IBM's latest report reveals that organizations' failure to manage identities and access properly is costing them dearly, with attackers increasingly exploiting valid accounts as an entry point. (Shutterstock)


February 26, 2024

Cybersecurity experts have long emphasized the importance of robust identity and access management practices to safeguard digital assets. A recent report by IBM, released on Wednesday, underscores the severe consequences faced by organizations failing to implement these measures effectively.

According to the report, which analyzed incidents investigated by IBM's X-Force intelligence service in 2023, exploiting valid accounts emerged as one of the most common methods used by threat actors to infiltrate organizations' IT systems. This approach accounted for 30% of initial entry vectors, on par with phishing, and just behind exploiting public-facing applications, which accounted for 29% of incidents.

The report highlights a significant increase in the use of valid accounts as an initial access vector compared to 2022, when it was only 16%. Attackers are increasingly opting for the path of least resistance, focusing on acquiring credentials rather than exploiting vulnerabilities or launching phishing campaigns.

The ease of obtaining compromised yet valid credentials from the dark web has contributed to this trend. Cloud account credentials, in particular, make up 90% of cloud assets for sale on the dark web, making it simple for threat actors to impersonate legitimate users and gain access to IT environments.

The report also notes a 100% increase in "Kerberoasting," a technique used to compromise Microsoft Windows Active Directory credentials through Kerberos tickets. This indicates a shift in attackers' tactics for acquiring identities to carry out their operations.

Furthermore, there has been a 266% increase in the use of information stealers by threat actors, which not only steal credentials but also other computer information.

The report underscores the importance of adhering to best practices and security fundamentals, such as asset and patch management, credential hardening, and the principle of least privilege. It notes that nearly 85% of incidents on critical infrastructure could have been mitigated with these practices.

In Canada, half of the attacks were against the government sector, making it the country with the most security incidents on government entities responded to by X-Force compared to other countries.

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

You may also like

Intel to build custom chip for Amazon; shares rise sharply

Intel’s foundry division has landed a significant deal with Amazon's cloud services unit, AWS, to produce custom artificial intelligence chips.....

OpenAI’s o1 introduces new model that thinks like humans

OpenAI has unveiled its latest model, o1, also known as the "strawberry project," which is designed to enhance complex reasoning....

Teen creates a robot to solve the Rubik's Cube

A 13-year-old student from St Malachy’s College in North Belfast has built a Lego robot capable of solving a Rubik’s....

SpaceX Unveils New, Stylish EVA Spacesuits, Making History

At an altitude of 700 kilometres above Earth, Thursday’s groundbreaking SpaceX spacewalk reached a new height in space exploration. This....

Adobe to Release New AI Tool for Video Creation This Year

Adobe is set to launch a new video creation and editing tool powered by generative AI, expected to be available....

Apple's latest AirPods double as hearing aids

In a groundbreaking announcement at its recent product showcase, Apple revealed that its latest AirPods Pro will now serve a....

Huawei is about to release its competitor to Apple’s iPhone 16

Huawei’s latest smartphone has sparked considerable excitement, with over three million pre-orders pouring in even before its official release. The....

Apple's new iPhone to use Arm's next-gen chip for AI features

Apple is set to launch its highly anticipated iPhone 16 today, showcasing a new generation of technology powered by the....

Boeing’s Starliner Returns Empty, Astronauts Stay in Space

After months of uncertainty and setbacks, Boeing's new astronaut capsule, Starliner, departed the International Space Station on Friday without its....

Google Unveils 5 New Android Features: TalkBack, Music Search, and More

Google has recently rolled out a set of exciting updates for Android users, enhancing several key features and introducing new....

Recon Instruments co-founder aims to boost self-driving tech with Matt3r

Hamid Abdollahi, who co-founded Recon Instruments and made a name in the wearable tech industry, is now focusing on a....

Apple Event 2024: Products Likely Missing from September 9 Launch

Apple is gearing up for one of its most anticipated events of the year, set to take place next week.....