated Phishing and Deepfakes – Given the rise of AI-powered scams, ongoing security training is essential.
- Enhance Identity Security – Strengthen multi-factor authentication (MFA) and zero-trust security models to prevent unauthorised access.
- Deploy AI-Based Anomaly Detection – AI-driven security analytics can identify subtle deviations in user behaviour, signalling potential insider threats.
- Regularly Update and Patch Systems – AI exploits vulnerabilities rapidly, so timely patching is crucial.
Conclusion
AI-driven cyber attacks are now faster, more sophisticated, and harder to detect than ever before. Australian businesses, from SMEs to large enterprises, must adopt AI-driven cyber security measures that match speed and intelligence to modern threats. The latest findings from CrowdStrike’s 2025 Global Threat Report underscore the urgency of proactive cyber defence. Waiting until an attack occurs is no longer an option.
Amidata Can Spot an AI-Driven Cyber Attack a Mile Away
Amidata provides comprehensive cyber security solutions to help businesses defend against AI-driven threats. Our 3-2-1 backup strategy, combined with Backup-as-a-Service, ensures rapid recovery and compliance with Australian data security regulations.
Please contact us today if you’d like us to conduct a Cyber Security Vulnerability Assessment.