Identity-Based Attacks Are Now Targeting Backup Policies. New Anomaly Detection Feature from N-able Closes That Window
Latest feature detects anomalous behavior in backup environments, identifying credential-based threats before they become catastrophic breaches
Identity-based attacks have become a major driver of successful cyberattacks, with AI making these schemes even more convincing. With stolen or phished credentials, attackers can gain access to backup software and weaken backup policies. The 2025 Verizon Data Breach Investigations Report found that roughly 88% of basic web application breaches involved stolen credentials, making it clear how widespread this tactic has become. Once inside, attackers – and sometimes well-intentioned employees - can alter retention policies, exclude critical data from backups, and delete protected devices. These are subtle changes that can go unnoticed for weeks or even months before the attacker triggers the final ransomware event.
To give IT teams real-time visibility, Anomaly Detection introduces a vital layer of protection through event-based notifications that highlight these indicators of compromise. This capability notifies users of potential cyberattack signals or misconfigurations before they escalate, allowing organizations to take just-in-time action to safeguard their recovery posture and maintain data resilience. This new capability builds on last year’s Anomaly Detection feature, Honeypots, an always-on defense mechanism designed to detect brute-force attacks on backup infrastructure.
“It’s no longer just active systems under attack – backups are firmly in the crosshairs,” says
“A new wave of threats is targeting businesses through stolen identities,” said
To learn more about how Anomaly Detection can strengthen your organization’s data resilience, visit our blog.
About N-able
N-able protects businesses from evolving cyberthreats. Our AI powered cybersecurity platform delivers business resilience to more than 500,000 organizations worldwide, leveraging advanced end-to-end capabilities, simplified workflows, market leading integrations, and flexible deployment options to improve efficiency and drive critical security outcomes. Our partner first approach pairs our technology with experts, training, and peer-led events that empower customers to be secure, resilient, and successful. n-able.com
© 2026
The N-able trademarks, service marks, and logos are the exclusive property of
Category: Product
View source version on businesswire.com: https://www.businesswire.com/news/home/20260226292060/en/
Karla.walls@n-able.com
Source: