IBM's latest report reveals that organizations' failure to manage identities and access properly is costing them dearly, with attackers increasingly exploiting valid accounts as an entry point. (Shutterstock)


February 26, 2024

Cybersecurity experts have long emphasized the importance of robust identity and access management practices to safeguard digital assets. A recent report by IBM, released on Wednesday, underscores the severe consequences faced by organizations failing to implement these measures effectively.

According to the report, which analyzed incidents investigated by IBM's X-Force intelligence service in 2023, exploiting valid accounts emerged as one of the most common methods used by threat actors to infiltrate organizations' IT systems. This approach accounted for 30% of initial entry vectors, on par with phishing, and just behind exploiting public-facing applications, which accounted for 29% of incidents.

The report highlights a significant increase in the use of valid accounts as an initial access vector compared to 2022, when it was only 16%. Attackers are increasingly opting for the path of least resistance, focusing on acquiring credentials rather than exploiting vulnerabilities or launching phishing campaigns.

The ease of obtaining compromised yet valid credentials from the dark web has contributed to this trend. Cloud account credentials, in particular, make up 90% of cloud assets for sale on the dark web, making it simple for threat actors to impersonate legitimate users and gain access to IT environments.

The report also notes a 100% increase in "Kerberoasting," a technique used to compromise Microsoft Windows Active Directory credentials through Kerberos tickets. This indicates a shift in attackers' tactics for acquiring identities to carry out their operations.

Furthermore, there has been a 266% increase in the use of information stealers by threat actors, which not only steal credentials but also other computer information.

The report underscores the importance of adhering to best practices and security fundamentals, such as asset and patch management, credential hardening, and the principle of least privilege. It notes that nearly 85% of incidents on critical infrastructure could have been mitigated with these practices.

In Canada, half of the attacks were against the government sector, making it the country with the most security incidents on government entities responded to by X-Force compared to other countries.

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

You may also like

Bitcoin Investor Buys an Entire SpaceX Flight for the Ultimate Polar Adventure

A bold new chapter in space tourism unfolded as Chun Wang, a Bitcoin investor and entrepreneur, launched into orbit on....

Elon Musk’s xAI Acquires X in $33 Billion Stock Deal

Elon Musk’s artificial intelligence startup, xAI, has officially taken over his social media platform, X, in a deal valued at....

Trump Considers Lowering Tariffs to Seal TikTok Deal

Former U.S. President Donald Trump signalled on Wednesday that he might reduce tariffs on China to facilitate the sale of....

U.S. Robotics Firms Urge National Strategy to Compete China

American robotics companies are calling for a national U.S. robotics strategy to strengthen the industry and maintain a competitive edge....

Waymo Plans Self-Driving Taxi Service in Washington by 2026

Alphabet’s autonomous taxi service, Waymo, is expanding to Washington, D.C., with plans to launch in 2026. The announcement, made on....

Trump Aides Used Signal for Secret War Talks – What to Know

Top officials from the Trump administration reportedly used the encrypted messaging app Signal to discuss military plans, sparking concerns over....

PsiQuantum Secures $750M to Advance Quantum Computing

According to sources, Quantum computing startup PsiQuantum is securing at least $750 million in funding, pushing its valuation to $6....

Are We Ready to Mine Metals from Space? The Future of Asteroid Mining

Asteroid Mining: A Sci-Fi Dream or an Inevitable Future? For decades, space enthusiasts and scientists have imagined a future where....

Nvidia CEO Surprised By Public Quantum Computing Companies

Nvidia CEO Jensen Huang admitted he was unaware that publicly traded quantum computing firms existed when he previously commented on....

Tesla Faces Crisis: Cybertruck Recall & Musk’s Trump Ties

Tesla and its CEO Elon Musk are in hot water as controversy swirls around the company. One of Tesla’s strongest....

Humanoid Robots Could Arrive Sooner Than Expected, Says Nvidia CEO

The world may be closer to a robotics revolution than most people think. Nvidia CEO Jensen Huang believes humanoid robots....

Nvidia’s AI Vision: Jensen Huang Unveils Future at GTC 2025

Nvidia CEO Jensen Huang took center stage at the GTC 2025 conference, often dubbed “AI Woodstock,” to discuss the rapid....