{"id":610924,"date":"2023-02-23T02:52:19","date_gmt":"2023-02-23T08:52:19","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/02\/23\/phishing-remains-top-threat-to-businesses-ibm-says\/"},"modified":"2023-02-23T02:52:19","modified_gmt":"2023-02-23T08:52:19","slug":"phishing-remains-top-threat-to-businesses-ibm-says","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/02\/23\/phishing-remains-top-threat-to-businesses-ibm-says\/","title":{"rendered":"Phishing remains top threat to businesses, IBM says"},"content":{"rendered":"<div>\n<div>\n<p>First published on<\/p>\n<p><a href=\"http:\/\/www.cybersecuritydive.com\" target=\"_blank\" rel=\"noopener\"><br \/>\n    <img decoding=\"async\" src=\"https:\/\/d12v9rtnomnebu.cloudfront.net\/logo\/publications\/cybersecurity_black.png\" alt=\"Cybersecurity Dive\"><br \/>\n<\/a><\/p>\n<\/div>\n<div>\n<h3>Dive Brief:<\/h3>\n<ul>\n<li><span><span><span><span><span><span>Phishing remained the top initial access vector for security incidents last year with more than <\/span><\/span><\/span><\/span><\/span><\/span><span><span><span><span><span><span><span>2 in 5 <\/span><\/span><\/span><\/span><\/span><\/span><\/span><span><span><span><span><span><span>of all incidents involving phishing as the pathway to compromise, IBM research found.<\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<li><span><span><span><span><span><span>Three in 5 of all phishing attacks were conducted through attachments last year, according to IBM Security X-Force\u2019s <\/span><\/span><\/span><\/span><\/span><\/span><a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\/\"><span><span><span><span><span><span><span>annual threat intelligence report<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a><span><span><span><span><span><span> released Wednesday. Phishing via links accounted for one-third of all phishing attacks.\u00a0<\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<li><span><span><span><span><span><span>One-quarter of attacks involved the exploitation of public-facing applications and 16% abused valid accounts for access. Just 1 in 10 involved external remote services.\u00a0<\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<h3>Dive Insight:<\/h3>\n<p><span><span><span><span><span><span>The consistent ranking of phishing as the most prevalent initial access vector underscores the need for organizations to focus on people, process and technology, according to <\/span><\/span><\/span><\/span><\/span><\/span><span><span><span><span><span><span><span>Stephanie Carruthers, global head of innovation delivery and chief people hacker at IBM Security X-Force Red.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span>Phishing has enjoyed longstanding success as an initial access vector and attackers are constantly innovating their approach to keep phishing alive and thriving, Carruthers said.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span>\u201cIt only takes one person to click that link that could lead to a major compromise,\u201d Carruthers said via email. \u201cAnd it works because it\u2019s simple and plays on human emotions. That\u2019s a trifecta right there and that\u2019s what\u2019s providing staying power.\u201d<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span>The latest phishing tactics need to be shared with employees so they know what to look out for, such as phishing emails that are getting harder to spot.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span><span>Thread hijacking, which involves a threat actor hijacking an email account and responding to email threads pretending to be the original victim, doubled in 2022.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span>\u201cWhat makes thread hijacking so dangerous is that attackers are hitting people when their defense is down, after that first level of trust has already been established,\u201d Carruthers said.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span>The research highlights trends and points of compromise that played out in some of the most high-profile incidents of 2022.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span>Incidents involving identity access managers, such as <\/span><\/span><\/span><\/span><\/span><\/span><a href=\"https:\/\/www.cybersecuritydive.com\/news\/okta-github-source-code-stolen\/639444\/\"><span><span><span><span><span><span><span>Okta<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a><span><span><span><span><span><span> and <\/span><\/span><\/span><\/span><\/span><\/span><a href=\"https:\/\/www.cybersecuritydive.com\/news\/twilio-phishing-victims\/630719\/\"><span><span><span><span><span><span><span>Twilio<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a><span><span><span><span><span><span>, impacted <\/span><\/span><\/span><\/span><\/span><\/span><a href=\"https:\/\/www.cybersecuritydive.com\/news\/oktapus-phishing-spree-group-ib\/630619\/\"><span><span><span><span><span><span><span>many potential downstream victims<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a><span><span><span><span><span><span> and in one case they were <\/span><\/span><\/span><\/span><\/span><\/span><a href=\"https:\/\/www.cybersecuritydive.com\/news\/okta-twilio-phishing-attack\/630820\/\"><span><span><span><span><span><span><span>intertwined<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/a><span><span><span><span><span><span> when a phishing attack against Twilio exposed one-time passwords of multiple Okta customers.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span>The majority of penetration tests IBM Security X-Force Red ran for clients in 2022 revealed improper authentication or handling of credentials. Many organizations lacked visibility into applications and endpoints exposed through identity access management services, the report found.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<p><span><span><span><span><span><span>The report is based on research data IBM Security X-Force gathered in incident response engagements throughout 2022, in addition to vulnerability and exploit databases and network and endpoint tracking.<\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.constructiondive.com\/news\/phishing-king-of-compromise\/643283\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Matt Kapko<\/p>\n","protected":false},"excerpt":{"rendered":"<p>First published on Dive Brief: Phishing remained the top initial access vector for security incidents last year with more than 2 in 5 of all incidents involving phishing as the pathway to compromise, IBM research found. Three in 5 of all phishing attacks were conducted through attachments last year, according to IBM Security X-Force\u2019s annual<\/p>\n","protected":false},"author":1,"featured_media":610925,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3380,22564],"tags":[],"class_list":{"0":"post-610924","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-phishing","8":"category-remains"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/610924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=610924"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/610924\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/610925"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=610924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=610924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=610924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}