Threat Reports 2023

Evolving Cyber Threat Landscape: Insights from Mandiant M-Trends 2024

In an era where cyber threats are increasingly sophisticated and pervasive, understanding the latest trends and strategies employed by attackers is crucial for organizations aiming to bolster their cybersecurity defenses. FireEye Mandiant’s M-Trends 2024 Report provides a comprehensive analysis of the current threat landscape, leveraging data from their extensive investigations throughout the year. This detailed blog post summarizes and analyzes the key findings from the report, offering insights into global trends, regional variations, and specific attack techniques.

The Evolving Threat Landscape

One of the significant takeaways from Mandiant’s 2023 engagements is the increasing focus of attackers on evasion techniques. Cybercriminals are continuously adapting to avoid detection technologies such as endpoint detection and response (EDR) systems. They aim to maintain persistence within networks by targeting edge devices, employing “living off the land” tactics, and exploiting zero-day vulnerabilities.

Despite these sophisticated evasion strategies, defenders have made notable progress in identifying compromises more swiftly. The global median dwell time—defined as the duration an attacker remains undetected within a system—has decreased to 10 days in 2023, down from 16 days in the previous year. This improvement is a testament to the enhanced detection capabilities and proactive defense measures being implemented by organizations worldwide.

Key Findings

1. Detection by Source

In 2023, over half of the compromised organizations (54%) first learned of a breach from an external source, a decrease from 63% in 2022. For ransomware-related incidents, this figure was even higher, with 70% of organizations being notified externally, often via a ransom demand. This shift suggests that organizations are becoming more adept at internally detecting non-ransomware intrusions, reflecting improved internal security measures.

2. Dwell Time

The global median dwell time continued its downward trend, reaching 10 days in 2023. The median dwell time for ransomware-related intrusions was notably shorter, at 5 days, due to the quick detection prompted by ransom demands. Non-ransomware intrusions had a median dwell time of 13 days. This overall reduction in dwell time indicates that organizations are becoming more effective at identifying and responding to cyber threats.

3. Initial Infection Vectors

Exploits were the most common initial infection vector, accounting for 38% of intrusions where the vector was identified. Phishing remained a significant threat, representing 17% of initial intrusions, followed by prior compromises at 15%. The prevalence of exploits and phishing underscores the need for robust vulnerability management and user education programs to mitigate these entry points.

4. Ransomware Trends

Ransomware-related intrusions accounted for 23% of Mandiant’s global investigations in 2023, up from 18% in 2022. The rapid detection of ransomware, typically within five days, highlights the urgency and visibility of these attacks. The financial impact of ransomware continues to drive its prevalence, with attackers increasingly employing data theft and extortion tactics alongside traditional encryption methods.

5. Regional Trends

  • Americas: In the Americas, 51% of organizations learned of compromises from external sources, with ransomware-related intrusions primarily notified externally. The median dwell time remained steady at 10 days, with a notable internal detection time of 8 days for non-ransomware intrusions.
  • JAPAC: In the JAPAC region, external notifications accounted for 69% of detections, reflecting a trend towards higher external discovery rates. The median dwell time for ransomware-related intrusions was six days, indicating prompt detection and response.

6. Industry Targeting

Financial services, business and professional services, high tech, retail and hospitality, and healthcare were the most frequently targeted sectors. These industries are attractive targets due to the sensitive and valuable information they handle. Notably, government sector investigations decreased, possibly due to fewer new investigations related to geopolitical events like the war in Ukraine.

7. Threat Techniques

Mandiant’s mapping of attack techniques to the MITRE ATT&CK framework revealed that 74% of techniques and 44% of sub-techniques were observed in 2023 intrusions. The most frequently seen techniques included command and scripting interpreters, obfuscated files or information, and remote services. This consistent use of well-established techniques underscores the importance of implementing comprehensive detection capabilities based on the MITRE ATT&CK framework.

Recommendations for Enhanced Cybersecurity

  1. Leverage Threat Intelligence:
    • Integrate threat intelligence feeds to stay updated on emerging threats and adapt defenses accordingly.
  2. Improve Detection and Response:
    • Enhance internal detection capabilities through advanced monitoring and anomaly detection systems.
    • Conduct regular security assessments and red team exercises to identify and mitigate vulnerabilities.
  3. Strengthen User Education:
    • Implement comprehensive training programs to educate employees on recognizing phishing attempts and other social engineering tactics.
  4. Adopt a Multi-layered Defense Strategy:
    • Combine endpoint security, network monitoring, and DNS-layer security to create a robust defense against diverse attack vectors.
  5. Maintain Vigilance and Proactive Defense:
    • Regularly update and patch systems to address known vulnerabilities.
    • Develop and test incident response plans to ensure swift and effective handling of security breaches.

Conclusion

The Mandiant M-Trends 2024 Report offers critical insights into the evolving cyber threat landscape, highlighting the importance of adaptive and proactive cybersecurity measures. By understanding the latest trends and implementing the recommended strategies, organizations can enhance their resilience against cyber threats and protect their valuable assets. For a detailed understanding and further insights, access the full FireEye Mandiant M-Trends 2024 Report.

1 comment

Leave a Reply to Joe ComposeCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from Cyber Risk Countermeasures Education (CRCE)

Subscribe now to keep reading and get access to the full archive.

Continue reading