Cyberattacks continue to evolve, with identity-based methods remaining the primary technique for infiltrating networks. In 2024, IBM X-Force reported that nearly one-third of intrusion attempts exploited valid account credentials and public-facing applications. The persistence of these tactics underscores the need for robust cybersecurity measures across various industries.
Recent analyses indicate a significant rise in phishing attempts and the distribution of infostealers, tools designed to harvest sensitive information. This trend reflects a broader shift towards leveraging existing access points rather than seeking new vulnerabilities.
How Do Identity-Based Attacks Operate?
Identity-based attacks blend seamlessly with regular network activities, making them harder to detect. Cybercriminals use techniques like phishing emails to obtain login credentials, which are then used to access multiple systems. “They’re logging in, versus hacking in,” stated Michelle Alvarez, manager of the IBM X-Force threat intelligence team.
Which Industries Are Most Affected?
Critical infrastructure sectors, particularly manufacturing, face the highest number of attacks. Manufacturing accounted for 26% of all incidents in 2024, followed by finance and insurance at 23%. These industries are prime targets due to the valuable data they handle and the potential impact of breaches.
What Can Organizations Do to Mitigate These Threats?
Implementing strong credential management and regular vulnerability assessments are essential strategies. Effective vulnerability management practices can prevent attackers from exploiting known weaknesses. “We see vulnerabilities from years ago that had a patch available for a long time still being exploited,” Alvarez noted.
The reliance on valid credentials and the exploitation of public-facing applications highlight the importance of continuous monitoring and updating security protocols. As cyber threats become more sophisticated, organizations must adapt their defenses to protect sensitive information and maintain operational integrity.
Strengthening authentication methods and educating employees about phishing risks are critical steps in reducing the risk of credential theft. Additionally, regular audits of public-facing applications can help identify and remediate vulnerabilities before they are exploited by threat actors.
Ensuring comprehensive security measures and proactive threat intelligence can significantly enhance an organization’s resilience against persistent cyber threats.