Mandiant‘s M-Trends 2024 Report highlights a significant shift in cyberattack methodologies, revealing that attackers are increasingly exploiting vulnerabilities in computer systems to gain initial access to networks. In 2023, this method was used in 38% of intrusions, marking a 6% increase from the previous year. Conversely, the prevalence of phishing attacks, traditionally the most common vector, decreased from 22% to 17%. The report also notes a dramatic rise in the exploitation of zero-day vulnerabilities, with 97 unique zero-days observed in 2023, a 56% increase compared to 2022. Chinese cyber espionage groups were identified as the most prolific exploiters of these vulnerabilities, primarily for intelligence gathering and strategic advantage.
Mandiant’s findings underscore the changing landscape of cyber threats, where attackers are opting for more sophisticated techniques over traditional phishing. This shift is partly due to advancements in security tools that better protect users from malicious email attacks. Researchers observed that zero-day and n-day vulnerabilities, which are either undiscovered or unpatched, allow attackers to target organizations more discretely and effectively. This tactic gives attackers the flexibility to launch assaults at their convenience, complicating defense and response efforts for targeted organizations.
The increased use of ransomware by cybercriminals is also reshaping attack patterns, as evidenced by the reduced attacker dwell time – the period between compromise and detection – which fell to just 10 days in 2023 from 16 days in 2022. This decrease is partly due to the nature of ransomware attacks, which aim for quick detection to initiate extortion negotiations. Remarkably, 70% of ransomware-related intrusions were externally notified, mostly by the attackers themselves, showcasing a tactic to pressure victims into paying ransoms swiftly.
Furthermore, Mandiant tracks an extensive array of threat groups, totaling over 4000 in 2023, with 719 new groups added last year. The majority of these groups are financially motivated, particularly through ransomware, which constituted almost two-thirds of financially motivated intrusions. The complexity of attributing attacks to specific groups is increasing due to the intricate cybercrime ecosystem involving multiple actors, which often includes initial access brokers and ransomware-as-a-service (RaaS) affiliates. This ecosystem evolution reflects the dynamic and evolving nature of global cyber threats, highlighting the continuous challenge for cybersecurity professionals to adapt and respond effectively.