Learning Library

← Back to Library

2023 Cyber Threat Failures: Lessons

Key Points

  • The speaker uses IBM X‑Force’s 2024 Threat Intelligence Index (reviewing 2023) to turn last year’s security “failures” into learning opportunities.
  • Identity‑based attacks dominate initial‑access vectors, with “valid account” misuse tied with phishing at roughly 30% of incidents and a 71 % year‑over‑year rise.
  • Phishing remains a top delivery method, split between malicious attachments and link‑based lures, both primarily aimed at deploying malware that harvests credentials.
  • The data shows attackers prefer stealing or abusing existing credentials because logging in is far easier than exploiting vulnerabilities from scratch.
  • The presentation will conclude with actionable recommendations to mitigate these credential‑focused threats moving forward.

Full Transcript

# 2023 Cyber Threat Failures: Lessons **Source:** [https://www.youtube.com/watch?v=ii09M-VsuPg](https://www.youtube.com/watch?v=ii09M-VsuPg) **Duration:** 00:15:00 ## Summary - The speaker uses IBM X‑Force’s 2024 Threat Intelligence Index (reviewing 2023) to turn last year’s security “failures” into learning opportunities. - Identity‑based attacks dominate initial‑access vectors, with “valid account” misuse tied with phishing at roughly 30% of incidents and a 71 % year‑over‑year rise. - Phishing remains a top delivery method, split between malicious attachments and link‑based lures, both primarily aimed at deploying malware that harvests credentials. - The data shows attackers prefer stealing or abusing existing credentials because logging in is far easier than exploiting vulnerabilities from scratch. - The presentation will conclude with actionable recommendations to mitigate these credential‑focused threats moving forward. ## Sections - [00:00:00](https://www.youtube.com/watch?v=ii09M-VsuPg&t=0s) **Learning from 2023 Threat Failures** - The speaker reviews the 2023 X‑Force Threat Intelligence Index, highlighting identity, data security, application, and generative AI vulnerabilities, and offers actionable recommendations to turn those failures into stronger defenses for 2024. ## Full Transcript
0:00I once heard a professional Rodeo writer 0:02say that he learned more from his 0:03failures than from his successes well 0:06the good news if you can call it that is 0:08that we had plenty of those failures in 0:102023 so let's take a look and see what 0:13we can learn from those so that we can 0:14do a better job going forward I'm going 0:16to use in particular uh the xforce 0:19threat intelligence index report for 0:222024 where it looks back at 2023 and 0:25identifies the major trends that we see 0:28in terms of threats and we're going to 0:30take a look at identity and access 0:31management data security applications 0:34and generative Ai and then at the end of 0:37the video you want to stick around till 0:39then I'm going to give you some 0:40recommendations on things we can do to 0:42avoid these threats going forward and 0:45actually put that learning into place 0:47first of all a little bit about the 0:48xforce so I mentioned this group they're 0:50the ones that are the source of the 0:52report that we're going to be using here 0:54exforce is a global team from IBM they 0:58operate in 17 different countries and 1:01it's made up of ethical hackers incident 1:04responders researchers and analysts all 1:07coming together they have a large 1:09empirical base of data so when they say 1:12they see a trend they're saying a trend 1:14that covers a lot of 1:16space okay first up in terms of our 1:19threat Trends is 1:21identity and where we got a lot of 1:24information on this from the xforce 1:26report was looking at the initial access 1:28factors and other words these are the 1:30ways that someone tries to break into 1:32your system from the start and what we 1:34found from this is that valid accounts 1:38or improper use of a valid account was 1:40in fact number one in fact it was tied 1:44with fishing for number one and only 1:47slightly behind all of this uh almost a 1:49roundoff error at 29% were public facing 1:52apps so if you take all the different 1:54valid account types that is local domain 1:58cloud and group them together you you 1:59get about 30% and you say well that's 2:02tied for fishing why did you list that 2:03one first here's why we're concerned 2:06because we see over the previous year a 2:0971% increase in this particular area so 2:13that means again the bad guys are 2:15focusing in on credentials now let's 2:18take a look a little bit deeper into the 2:20fishing so there's usually different 2:22types of fishing attacks and generally 2:24we grouped out in the report those that 2:26involve attachments and those that 2:28involve sending links 2:30well what are those things intending to 2:32do in some cases it's to plant malware 2:34on your system in other cases it's to 2:37steal your credentials and in fact if 2:40you think about it a lot of this malware 2:42that gets put on systems its purpose is 2:45to steal credentials as well so a large 2:48portion of all of this is really about 2:53leveraging valid accounts even though it 2:55may be fishing attacks so you take some 2:57of these together and you can combine 2:59this and then see that the bad guys 3:02really are coming after your creds and 3:05that's because they have learned it's a 3:07lot easier to log in than it is to hack 3:12in okay let's take a look at the top 3:14impact item to organizations and that's 3:18where data security comes in in 3:20particular what we found is that data 3:23theft and data leakage amounted to 3:2732% of the top impact to organizations 3:31and what's particularly concerning about 3:32that number is that it's an increase 3:35from 19% the previous year in 2022 so 3:39we're not getting better at preventing 3:41theft and leakage of data and how is 3:44this happening well it turns out it 3:46somewhat corresponds to what we also see 3:48as a rise in this stuff called info 3:51Stealers what is an info stealer okay 3:53let's take here is a user and they've 3:56got their data here on their system and 3:59we've got a bad guy here and he is going 4:03to send some sort of info stealer 4:06software so this is some form of malware 4:08that either they're going to send in an 4:10email they may send in a link to the 4:13good guy who clicks and then that causes 4:14a download to occur they might even put 4:17it out in a a publicly available app and 4:20poison the app with this info stealer 4:23capability so what happens is uh this 4:26guy downloads or receives the 4:28information and in their system once 4:31it's infected then the execution occurs 4:33and it goes and grabs information now 4:35what could it get it could get sensitive 4:37information that's important to the 4:39organization it might also by the way 4:42steal credentials so that's another 4:45particular use of info Stealers then 4:47once it collects that information it 4:49sends it back to the bad guy so pretty 4:50simple concept but we've seen uh in and 4:53that's the exfiltration step of that but 4:56what we've seen is that this has gone up 4:59in the range of 5:01266 per info stealer increases that's 5:05why we think we're seeing a lot of this 5:07dat of theft okay let's take a look at 5:10Trends in application Security in 5:13particular so we took a look at in the 5:15exforce report the oasp that's the open 5:18worldwide application security project 5:21they produce a top 10 list of 5:22application security vulnerabilities 5:25very well respected very well done piece 5:27of work so what we did with our exforce 5:30report was take a look at which ones of 5:32those are we seeing the most frequently 5:35in the real world and it turned out 5:37number one was 5:40misconfiguration that is you set up a 5:42system and you didn't configure it 5:44correctly you didn't change some of the 5:46defaults as you should have uh you left 5:49exposed Services a number of things like 5:51that that can go on in fact I did a 5:53video on exactly this topic so you can 5:55take a look at that if you'd like number 5:58two on this list was identity and 6:01authentication failures that is areas 6:05where we we didn't we set really poor 6:08passwords or we left the defaults in 6:10place this was also a big one remember 6:12this theme that keeps coming up again 6:14and again is identity is one of the big 6:16things that we're having failures in and 6:19then also related Access Control this is 6:23what came in number three at 15% now 6:26what's interesting to me again with the 6:28identity theme we take those two 6:30together we're going to get 6:3336% that are basically identity and 6:35access management related things so if 6:38you group those together they actually 6:39move up to the number one category again 6:42identity is a overriding theme of 6:45failures in 2023 and therefore things 6:48that we should learn on and improve on 6:50in the future more about that in a few 6:52minutes but we did have some good news 6:55that security people we tend to be able 6:57to find the dark cloud in every Silver 6:59Lining but I'm going to give you a 7:00silver lining for a second we did have a 7:03few good things for instance zero day 7:06attacks these are the ones where there's 7:07a vulnerability in an application for 7:10instance or an operating system and 7:12there's no patch so you're just exposed 7:15in these cases in in the case of zero 7:17days which are particularly terrifying 7:19to cyber security folks like me um we 7:22actually had a decrease a significant 7:25decrease in 2023 over 2022 it was down 7:3072% wow that sounds like reason for 7:33celebration well maybe not because the 7:36the thought is the reason that they 7:38these were down was because this stuff 7:41was so darn easy to do they didn't need 7:43to do the more exotic type of attacks 7:46these are a lot more difficult to 7:47develop and and figure those things out 7:50but again if you can log in it's a lot 7:53easier than trying to hack in so that 7:56may be a false indicator of success 7:59ransomware now this is one that's been 8:01bothering a lot of organizations these 8:04days we actually saw a slight decrease 8:0712% in ransomware in real world cases 8:11again is this reason for celebration 8:13well maybe maybe not I would say take a 8:16look at this number the next year and 8:18make sure that the trend continues now 8:21what I hope is that it will and what we 8:23have seen is some early indications that 8:25some of the larger organizations are 8:27doing a better job of Defending against 8:29ransomware attacks in the first place so 8:31they're starting to get the message 8:32which is a positive sign another 8:35positive sign is organizations are 8:37beginning more and more not to pay the 8:40ransom why does that matter well if I'm 8:42a ransomware attacker and I know I'm not 8:44going to get paid well there's really no 8:46point in launching this attack if 8:48everyone stopped paying there wouldn't 8:50be any more reason for ransomware so 8:52those two Trends if they continue might 8:55continue helping this but keep an eye on 8:58this I I'm just going to say the battle 9:00is far from one in this case now the 9:03final topic I'm going to take a look at 9:05is generative AI well as everybody knows 9:092023 was the year that we launched 9:12chatbots and generative AI came on to 9:15the scene in a big way it really 9:17launched at the end of 2022 but 2023 was 9:20when most people really uh became aware 9:23of it and started leveraging that kind 9:24of technology so this looked like to a 9:28lot of people a new attack Vector the 9:31good news is we haven't seen a ton of 9:33attacks yet from generative AI yet is 9:36the key word because what we have seen 9:39by monitoring dark web forums is 800,000 9:44mentions in 9:4520123 about Ai and generative Ai and 9:49chat GPT and things like this so the bad 9:52guys are talking about this they're 9:54experimenting with it if you think about 9:56it this way so are the good guys we're 9:59all trying to learn and assimilate what 10:01this new technology means and what we 10:02can do with it the good guys are doing 10:04that the bad guys are doing it too so 10:07this is one where uh again the story is 10:10not fully told this level of activity 10:13indicates we may yet still see something 10:15coming in the future and by the way if 10:17you say well chatbots have gotten better 10:21about locking down so that you can't 10:23just have it generate an attack for you 10:26uh and and generally that's true for the 10:28very well-respected chat Bots but there 10:31are alternatives alternative chat Bots 10:33that don't have any restrictions on them 10:35at all if you ask them to write malware 10:38they will do it if you ask them to write 10:39fishing attacks they will do it and they 10:41will not complain so even though we're 10:43trying to lock down the respectable ones 10:46some of these others Rogue ones will 10:48always be out there so the bottom line 10:50as my little friend here has to say 10:52about generative AI stay 10:55tuned at the beginning of the video I 10:57said we would learn more from our 10:59failures than from our successes and as 11:01you can see 2023 has given us an ample 11:05uh set of things we can learn from so 11:07that's the good news I guess well 11:10there's actually other good news in here 11:12as well we looked at all of these things 11:14that were attacks on critical 11:16infrastructure and we found that 84% of 11:20those attacks could have been prevented 11:22by using some of the industry best 11:24practices the things that in fact have 11:27been tried in true methods we don't have 11:28to do anything exotic or figure 11:30something out we just need to do what we 11:33know we should be doing and what are 11:35some of those things so I'm going to 11:36give you some recommendations that will 11:38help protect you and your organization 11:41remember identity was the big area here 11:44uh as they say it's the new perimeter 11:47and the bad guys figured it's easier to 11:48log in than Hack in well that's because 11:51we've made it too easy for them how 11:53could we make that harder for them well 11:55one thing we could do is start to 11:56leverage something like multiactor 11:58Authentication 11:59you know use something not just that you 12:01know like a password but something you 12:03have like a phone that's been 12:05pre-registered and something you are 12:06like a biometric those things make it 12:09harder on the bad guys to log in and 12:11something else what's even better than a 12:14really strong password how about no 12:16password at all how about using a pass 12:19key based on the phto industry standard 12:22I did a video on that this allows us to 12:24eliminate the need for users to remember 12:27these complex passwords which they 12:29always forget or end up simplifying and 12:32and uh and then the bad guys are able to 12:34guess them a pass key is a much stronger 12:36way of doing this and it's actually 12:38easier for the user to do as well how 12:41about in terms of data what can we do to 12:43secure our data well the most obvious 12:46thing is encrypt 12:48it if I encrypt it then if a ransomware 12:52attack occurs and they say I've got your 12:53data and I'm about to give it to the 12:55world we say okay go ahead knock 12:58yourself out because you can't read it 13:00and neither will anybody else be able to 13:01read it because we encrypted it well and 13:03then the other type of ransomware attack 13:06mainly is where the guy says I'm going 13:08to take your data and I'm not going to 13:10give it back to you unless you pay me 13:12and in that case again we can say you 13:14why don't you go ahead and get lost 13:15because in fact I've got a good backup 13:18for all of my data an immutable backup 13:20so it can't be overwritten whenever the 13:23ransomware hits the backup is still pure 13:26and pristine so these things will help 13:28us in these data oriented attacks and 13:30how about with applications well again 13:33the the things that we know we need to 13:35do we need to patch applications and 13:38operating systems keep them up to the 13:40latest level of of software because what 13:44happens many cases is there are security 13:46patches that go in to those uh software 13:48updates as well so if we're patched 13:51we're in much more uh secure State also 13:55Harden these systems that is remove the 13:58defaults change them turn off unneeded 14:01Services change all the default 14:03passwords and user IDs and things like 14:05that that will make our applications 14:07more secure and when it comes to 14:09generative AI the bad guys are learning 14:11about this so should we we need to be 14:14learning about how this technology Works 14:16how it can be used and how it can be 14:18abused so keep studying this keep 14:21staying on top of it if you do these 14:23kinds of things you'll be following 14:25these industry best practices and you'll 14:27do a much better job of keeping yourself 14:30secure two things before you go one 14:34download the report here you can get a 14:36link and read the details and find out 14:39more about what we learned in our 14:41research and the second thing dust off 14:44your crystal ball tell us what you think 14:46is going to be in next year's report and 14:49put it in the 14:50comments thanks for watching if you 14:52found this video interesting and would 14:53like to learn more about cyber security 14:55please remember to hit like And 14:57subscribe to this channel