By Kaspersky
Other companies frequently call in our experts for emergency assistance with incident response, to conduct
When we investigate a cyberincident, we always pay special attention to the initial attack vector. Simply put, the way in is a weak point, and to avoid recurrence, identifying defense systems’ weak spots
Unfortunately, that is not always possible. In some cases, too much time has elapsed between the incident and its detection; in others, the victim did not keep logs or destroyed the traces (accidentally
Complicating matters, when cybercriminals attack through the supply chain — an increasingly prevalent method — the initial vector falls not under the end victim’s purview, but rather that of a
Brute-force attacks and exploitation of vulnerabilities in applications and systems accessible from outside the corporate perimeter share the top two spots. Each served as the initial vector of penetration in 31.58%
As we observed in previous years, no other method is as effective for launching an attack as the exploitation of vulnerabilities. A more detailed analysis of the exploited vulnerabilities suggests that is attributable primarily to companies’ failure to install updates promptly; at the time of the attacks, patches were available for every single vulnerability. Simply applying them would have protected
Companies’ mass transition to remote work and the use of
In 23.68% of cases, the initial attack vector was malicious
Sometimes attackers try to gain access to the system using a website that the victim visits periodically or lands on by chance. To use such a tactic, which we’ve seen in some complex APT attacks, cybercriminals either furnish the site with scripts that exploit a browser vulnerability to run malicious code on the victim’s computer or trick the victim into downloading and installing the malware. In 2020, it was the initial attack vector in 7.89%
The use of USB drives to infiltrate company systems has become rare. In addition to
Insiders caused the same proportion (2.63%) of incidents. That’s employees who, for whatever reason, wanted to harm their
Most of the incidents our experts analyzed were preventable. Based on their findings,
In addition, remember to configure all auditing and logging systems and to back up your data regularly — not only to facilitate investigations, but also to minimize damage
Of course, the statistics above represent just a small portion of the useful information our experts have to offer here. You’ll find the full text of our Incident Response Analyst Report