Key findings of the 2022 State of the Threat report

Share post:

Among the main findings of the State of the Threat Report in 2022 is the fact that ransomware remains the primary threat to private and public organizations, and hack-and-leak continues to offer an attractive package for hackers.

Ransomware is still a primary threat with the median detection for ransomware attacks in 2022 standing at 4.5 days. Loaders remain a key component of the ransomware ecosystem, although usage fluctuates between new and long-established options.

Another finding is the exploitation of vulnerabilities in internet-facing services, a business that has replaced credential-based access as the most common initial access vector. Moreover, the market for infostealers is booming, with the number of infostealer logs doubling in the last year.

Government-backed threat actors remain regionally focused, with some using ransomware attacks as a cover for espionage or cyber disruption, and the cyberwar has not significantly expanded beyond the borders of Russia and Ukraine.

Threat actors are now looking for ways to circumvent multi-factor authentication by exploiting incomplete implementation. They are moving faster than ever to exploit new vulnerabilities that combine sophisticated tactics with more basic techniques in the hope of avoiding detection.

The sources for this piece include an article in Secureworks.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways