{"id":2970,"date":"2025-04-29T09:00:00","date_gmt":"2025-04-29T09:00:00","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2970"},"modified":"2025-04-29T09:00:00","modified_gmt":"2025-04-29T09:00:00","slug":"the-state-of-intrusions-stolen-credentials-and-perimeter-exploits-on-the-rise-as-phishing-wanes","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2970","title":{"rendered":"The state of intrusions: Stolen credentials and perimeter exploits on the rise, as phishing wanes"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>CISOs seeking insights into the latest cyberattack trends should note that cybercriminals\u2019 initial access methods appear to be shifting, as data from both Verizon and Google-owned Mandiant underscored similar findings about intrusion techniques in separate reports.<\/p>\n<p>According to Mandiant, stolen credentials were responsible for more intrusions last year than phishing and were second only to exploits as attackers\u2019 most frequent initial access method. This observation tracks with the findings of other security companies that noted <a href=\"https:\/\/www.csoonline.com\/article\/3951147\/infostealer-malware-poses-potent-threat-despite-recent-takedowns.html\">a sharp rise in the sale and use of infostealers<\/a> over the past 12 months.<\/p>\n<p>Mandiant\u2019s incident responders identified vulnerability exploits as the initial cause in 33% of intrusions they investigated in 2024, followed by stolen credentials (16% vs. 10% in 2023) and phishing (14%). Despite <a href=\"https:\/\/www.csoonline.com\/article\/3850783\/11-ways-cybercriminals-are-making-phishing-more-potent-than-ever.html\">new approaches to making its social engineering trickery more effective<\/a>, phishing has seen a steady decline as an initial access method over the past two years, having accounted for nearly 1 in 4 compromises in 2022 and 17% in 2023.<\/p>\n<p>\u201cWhile email phishing remains a common and effective method for obtaining initial access, adversaries can obtain credentials in a variety of ways, including purchasing leaked or stolen credentials on underground forums, mining large data leaks for credentials, and actively pursuing credentials by infecting users with keyloggers and infostealers,\u201d wrote Mandiant\u2019s incident responders in their <a href=\"https:\/\/cloud.google.com\/security\/resources\/m-trends\">annual M-Trends report<\/a>. \u201cThe continued prevalence of phishing and credential theft underscores the importance of implementing multifactor authentication (MFA), preferably FIDO2-compliant MFA methods.\u201d<\/p>\n<h2 class=\"wp-block-heading\">Exploits along the perimeter<\/h2>\n<p>For the fifth year in a row, the undisputed leader of initial access methods remains exploited vulnerabilities, the main infection vector in 1 in 3 intrusions, though a 5% drop versus 2023. Most notable, however, is a clear shift toward network perimeter devices, a trend echoed by Verizon in its report, with security appliances increasingly being targeted over the past year through zero-day vulnerabilities.<\/p>\n<p>Atop the list of frequently exploited vulnerabilities observed by Mandiant was CVE-2024-3400, a <a href=\"https:\/\/www.csoonline.com\/article\/2094204\/more-attacks-target-recently-patched-critical-flaw-in-palo-alto-networks-firewalls.html\">zero-day command injection in the GlobalProtect secure VPN feature<\/a> of Palo Alto Networks\u2019 PAN-OS software. This was followed by CVE-2023-46805 and CVE-2024-21887, <a href=\"https:\/\/www.csoonline.com\/CVE-2024-21887\">two vulnerabilities impacting Ivanti Connect Secure VPN and Ivanti Policy Secure appliances<\/a>. A <a href=\"https:\/\/www.csoonline.com\/article\/2073837\/exploit-available-for-critical-flaw-in-forticlient-server.html\">SQL injection vulnerability in the FortiClient Endpoint Management Server<\/a> (CVE-2023-48788) came in third place.<\/p>\n<p>Other noteworthy initial access vectors included web compromises (9%), prior compromises where existing access was sold to other groups by <a href=\"https:\/\/www.csoonline.com\/article\/3570919\/meet-latrodectus-initial-access-brokers-new-favorite-malware-loader.html\">initial access brokers<\/a> (8%), brute-force password guessing attacks (7%), and insider threats (5%), primarily fueled by a new trend of <a href=\"https:\/\/www.csoonline.com\/article\/3609972\/north-korean-fake-it-workers-up-the-ante-in-targeting-tech-firms.html\">North Korean IT workers seeking employment under false pretenses<\/a>.<\/p>\n<h2 class=\"wp-block-heading\">Financial gains, data theft, dwell time<\/h2>\n<p>Of the intrusions Mandiant investigated in 2024, 35% were financially motivated, with ransomware alone representing 21% of all intrusions, according to the company\u2019s data.<\/p>\n<p>Financial gains were realized via data theft for the purpose of extortion, <a href=\"https:\/\/www.csoonline.com\/article\/3520721\/new-cryptomining-campaign-infects-weblogic-servers-with-hadooken-malware.html\">cryptomining<\/a>, cryptocurrency theft, business email compromise, and cases in which attackers monetized their access by selling it to other groups. <a href=\"https:\/\/www.csoonline.com\/article\/3497138\/how-not-to-hire-a-north-korean-it-spy.html\">North Korean IT employment fraud<\/a> also fell under this category.<\/p>\n<p>Data theft was a goal in 37% of attacks, and though some of these intrusions overlap with the financially motivated ones, data theft operations also included cyberespionage activity and the theft of credentials and other information useful for further reconnaissance and lateral movement.<\/p>\n<p>\u201cMandiant identified attackers, such as the Russian cyber espionage actor APT28 and Chinese cyber espionage groups including APT41, conducting more targeted data theft,\u201d the incident responders wrote in their report. \u201cAPT28 conducted selective data theft, demonstrating interest in personnel-related data, as well as email content and documents relevant to geopolitical topics consistent with Russian interests. In a campaign targeting multiple organizations in Europe, the Middle East, and Africa (EMEA) and Japan and Asia Pacific (JAPAC), APT41 leveraged SQLULDR2 to export data from Oracle Databases and used PINEGROVE to systematically and efficiently exfiltrate large volumes of sensitive data from the compromised networks, transferring to OneDrive to enable exfiltration and subsequent analysis.\u201d<\/p>\n<p>What\u2019s worrying is that in over half of intrusions (57%) the victim organizations learned about the compromise of their networks and systems from a third-party rather than discovering them through internal means. In 14% of cases, organizations were notified directly by attackers, usually in the form of ransom notes, but 43% of cases involved external entities such as a cybersecurity company or law enforcement agencies.<\/p>\n<p>The average time attackers spent inside a network until being discovered last year was 11 days, a one-day increase over 2023, though still a major improvement versus a decade ago when the average discovery time was 205 days. Attacker dwell time, as Mandiant calls it, has steadily decreased over the years, which is a good sign, but remains high on average for intrusions discovered by external parties \u2014 26 days.<\/p>\n<p>\u201cThe prevailing trend across Mandiant investigations from 2018 to 2024 is toward shorter and shorter dwell times,\u201d the company said. \u201cComparing 2023 to 2024, the percentage of investigations that were discovered in one week or less increased from 43.3% to 45.1%.\u201d<\/p>\n<h2 class=\"wp-block-heading\">New threat groups rising faster than new malware<\/h2>\n<p>Mandiant tracks threat groups according to three categories: advanced persistent threat (APT), financial threat (FIN), and uncategorized (UNC), which is the designation for malicious activity clusters that cannot be confidently linked to an existing known group. Mandiant tracks more than 4,500 UNC groups, 44 known APT groups, and 13 FIN groups.<\/p>\n<p>The company started tracking 737 new threat clusters during 2024, of which 233 Mandiant encountered in its incident response investigations. Overall, 55% of the threat groups active last year were financially motivated, 8% were motivated by cyberespionage, and 2% had political motivations (hacktivism). For 35% of the newly tracked groups the company was not able to establish a clear motivation.<\/p>\n<p>In terms of new malware, Mandiant started tracking 632 new malware families in 2024, 83 of which were used in intrusions the company investigated. This brings the total number of malware families tracked by Mandiant to over 5,500.<\/p>\n<p>Last year saw a lower number of new malware families observed during investigations than in 2023, consistent with a downward trend observed for the past three years, the company said.<\/p>\n<p>\u201cThis decrease showcases threat actors\u2019 continued willingness to leverage tools already present within the targeted environment as well as their ability to use and misuse tools rather than constructing new malware or configuring known post-exploitation tools,\u201d the incident responders wrote in their report. \u201cA growing number of compromises use no malware at all.\u201d<\/p>\n<p>In terms of malware types, 35% of the families observed were categorized as backdoors, 14% as ransomware, 8% as droppers, 7% as downloaders, 6% as tunnelers, and 5% as credential stealers. Various utilities, data miners, rootkits, keyloggers, and point-of-sale malware were also observed, among others.<\/p>\n<p>The malware program most frequently observed during intrusions remained the Beacon implant from the Cobalt Strike red-teaming tool. This frequently abused tool was observed in over 5% of intrusions, a sharp drop compared to 2021 when it was used 21% of the time. The decline is the result of a law enforcement operation last year that <a href=\"https:\/\/www.csoonline.com\/article\/2513773\/europol-disrupts-about-600-abusive-cobalt-strike-servers.html\">disrupted 600 command-and-control servers for unlicensed versions of Cobalt Strike<\/a>.<\/p>\n<p>The next most prevalent malware programs observed were GootLoader, a JavaScript-based downloader and dropper; WIREFIRE, a Python web shell for Ivanti Pulse Secure appliances; SystemBC, a proxy tunneler with a custom communication protocol that can also execute additional payloads from a C2 server; and the Akira, RansomHub, LockBit and Basta ransomware programs.<\/p>\n<h2 class=\"wp-block-heading\">Stolen and weak credentials fuel ransomware and cloud compromises<\/h2>\n<p>In terms of ransomware, the most common infection vector observed by Mandiant last year were brute-force attacks (26%), such as password spraying and use of common default credentials, followed by stolen credentials and exploits (21% each), prior compromises resulting in sold access (15%), and third-party compromises (10%).<\/p>\n<p>Cloud accounts and assets were compromised through phishing (39%), stolen credentials (35%), SIM swapping (6%), and voice phishing (6%). Over two-thirds of cloud compromises resulted in data theft and 38% were financially motivated with data extortion, business email compromise, ransomware, and cryptocurrency fraud being leading goals.<\/p>\n<p>\u201cMandiant also noted use of prior compromise, exploits, third-party compromise, brute-force attacks, and malicious insiders \u2014 specifically North Korean IT workers applying for jobs under false pretenses \u2014 in order to gain access to cloud systems,\u201d the company said.<\/p>\n<h2 class=\"wp-block-heading\">Addressing the credentials problem<\/h2>\n<p>To combat the threat from stolen credentials and phishing Mandiant recommends implementing multi-factor authentication (MFA) methods that are resistant to adversary-in-the-middle (AiTM), such as FIDO2-compliant hardware security keys, certificate-based authentication, or mobile authenticator apps.<\/p>\n<p>Enforcing strict policies to separate personal and corporate device use, reviewing the security controls of third-party suppliers and contractors, disabling browser auto-fill functions, restricting third-party cookies, and disabling unapproved browser extensions can also help prevent credential theft. Finally, continuous <a href=\"https:\/\/www.csoonline.com\/article\/3604803\/security-awareness-training-topics-best-practices-costs-free-options.html\">security awareness training<\/a> can help employees detect sophisticated social engineering attempts and ensure they don\u2019t download software from untrusted locations.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>CISOs seeking insights into the latest cyberattack trends should note that cybercriminals\u2019 initial access methods appear to be shifting, as data from both Verizon and Google-owned Mandiant underscored similar findings about intrusion techniques in separate reports. According to Mandiant, stolen credentials were responsible for more intrusions last year than phishing and were second only to [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2971,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2970"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2970"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2970\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2971"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}