{"id":18958,"date":"2021-10-07T17:50:08","date_gmt":"2021-10-07T13:50:08","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/most-common-initial-attack-vectors\/18958\/"},"modified":"2022-05-05T11:03:28","modified_gmt":"2022-05-05T07:03:28","slug":"most-common-initial-attack-vectors","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/most-common-initial-attack-vectors\/18958\/","title":{"rendered":"Common initial attack vectors"},"content":{"rendered":"<p>Other companies frequently call in our experts for emergency assistance with <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/incident-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">incident response<\/a>, to conduct (or help conduct) investigations, or to analyze cybercriminals\u2019 tools. Throughout 2020, we <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/13085018\/Incident-Response-Analyst-Report-eng-2021.pdf\" target=\"_blank\" rel=\"noopener\">collected a wealth of data<\/a> for a view on the modern threat landscape that helps us predict the most likely attack scenarios \u2014 including the most common initial attack vectors \u2014 and choose the best defensive tactics.<\/p>\n<p>When we investigate a cyberincident, we always pay special attention to the initial attack vector. Simply put, the way in is a weak point, and to avoid recurrence, identifying defense systems\u2019 weak spots is crucial.<\/p>\n<p>Unfortunately, that is not always possible. In some cases, too much time has elapsed between the incident and its detection; in others, the victim did not keep logs or destroyed the traces (accidentally or intentionally).<\/p>\n<p>Complicating matters, when cybercriminals attack through the <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/supply-chain\/\" target=\"_blank\" rel=\"noopener\">supply chain<\/a> \u2014 an increasingly prevalent method \u2014 the initial vector falls not under the end victim\u2019s purview, but rather that of a third-party program developer or service provider. However, in more than half of all incidents, our experts were able to determine the initial attack vector precisely.<\/p>\n<h2>First and second place: Brute force and exploitation of publicly accessible applications<\/h2>\n<p>Brute-force attacks and exploitation of vulnerabilities in applications and systems accessible from outside the corporate perimeter share the top two spots. Each served as the initial vector of penetration in 31.58% of cases.<\/p>\n<p>As we observed in previous years, no other method is as effective for launching an attack as the exploitation of vulnerabilities. A more detailed analysis of the exploited vulnerabilities suggests that is attributable primarily to companies\u2019 failure to install updates promptly; at the time of the attacks, patches were available for every single vulnerability. Simply applying them would have protected the victims.<\/p>\n<p>Companies\u2019 mass transition to remote work and the use of remote-access services account for the uptick in brute-force-attack popularity. In making the transition, many organizations failed to address security matters adequately, and, as a result, the number of attacks on remote connections shot up practically overnight. For example, the period of March to December 2020 saw a <a href=\"https:\/\/securelist.com\/the-story-of-the-year-remote-work\/99720\/\" target=\"_blank\" rel=\"noopener\">242% increase<\/a> in RDP-based brute-force attacks.<\/p>\n<h2>Third place: Malicious e-mail<\/h2>\n<p>In 23.68% of cases, the initial attack vector was malicious e-mail, either with malware attached or in the form of phishing. Targeted attack operators and mass mailers alike have long used both types of malicious messaging.<\/p>\n<h2>Fourth place: Drive-by compromise<\/h2>\n<p>Sometimes attackers try to gain access to the system using a website that the victim visits periodically or lands on by chance. To use such a tactic, which we\u2019ve seen in <a href=\"https:\/\/securelist.com\/holy-water-ongoing-targeted-water-holing-attack-in-asia\/96311\/\" target=\"_blank\" rel=\"noopener\">some complex APT attacks<\/a>, cybercriminals either furnish the site with scripts that exploit a browser vulnerability to run malicious code on the victim\u2019s computer or trick the victim into downloading and installing the malware. In 2020, it was the initial attack vector in 7.89% of cases.<\/p>\n<h2>Fifth and sixth place: Portable drives and insiders<\/h2>\n<p>The use of USB drives to infiltrate company systems has become rare. In addition to flash-drive-infecting viruses largely being a thing of the past, the tactic of slipping someone a harmful USB stick is not very reliable. Nevertheless, this method accounted for 2.63% of initial network penetrations.<\/p>\n<p>Insiders caused the same proportion (2.63%) of incidents. That\u2019s employees who, for whatever reason, wanted to harm their own companies.<\/p>\n<h2>How to minimize the likelihood of a cyberincident and its consequences<\/h2>\n<p>Most of the incidents our experts analyzed were preventable. Based on their findings, they recommend:<\/p>\n<ul>\n<li>Introducing a strict password policy and enforcing the use of multifactor authentication;<\/li>\n<li>Prohibiting the use of publicly accessible remote management services;<\/li>\n<li>Installing software updates as quickly as practicable;<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security\/mail-server?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____ksms___\" target=\"_blank\" rel=\"noopener nofollow\">Protecting mail servers<\/a> with antiphishing and antimalware tools;<\/li>\n<li>Raising <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">employee awareness<\/a> about modern cyberthreats on a regular basis.<\/li>\n<\/ul>\n<p>In addition, remember to configure all auditing and logging systems and to back up your data\u00a0regularly \u2014 not only to facilitate investigations, but also to minimize damage from cyberincidents.<\/p>\n<p>Of course, the statistics above represent just a small portion of the useful information our experts have to offer here. You\u2019ll find the full text of our <a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/13085018\/Incident-Response-Analyst-Report-eng-2021.pdf\" target=\"_blank\" rel=\"noopener\">Incident Response Analyst Report 2021 here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How attackers are most apt to get into target companies\u2019 infrastructure.<\/p>\n","protected":false},"author":2706,"featured_media":18959,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2504,2505,2506],"class_list":{"0":"post-18958","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-attack-vectors","10":"tag-gert","11":"tag-incident-response"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/most-common-initial-attack-vectors\/18958\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/most-common-initial-attack-vectors\/23481\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/most-common-initial-attack-vectors\/25557\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/most-common-initial-attack-vectors\/23628\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/most-common-initial-attack-vectors\/23052\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/most-common-initial-attack-vectors\/26209\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/most-common-initial-attack-vectors\/25755\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/most-common-initial-attack-vectors\/31677\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/most-common-initial-attack-vectors\/10150\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/most-common-initial-attack-vectors\/42379\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/most-common-initial-attack-vectors\/17864\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/most-common-initial-attack-vectors\/18291\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/most-common-initial-attack-vectors\/15394\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/most-common-initial-attack-vectors\/27548\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/most-common-initial-attack-vectors\/31775\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/most-common-initial-attack-vectors\/27704\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/most-common-initial-attack-vectors\/24472\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/most-common-initial-attack-vectors\/29833\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/most-common-initial-attack-vectors\/29632\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/incident-response\/","name":"incident response"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18958"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18958\/revisions"}],"predecessor-version":[{"id":19612,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18958\/revisions\/19612"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18959"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}