2 Sources
[1]
Energy Sector Faces Escalating Identity Security Risks Amid AI Adoption: Sophos
In India 79% of ransomware victims responding to this survey confirmed their ransomware incident stemmed from an identity attack, establishing identity compromise as a primary delivery mechanism for ransomware. Sophos released the State of Identity Security 2026, a vendor-agnostic survey of 5,000 IT and cybersecurity leaders across 17 countries. The survey found that 76.8% of organizations surveyed in India suffered at least one identity-related breach in the past year, and on average organizations worldwide reported three separate incidents. Repeat victimization reached a notable level globally, with 5% reporting six or more breaches. These attacks are driven primarily by human error and weak management of non-human identities (NHIs), a challenge that is accelerating rapidly as agentic AI accelerates attack processes.
[2]
A Crisis in Critical Systems: 80% of Energy Firms Suffer Identity Breaches
Sophos today released the State of Identity Security 2026, a vendor-agnostic survey of 5,000 IT and cybersecurity leaders across 17 countries. The survey found that 76.8% of organizations surveyed in India suffered at least one identity-related breach in the past year, and on average organizations worldwide reported three separate incidents. Repeat victimization reached a notable level globally, with 5% reporting six or more breaches. These attacks are driven primarily by human error and weak management of non-human identities (NHIs), a challenge that is accelerating rapidly as agentic AI accelerates attack processes. In India 79% of ransomware victims responding to this survey confirmed their ransomware incident stemmed from an identity attack, establishing identity compromise as a primary delivery mechanism for ransomware. Sophos X-Ops researchers have observed this consistently over the past year. Worldwide, the financial consequences are steep: the mean recovery cost reached US$1.64 million, with a median of US$750,000, and 73% of those affected faced costs of US$250,000 or more. "Identity-based attacks are becoming increasingly sophisticated in India as organizations rapidly expand their digital ecosystems and adopt AI-driven technologies. The finding that nearly 77% of organizations in India experienced an identity-related breach highlights how critical it is for businesses to strengthen both human and non-human identity security practices," said Sunil Sharma, Managing Director and Vice President - Sales, India and SAARC, Sophos. "As AI agents, cloud services, APIs and automated workflows continue to scale, organizations need far greater visibility and control over identities, access privileges and authentication activity. A proactive, layered identity security strategy combined with continuous monitoring and Zero Trust principles will be essential for Indian businesses to stay resilient against evolving cyber threats." Additional Global Key Findings from the State of Identity Security 2026: * Data and Financial Theft Dominate Breach Fallout:10% of organizations reported an identity breach that impacted their business in the last year with the primary consequences being data theft (49%) and ransomware (48%), and financial theft (47%) * Visibility Remains a Critical Weakness:Only 13% of organizations continually monitor for unusual login attempts, and more than half of organizations globally check every three months or less. * Detection Gaps Persist: 14% of breached organizations could not detect and stop their most significant identity attack before damage was done. Smaller organizations (100-250 employees) were nearly twice as likely to fail at detection as mid-sized peers. * Critical Infrastructure Most Exposed:Energy, oil/gas, and utilities (80%) and federal/central government (78%) reported the highest breach rates across all industries surveyed. * Compliance Struggles Signal Broader Risk:Organizations that found compliance requirements very challenging had a breach rate of 82.4%, a full 14 percentage points higher than those with lower compliance difficulty (68.3%). Globally, human error (employees tricked into providing credentials) was cited in nearly 43% of incidents. Weak NHI management, including API keys stored in code, static credentials, and orphaned service accounts, was cited in 41%. Organizations with weak NHI management are 22% more likely globally to experience financial theft and pay approximately $150,000 more to recover than average. The NHI management problem is intensifying globally. AI agents can autonomously spin up sub-agents, each generating new credentials with broad, persistent access and inconsistent human oversight. Existing identity frameworks were not built for this, and organizations are already behind: globally, only 1 in 3 organizations regularly rotate or audits service accounts and non-human identities, and just 11% do so continuously. Recommendations to Reduce Identity-based Risks To reduce exposure to identity-related attacks, organizations should implement a multi-layered approach covering both human and non-human identities. Essential steps include enforcing Multi-Factor Authentication (MFA) for all user accounts, applying least-privilege access principles, and disabling or removing inactive identities promptly. For non-human identities specifically, organizations should inventory and classify all NHIs, replace long-lived credentials with short-lived alternatives, and implement secrets management platforms to manage NHI credentials at scale. As agentic AI accelerates NHI proliferation, deploying Identity Threat Detection and Response (ITDR) capabilities and adopting a Zero Trust security model are increasingly critical layers of defense. The State of Identity Security 2026 report comes from a vendor-agnostic survey conducted in Q1 2026 of 5,000 IT and cybersecurity leaders across 17 countries, including the U.S., U.K., Germany, France, Australia, Japan, India, and Brazil, in organizations with 100 to 5,000 employees across 14 industries.
Share
Copy Link
A new Sophos report reveals critical infrastructure faces severe identity security threats, with 80% of energy, oil, and gas organizations experiencing breaches in the past year. Weak management of non-human identities and the rapid adoption of agentic AI are accelerating attack processes, while human error remains a primary vulnerability across sectors.
The energy sector now faces the highest rate of identity security breaches among all industries surveyed, according to Sophos's State of Identity Security 2026 report
1
2
. A staggering 80% of organizations in energy, oil, gas, and utilities reported suffering at least one identity-related breach in the past year, marking critical infrastructure as the most exposed sector globally2
. Federal and central government entities followed closely at 78%, underscoring a systemic vulnerability in sectors that underpin national security and economic stability.
Source: CXOToday
The vendor-agnostic survey, conducted in Q1 2026, polled 5,000 IT and cybersecurity leaders across 17 countries and paints a troubling picture of escalating identity security risks
2
. Organizations worldwide reported an average of three separate identity-related incidents, with repeat victimization becoming alarmingly common. Five percent of organizations globally experienced six or more breaches within the year, suggesting that once compromised, entities struggle to prevent subsequent attacks.Human error remains a dominant factor in identity compromise, cited in nearly 43% of incidents globally
2
. Employees continue to fall victim to social engineering tactics, inadvertently providing credentials that grant attackers initial access. However, weak management of non-human identities has emerged as an equally significant threat, accounting for 41% of breaches2
. API keys stored directly in code, static credentials that never expire, and orphaned service accounts left active after projects conclude create persistent vulnerabilities that threat actors readily exploit.The financial impact of poor non-human identity management is substantial. Organizations with weak NHI practices are 22% more likely to experience financial theft and pay approximately $150,000 more in recovery costs compared to those with stronger controls
2
. Globally, the mean recovery cost from identity-related breaches reached $1.64 million, with a median of $750,000, and 73% of affected organizations faced costs exceeding $250,0002
.The rapid proliferation of agentic AI is intensifying the non-human identities problem at an unprecedented pace. AI agents can autonomously spawn sub-agents, each generating new credentials with broad, persistent access privileges that often escape human oversight. Existing identity frameworks were not designed to handle this dynamic, automated credential generation, leaving organizations struggling to maintain visibility and control
2
.Currently, only one in three organizations globally regularly rotate or audit service accounts and non-human identities, and a mere 11% do so continuously
2
. This visibility gap is critical: only 13% of organizations continually monitor for unusual login attempts, while more than half check every three months or less2
. Detection failures compound the problem, with 14% of breached organizations unable to detect and stop their most significant identity attack before damage occurred2
.
Source: DT
Related Stories
In India, 76.8% of organizations suffered at least one identity-related breach in the past year, and 79% of ransomware victims confirmed their incident stemmed from an identity attack
2
. This establishes identity compromise as a primary delivery mechanism for ransomware, a finding Sophos X-Ops researchers have observed consistently throughout the year2
.Globally, 10% of organizations reported identity breaches that significantly impacted their business, with data theft (49%), ransomware (48%), and financial theft (47%) representing the primary consequences
2
. Organizations struggling with compliance requirements showed notably higher breach rates, at 82.4% compared to 68.3% for those finding compliance less challenging2
.Sunil Sharma, Managing Director and Vice President - Sales, India and SAARC at Sophos, emphasized the urgency of the situation: "Identity-based attacks are becoming increasingly sophisticated in India as organizations rapidly expand their digital ecosystems and adopt AI-driven technologies. As AI agents, cloud services, APIs and automated workflows continue to scale, organizations need far greater visibility and control over identities, access privileges and authentication activity"
2
.Sophos recommends organizations implement MFA for all user accounts, apply least-privilege access principles, and promptly disable inactive identities
2
. For non-human identities specifically, companies should inventory and classify all NHIs, replace long-lived credentials with short-lived alternatives, and deploy secrets management platforms. As agentic AI continues to proliferate credentials, deploying ITDR capabilities and adopting Zero Trust security models become essential defensive layers2
.Summarized by
Navi
15 Oct 2024•Technology

15 Dec 2025•Technology

07 Aug 2025•Technology

1
Technology

2
Science and Research

3
Science and Research
