{"id":2919,"date":"2025-04-25T09:01:00","date_gmt":"2025-04-25T09:01:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2919"},"modified":"2025-04-25T09:01:00","modified_gmt":"2025-04-25T09:01:00","slug":"cybercriminals-switch-up-their-top-initial-access-vectors-of-choice","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2919","title":{"rendered":"Cybercriminals switch up their top initial access vectors of choice"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Third-party involvement in breaches and exploitation of vulnerabilities have become more important factors in security breaches, according to the latest edition of <a href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/\">Verizon\u2019s Data Breach Investigation Report (DBIR)<\/a>.<\/p>\n<p>An analysis of 22,000 security incidents, including 12,195 confirmed data breaches in 139 countries, found that credential abuse (22%) and exploitation of vulnerabilities (20%, up from 14.9% in 2024) were the two most prevalent initial attack vectors.<\/p>\n<p>\u201cFor the first time, vulnerability exploitation has overtaken phishing \u2014 and is catching up to credential abuse \u2014 as a top initial access vector,\u201d noted Chris Wysopal, chief security evangelist and co-founder of application security firm Veracode.<\/p>\n<h2 class=\"wp-block-heading\">Security on the edge<\/h2>\n<p>Edge devices and VPNs now represent 22% of vulnerability exploitation targets, up from just 3% in 2024. Among this mix, <a href=\"https:\/\/www.csoonline.com\/article\/3629815\/top-7-zero-day-exploitation-trends-of-2024.html\">zero-day exploits targeting perimeter devices and VPNs<\/a> became more prevalent.<\/p>\n<p><a href=\"https:\/\/www.tenable.com\/blog\/verizon-2025-dbir-tenable-research-collaboration?utm_source=charge&amp;utm_medium=social&amp;utm_campaign=internal-comms\">Tenable Research analyzed<\/a> 17 edge-device CVEs featured in the DBIR, each of which added to the US Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">Known Exploited Vulnerabilities<\/a> list last year, to understand renumeration times.<\/p>\n<p>Verizon\u2019s study found that the median time for organizations to fully remediate edge-device vulnerabilities was 32 days. Fix times for flaws in general have sharply risen over the past five years, as companies <a href=\"https:\/\/www.csoonline.com\/article\/3842489\/companies-are-drowning-in-high-risk-software-security-debt-and-the-breach-outlook-is-getting-worse.html\">increasingly drown in high-risk security debt<\/a>. But for edge security devices, the urgency to remediate is paramount.<\/p>\n<p>\u201cOrganizations must leverage a risk-based approach and prioritize vulnerability scanning and patching for internet-facing systems,\u201d wrote Saeed Abbasi, threat research manager at cloud security firm Qualys, in a <a href=\"https:\/\/blog.qualys.com\/qualys-insights\/2025\/04\/22\/the-verizon-2025-data-breach-investigations-report-dbir-six-trends-you-cant-ignore\">blog post<\/a>. \u201cThe data clearly shows that attackers follow the path of least resistance, targeting vulnerable edge devices that provide direct access to internal networks.\u201d<\/p>\n<p>Greg Linares, principal threat intelligence analyst at managed detection and response vendor Huntress, said, \u201cWe\u2019re seeing a distinct shift in how modern attackers breach enterprise environments, and one of the most consistent trends right now is the exploitation of edge devices.\u201d<\/p>\n<p>Edge devices, ranging from firewalls and <a href=\"https:\/\/www.csoonline.com\/article\/1303522\/us-government-agencies-ordered-to-take-ivanti-vpn-product-offline.html\">VPN appliances<\/a> to load balancers and IoT gateways, serve as the gateway between internal networks and the broader internet.<\/p>\n<p>\u201cBecause they operate at this critical boundary, they often hold elevated privileges and have broad visibility into internal systems,\u201d Linares noted, adding that edge devices are often poorly maintained and not integrated into standard patching cycles.<\/p>\n<p>Linares explained: \u201cMany edge devices come with default credentials, exposed management ports, secret superuser accounts, or weakly configured services that still rely on legacy protocols \u2014 these are all conditions that invite intrusion.\u201d<\/p>\n<p>Once compromised, edge devices provide attackers with privileged access, persistence, and a clean staging ground for lateral movement. These systems often store administrator credentials, session tokens, VPN keys, or logs that provide a detailed roadmap of the internal infrastructure.<\/p>\n<p>\u201cAttackers can implant custom malware or even modify the firmware itself to survive across reboots and evade detection,\u201d Linares concluded. \u201cBecause these devices typically fall outside the scope of endpoint detection and response [EDR] solutions and SIEM integration, intrusions often go unnoticed for weeks, months, or longer.\u201d<\/p>\n<p>Espionage groups such as <a href=\"https:\/\/www.csoonline.com\/article\/3497078\/chinas-volt-typhoon-exploits-versa-zero-day-to-hack-us-isps-and-it-firms.html\">Volt Typhoon<\/a> and UNC4841 have leveraged vulnerabilities in Fortinet, SonicWall, and Barracuda appliances to quietly infiltrate high-value networks in the past year or so. Ransomware groups such as Black Basta and Royal <a href=\"https:\/\/www.csoonline.com\/article\/3836040\/ransomware-access-playbook-what-black-bastas-leaked-logs-reveal.html\">frequently use compromised NAS devices and firewalls<\/a> to break into targeted networks.<\/p>\n<h2 class=\"wp-block-heading\">Ransomware fiends target smaller businesses<\/h2>\n<p>The percentage of breaches involving third parties doubled to 30%, highlighting the risks associated with supply chain and partner ecosystems.<\/p>\n<p>The <a href=\"https:\/\/www.csoonline.com\/article\/3842496\/the-state-of-ransomware-fragmented-but-still-potent-despite-takedowns.html\">prevalence of ransomware attacks<\/a> also increased, turning up as a factor in 44% of analyzed breaches (compared to 37% in 2024). Ransomware had a disproportionate impact of on small and midsize businesses (SMBs).<\/p>\n<p>While larger organizations experience ransomware in 39% of breaches, SMBs grappled with ransomware in 88% of breach incidents.<\/p>\n<p>Symptomatic of the trend of ransomware actors to go after smaller targets, there was a noticeable decrease in the median ransom amount paid, which fell to from $150,000 in 2024 to $115,000 in this year\u2019s report.<\/p>\n<p>The number of victim organizations that did not pay ransoms was 64%, compared to 50% that refused payment two years ago.<\/p>\n<h2 class=\"wp-block-heading\">The human factor<\/h2>\n<p>Human involvement in cybersecurity breaches stayed around the same as in Verizon\u2019s 2024 DBIR \u2014 a factor in 60% of successful attacks. The figure illustrates the ongoing importance of social engineering attacks such as phishing and credential (password and login credential) abuse. To that end, cybercriminals are <a href=\"https:\/\/www.csoonline.com\/article\/3850783\/11-ways-cybercriminals-are-making-phishing-more-potent-than-ever.html\">switching up tactics to make phishing more effective<\/a> and <a href=\"https:\/\/www.csoonline.com\/article\/3951147\/infostealer-malware-poses-potent-threat-despite-recent-takedowns.html\">relying more on infostealer malware to capture credentials<\/a>.<\/p>\n<p>AI is also playing a greater role in cyberattacks and data leak risks. Synthetically generated text in malicious emails has doubled over the past two years, according to Verizon.<\/p>\n<p>Meanwhile, 15% of employees routinely accessed generative AI platforms on their<\/p>\n<p>corporate devices, increasing the potential for data leaks, which <a href=\"https:\/\/www.csoonline.com\/article\/3964282\/cisos-no-closer-to-containing-shadow-ais-skyrocketing-data-risks.html\">CISOs are struggling to contain<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">Spy games<\/h2>\n<p>Verizon estimates that espionage-motivated attacks account for 17% of security breaches, almost trebling in prevalence since 2024.<\/p>\n<p>Manufacturing and healthcare sectors faced an increase in espionage-motivated attacks.<\/p>\n<p>Microsoft\u2019s Digital Defense Report from November 2024 also noted a rising trend that <a href=\"https:\/\/www.csoonline.com\/article\/3595792\/nation-state-actors-increasingly-hide-behind-cybercriminal-tactics-and-malware.html\">sees lines blurring between cyberespionage and cybercriminal activity<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">Countermeasures<\/h2>\n<p>As always, defending against potential attacks relies on developing a multilayered defense strategy.<\/p>\n<p>\u201cBusinesses need to invest in robust security measures, including strong password policies, timely patching of vulnerabilities, and comprehensive security awareness training for employees,\u201d said Chris Novak, VP of global cybersecurity solutions at Verizon Business.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Third-party involvement in breaches and exploitation of vulnerabilities have become more important factors in security breaches, according to the latest edition of Verizon\u2019s Data Breach Investigation Report (DBIR). An analysis of 22,000 security incidents, including 12,195 confirmed data breaches in 139 countries, found that credential abuse (22%) and exploitation of vulnerabilities (20%, up from 14.9% [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2920,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2919","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2919"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2919"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2919\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2920"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}