Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Report: Compromised VPN Credentials Fueled 45% of Ransomware Breaches in H1 2023
Advertisements

A report from the Secureworks Counter Threat Unit (CTU) covering the first half of 2023 revealed that nearly half of initial access events leading to ransomware attacks were due to compromised credentials. The study identified that 45% of all ransomware-related initial access stemmed from stolen login details, with credentials for virtual private networks (VPNs) being the most common target.

This analysis highlights a significant trend in how threat actors are gaining footholds into corporate networks. The findings underscore the importance of securing remote access points against credential-based attacks.

Stolen Credentials: The Leading Entry Point

According to the Secureworks report, of the 45% of breaches initiated by compromised credentials, two-thirds involved VPN credentials. The remaining one-third were for remote desktop protocol (RDP) or other remote access services. Threat groups such as Gold Drake, associated with the Akira ransomware, were observed using compromised VPN credentials in their campaigns. Other groups, including Gold Mystic (linked to LockBit) and Gold Lowell (linked to Trigona ransomware), also utilized compromised credentials to launch attacks. The report notes that these credentials are often acquired through infostealer malware or purchased from underground online forums.

Other Initial Access Vectors

While stolen credentials were the dominant method, the report detailed other significant initial access vectors used by ransomware operators. The exploitation of software vulnerabilities accounted for 32% of initial access events. Another 23% of intrusions were initiated through malware or phishing campaigns. To counter the threat of credential compromise, Secureworks advised in its report that organizations implement multi-factor authentication (MFA) on all internet-facing systems, with a particular focus on VPNs and remote access services.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading