{"id":2684,"date":"2023-03-20T07:54:59","date_gmt":"2023-03-20T07:54:59","guid":{"rendered":"https:\/\/antidos.com\/blog\/?p=2684"},"modified":"2024-02-13T12:43:15","modified_gmt":"2024-02-13T12:43:15","slug":"threat-intelligence-index-2023","status":"publish","type":"post","link":"https:\/\/antidos.com\/blog\/threat-intelligence-index-2023\/","title":{"rendered":"7 Key Takeaways From IBM\u2019s X-Force Threat Intelligence Index 2023"},"content":{"rendered":"<p>IBM recently released their X-Force Threat Intelligence Index 2023 recently and it brings to light some surprising facts. IBM collects data regarding threat vectors and their impacts on business, analyzes all that data and publishes it in the form of a report to provide cybersecurity professionals in-depth information about some of the biggest threats that could negatively impact their business.<\/p>\n<p>The 2023 version of IBM\u2019s Threat Intelligence Index was no different. It shed light on some fascinating facts that were usually ignored by cybersecurity professionals. Interested in learning more about <u><a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence?utm_medium=OSocial&amp;utm_source=Blog&amp;utm_content=RSRWW&amp;utm_id=SI-Blog-Inline-XFTII-2023\" rel=\"nofollow noopener\" target=\"_blank\">IBM\u2019s Threat Intelligence Index 2023<\/a><\/u>? You are at the right place.<\/p>\n<p>In this article, Anti-Dos will shed light on seven key takeaways from IBM\u2019s X-Force threat intelligence index 2023.<\/p>\n<div class=\"cw_blog_toc-wrap\">\n<div class=\"cw_blog_toc-wrap\">\n<h1 id='7-key-takeaways-from-ibm-s-x-force-threat-intelligence-index-2023'  id=\"boomdevs_1\" >7 Key Takeaways From IBM\u2019s X-Force Threat Intelligence Index 2023<\/h1>\n<p>Here are some of the key takeaways from IBM\u2019s X-Force threat intelligence index 2023.<\/p>\n<h2 id='1-phishing-is-the-favorite-choice-for-threat-actors'  id=\"boomdevs_2\" >1.\u00a0\u00a0 Phishing Is the Favorite Choice For Threat Actors<\/h2>\n<p><u><a href=\"https:\/\/antidos.com\/blog\/7-key-steps-you-can-take-to-neutralize-phishing-attacks\/\">Phishing <\/a><\/u>topped the list of infection vectors, according to IBM\u2019s X-Force Threat Intelligence Index 2023. With <strong>41% <\/strong>of cybersecurity incidents occurring due to phishing, it still remains the preferred choice for cybercriminals. Cyber Attackers have ditched the traditional phishing and are adopting spear phishing and delayed phishing to trick users.<\/p>\n<p>What\u2019s even more surprising is the fact that <strong>62% <\/strong>of all those attacks used spear phishing attachments while <strong>33%<\/strong> of all these incidents involved spear phishing links. Only <strong>5%<\/strong> of these attacks took place due to spear phishing via service. Moreover, IBM also found that some threat actors also used a combination of these tactics.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2686\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Initial-access-ventors.jpg\" alt=\"Top Initial access ventors\" width=\"650\" height=\"514\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Initial-access-ventors.jpg 744w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Initial-access-ventors-300x237.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Initial-access-ventors-370x292.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Initial-access-ventors-270x213.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Initial-access-ventors-570x450.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Initial-access-ventors-740x585.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='2-vulnerability-exploitation-continues'  id=\"boomdevs_3\" >2.\u00a0\u00a0 Vulnerability Exploitation Continues<\/h2>\n<p>IBM\u2019s X-Force 2022 found that there is an <strong>800% increase<\/strong> in the number of infections caused by vulnerability exploitation after the WannaCry incident. This year, it came at the second spot with <strong>26%<\/strong> incident response cases. To give you some perspective, IBM considers vulnerability exploitation as exploitation and vulnerabilities in public facing applications.<\/p>\n<p>Even though the total number of vulnerabilities exploited dipped in 2022 by <strong>19%<\/strong> as compared to 2021, which rose by <strong>34% <\/strong>in 2020, you can not afford to ignore it because it can come back to haunt you anytime as we have seen from incidents like <u><a href=\"https:\/\/antidos.com\/blog\/log4j-vulnerability\/\">Log4j<\/a><\/u>.<\/p>\n<h2 id='3-ransomware-attacks-are-still-a-big-threat'  id=\"boomdevs_4\" >3.\u00a0\u00a0 Ransomware Attacks Are Still a Big Threat<\/h2>\n<p>Ransomware attacks were not as frequent as they used to be in the past but neglecting them could be a mistake. According to a <u>study <\/u>conducted by IBM, the average duration of a ransomware attack declined by <strong>94% <\/strong>from 2019 to 2021. It decreased from <strong>60 days <\/strong>to as low as <strong>4 days<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2687\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/2022-Global-Cyberattack-Trends.jpg\" alt=\"2022 Global Cyberattack Trends\" width=\"650\" height=\"585\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/2022-Global-Cyberattack-Trends.jpg 726w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/2022-Global-Cyberattack-Trends-300x270.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/2022-Global-Cyberattack-Trends-370x333.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/2022-Global-Cyberattack-Trends-270x243.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/2022-Global-Cyberattack-Trends-570x513.jpg 570w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>In addition to this, the number of ransomware attacks showed a negative trend, spiraling down from <strong>21% <\/strong>in 2021 to <strong>17%<\/strong> in 2022. This should not make you complacent regarding ransomware as they are becoming more dangerous and more costly.<\/p>\n<p>Instead of targeting businesses, ransomware is now targeting critical infrastructure such as hospitals, power stations, education institutes and government organizations. The average cost of ransomware attacks have also jumped up to <strong>$4.62 million<\/strong>, which is even higher than the average cost of data breach which stood at <strong>$4.35 million<\/strong>.<\/p>\n<h2 id='4-backdoor-access-sells-like-hot-cakes-on-the-dark-web'  id=\"boomdevs_5\" >4.\u00a0\u00a0 Backdoor Access Sells Like Hot Cakes On The Dark Web<\/h2>\n<p>Did you know that backdoor access is one of the best selling commodities on the dark web? Yes, you read that right. It is not your credit card information that you always worry about. In fact, a credit card record is sold for as low as <strong>$10<\/strong> while backdoor access can fetch thousands of dollars.<\/p>\n<p>Cybercriminals can hold onto backdoor access as long as they can get the best price for it. They wait until they find a buyer who is willing to pay the top dollar for backdoor access. In fact, backdoor access has overtaken ransomware attacks in 2022 with <strong>17%<\/strong> of incidents.<\/p>\n<p>IBM\u2019s X-Force Threat Intelligence Index 2023 also made a shocking revelation. According to the report, <strong>67% <\/strong>of all the backdoors were failed ransomware attempts where the malicious plot was foiled before the ransomware was deployed. Now, you can see the close connection between ransomware and backdoor access.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2688 size-full aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Impacts.jpg\" alt=\"Top Impacts\" width=\"666\" height=\"577\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Impacts.jpg 666w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Impacts-300x260.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Impacts-370x321.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Impacts-270x234.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Top-Impacts-570x494.jpg 570w\" sizes=\"auto, (max-width: 666px) 100vw, 666px\" \/><\/p>\n<h2 id='5-remote-credential-harvesting-is-new-trick-for-hackers'  id=\"boomdevs_6\" >5.\u00a0\u00a0 Remote Credential Harvesting Is New Trick For Hackers<\/h2>\n<p>Credential harvesting is a serious threat that can have significant consequences for individuals and organizations alike. It is essential to stay vigilant and take proactive measures to protect your credentials and sensitive information. Credential harvesting was involved in <strong>11%<\/strong> of incidents analyzed by IBM.\u00a0 It can pose serious security risks and financial losses.<\/p>\n<p>Some of the dangers of credential harvesting include:<\/p>\n<ol>\n<li>Identity theft:<\/li>\n<\/ol>\n<p>Attackers can use stolen credentials to impersonate the victim, obtain additional information, and commit identity theft.<\/p>\n<ol start=\"2\">\n<li>Account takeover:<\/li>\n<\/ol>\n<p>With stolen credentials, attackers can gain access to a victim&#8217;s accounts, steal sensitive information, or carry out unauthorized transactions.<\/p>\n<ol start=\"3\">\n<li>Data breaches:<\/li>\n<\/ol>\n<p>If attackers gain access to sensitive systems or networks, they can exfiltrate large amounts of data, including personal and financial information, leading to severe data breaches.<\/p>\n<h2 id='2-denial-of-service-can-disrupt-your-business'  id=\"boomdevs_7\" >2.\u00a0\u00a0 Denial of Service Can Disrupt Your Business<\/h2>\n<p>Just like ransomware attacks, distributed denial of service attacks might be low on IBM\u2019s X-Force Threat Intelligence Index but that does not mean that you should stop worrying about them. According to cybersecurity statistics, the number of <a href=\"https:\/\/antidos.com\/\">DDoS attacks<\/a> will surpass the 15.4<strong> million<\/strong> mark in 2023.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2689 size-full aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Cisco-Annual-Internet-Report.jpg\" alt=\"Cisco Annual Internet Report\" width=\"650\" height=\"339\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Cisco-Annual-Internet-Report.jpg 650w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Cisco-Annual-Internet-Report-300x156.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Cisco-Annual-Internet-Report-370x193.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Cisco-Annual-Internet-Report-270x141.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Cisco-Annual-Internet-Report-570x297.jpg 570w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<h2 id='7-business-email-compromise-can-not-be-taken-lightly'  id=\"boomdevs_8\" >7.\u00a0\u00a0 Business Email Compromise Can Not Be Taken Lightly<\/h2>\n<p>Last but certainly not the least is business email compromise. According to a <u>report<\/u>, business email compromise attacks increased by <strong>81%<\/strong> from the first to second half of 2022. The report also found that <strong>28% <\/strong>of employees have opened malicious emails and <strong>15%<\/strong> of these employees even replied to those emails. Large enterprises are <strong>63% <\/strong>more likely to experience BEC attacks as compared to small or midsize businesses.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2690 aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization.jpg\" alt=\"Attack Engagment Rate by Organization\" width=\"650\" height=\"341\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization.jpg 1200w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization-300x157.jpg 300w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization-1024x537.jpg 1024w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization-768x403.jpg 768w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization-370x194.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization-270x142.jpg 270w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization-570x299.jpg 570w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2023\/03\/Attack-Engagment-Rate-by-Organization-740x388.jpg 740w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>Which is the most important takeaway from IBM\u2019s X-Force threat intelligence index 2023 in your opinion? Share it with us in the comments section below.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>IBM recently released their X-Force Threat Intelligence Index 2023 recently and it brings to light some surprising facts. IBM collects data regarding threat vectors and their impacts on business, analyzes all that data and publishes it in the form of a report to provide cybersecurity professionals in-depth information about some of the biggest threats that [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2692,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-2684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/comments?post=2684"}],"version-history":[{"count":7,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2684\/revisions"}],"predecessor-version":[{"id":3089,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2684\/revisions\/3089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/media\/2692"}],"wp:attachment":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/media?parent=2684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/categories?post=2684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/tags?post=2684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}