Phishing Reclaims Top Spot as Initial Access Vector in Q1 2026, Talos IR Report Reveals
Cisco Talos Incident Response Q1 2026 trends show phishing surged to over a third of engagements, with public administration and healthcare tied as most targeted verticals.

Phishing has reemerged as the dominant initial access vector in Q1 2026, accounting for more than a third of all incident response engagements where the access method could be determined, according to Cisco Talos' latest quarterly trends report. This marks the first time phishing has topped the list since Q2 2025, signaling a shift back to social engineering as attackers' preferred entry point.
Public administration and healthcare tied as the most targeted industry verticals, each representing 24% of engagements each. Public administration has now been the most targeted sector for three consecutive quarters, underscoring persistent threats against government entities. Pre-ransomware incidents made up just 18% of engagements, and no ransomware encryption was observed due to early mitigation by Talos IR — a significant drop from Q1 and Q2 2025 when ransomware appeared in half of all cases.
A notable development in Q1 was the first documented use of the Softr AI-based web application development service in a phishing campaign. Attackers leveraged Softr's 'vibe coding' feature to create a credential harvesting page targeting Microsoft Exchange and Outlook Web Access (OWA) credentials. The platform allowed the phishing page to direct stolen data to a disposable external data store like Google Sheets and send alerts for new captures — all without writing code. Talos assessed with moderate confidence that malicious actors have used Softr's AI-powered platform since at least May 2023, with increasing frequency.
Talos also reported its first incident involving Crimson Collective, a cyber extortion group that emerged in September 2025. The attack began when a GitHub Personal Access Token (PAT) was inadvertently published on a public-facing website, exposing the organization for several months. The adversary used TruffleHog, an open-source tool commonly employed by security professionals, to scan thousands of victim GitHub repositories for additional secrets. This approach allowed attackers to perform reconnaissance without triggering suspicion. The discovered client secrets enabled further access to the victim's Azure cloud storage, where the attacker used Microsoft Graph API calls to authenticate, explore, and exfiltrate data.
In addition to data exfiltration, the adversary attempted to inject malicious code into multiple GitHub repositories designed to harvest any new secrets committed in the future. Though these attempts were largely thwarted by expired secrets and effective security controls, the tactic reflects an emerging trend of supply chain and development environment attacks. The abuse of legitimate cloud APIs demonstrates a growing trend where threat actors use native platform functionality to blend into normal user activity, making detection more challenging.
The Q1 2026 report highlights how AI tools are lowering the barrier to entry for less sophisticated actors and accelerating the speed of phishing campaigns. The use of Softr's AI-powered web application creation platform shows that attackers are increasingly adopting legitimate AI services to build malicious infrastructure quickly and with minimal technical skill. This trend, combined with the persistence of phishing as the top initial access vector, underscores the need for organizations to strengthen their defenses against social engineering and credential theft.
Cisco Talos emphasized that while ransomware incidents remain low compared to 2025, the threat landscape continues to evolve with new actors and techniques. The report serves as a reminder that attackers are constantly adapting their methods, leveraging both AI tools and legitimate cloud services to evade detection and maximize impact.