Know them. Find them. Stop them.
Discover the adversaries targeting your industry.

Your Personalized Threat Landscape
Today's threat actors are smarter, more sophisticated, and more well resourced than they have ever been. Only by understanding them can you remain one step ahead of today's increasingly relentless adversaries.
eCrime
Hacktivism
China
Russian Federation
North Korea
Iran
India
Egypt
Pakistan
Vietnam
Kazakhstan
Global Threat Landscape
Adversaries targeting you:
Featured Adversaries




CrowdStrike 2025 Global Threat Report
Get the latest intrusion insights from the
pioneer of adversary intelligence.
eCrime Index
The eCrime ecosystem is an active and diffuse economy of financially motivated entities who engage in myriad criminal activities in order to generate revenue. With the eCrime Index (ECX), CrowdStrike’s Intelligence team maintains a composite score to track changes to this ecosystem, including changes in eCrime activity, risk, and related costs.
55.52


Adversaries
150%
Increase in China-nexus activity across all sectors
Attacks
442%
Growth in vishing operations between the first and second half of 2024
Exploitation
51seconds
Was the fastest recorded eCrime breakout time in 2024
Join the virtual briefing of the CrowdStrike 2025 Global Threat Report
Hear from experts on the latest trends and key findings from the CrowdStrike 2025 Global Threat Report — and don’t miss out on the Adversary Universe podcast.

Adam Meyers
Sr. VP of Counter Adversary Operations, CrowdStrike

Cristian Rodriguez
CTO of Americas, CrowdStrike
Adversary Resources



Recommended solution:
CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *
This includes:
- Proactive platform management
- 24/7 monitoring
- Operated by experts
- Investigates all detections: critical, high, med, low
- 24/7 continuous threat hunting-based protection
- Proactive surgical remediation
- Backed by breach prevention warranty
Recommended solution:
CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *
This includes:
- Proactive platform management
- 24/7 monitoring
- Operated by experts
- Investigates all detections: critical, high, med, low
- 24/7 continuous threat hunting-based protection
- Proactive surgical remediation
- Backed by breach prevention warranty
Recommended solution:
CrowdStrike Falcon® Complete stops breaches on endpoints, workloads, and identities, with expert management, threat hunting, monitoring and remediation, and is backed by CrowdStrike’s Breach Prevention Warranty. *
This includes:
- Proactive platform management
- 24/7 monitoring
- Operated by experts
- Investigates all detections: critical, high, med, low
- 24/7 continuous threat hunting-based protection
- Proactive surgical remediation
- Backed by breach prevention warranty
Recommended solution:
This includes:
- Proactive platform management
- 24/7 monitoring
- Operated by experts
- Investigates all detections: critical, high, med, low
- 24/7 continuous threat hunting-based protection
- Proactive surgical remediation
- Backed by breach prevention warranty
* Breach Prevention Warranty: Not available in all locations, see FAQ here for additional information.
Defend your business with precision
Unlock your custom threat landscape

Your Personalized Threat Landscape
Today's threat actors are smarter, more sophisticated, and more well resourced than they have ever been. Only by understanding them can you remain one step ahead of today’s increasingly relentless adversaries.