www.ibm.com Open in urlscan Pro
2a02:26f0:dc:184::1e89  Public Scan

Submitted URL: https://d.email.ibm.com/Mjk4LVJTRS02NTAAAAGKN3CMWH3rrcC95_Firi3cJZB0vbaFz6cRKObtAGO_C5NQYIdyFicqPCT5VnIYQ9zZOFvzjFc=
Effective URL: https://www.ibm.com/reports/threat-intelligence?utm_medium=Email&utm_source=Nurture&utm_content=RSRWW&utm_term=20B1Z...
Submission: On February 28 via manual from FR — Scanned from FR

Form analysis 0 forms found in the DOM

Text Content

My IBM Log in


IBM SECURITY X-FORCE THREAT INTELLIGENCE INDEX 2023

Download the report



 * 01Overview
 * 02Attack types
 * 03Extortion
 * 04Infection vectors
 * 05Vulnerabilities
 * 06Ransomware
 * 07Next steps

01 Overview
 * 01 Overview
 * 02 Attack types
 * 03 Extortion
 * 04 Infection vectors
 * 05 Vulnerabilities
 * 06 Ransomware
 * 07 Next steps


OVERVIEW


KNOW THE THREAT TO BEAT THE THREAT

Cyberattacks are more prevalent, creative and faster than ever. So understanding
attackers’ tactics is crucial. The IBM Security® X-Force® Threat Intelligence
Index 2023 offers CISOs, security teams and business leaders actionable insights
to help you understand how threat actors are waging attacks, and how to
proactively protect your organization.


ATTACK TYPES


UNLOCKED: BACKDOORS FUEL RANSOMWARE

Backdoor deployments, which enable remote access to systems, were the most
common type of attacker action that X-Force incident responders handled. The
silver lining: 67% of backdoor cases were failed ransomware attacks as defenders
were able to disrupt the backdoor before ransomware was deployed.

21%

Of incidents saw backdoors deployed

17%

Of attacks in 2022 were ransomware

6%

Of attacks were business email compromise




EXPERT INSIGHT: KEYING IN ON BACKDOORS

Watch Andy Piazza, Global Head of Threat Intelligence at IBM Security X-Force,
discuss the top three actions we saw threat actors take.

IBM Security X-Force Threat Intelligence Index 2023 Insight: Andy Piazza (01:02)


TIP:


UNDERSTAND AN ATTACKER’S VIEW OF KNOWN AND UNKNOWN RISKS

Taking an attacker’s view of both known and unknown risks can help organizations
adopt preventive measures before incidents happen.

See demo





EXTORTION


VICTIMS FELT THE PRESSURE IN 27% OF ATTACKS

Whether ransomware, business email compromise (BEC) or distributed denial of
service (DDoS), 27% of attacks were extortion related. When attackers see a
weakness, they exploit it. Recognizing the industry's low tolerance for
downtime, cybercriminals focused more extortion attempts on manufacturing than
any other industry.

of extortion targeted manufacturing
0%
of extortion targeted Europe
0%



PREPARE AND RESPOND FASTER

Get recommendations to help you stay ahead of threats.


Download report


INFECTION VECTORS


PHISHING: TOP WAY ATTACKERS GAINED ACCESS

For the second year in a row, phishing was the leading infection vector,
identified in 41% of incidents. More than half of phishing attacks used spear
phishing attachments. X-Force also observed a 100% increase in thread hijacking
attempts per month—where an attacker impersonates someone and uses existing
email conversations for nefarious purposes.

41%

Of attacks used phishing

26%

Of attacks exploited public-facing apps

16%

Of attacks abused valid accounts




EXPERT INSIGHT: PHISHING FACTS

Stephanie “Snow” Carruthers, Chief People Hacker at IBM Security X-Force Red,
explains why phishing was the leading infection vector.

IBM Security X-Force Threat Intelligence Index 2023 Insight: Stephanie
Carruthers (01:00)


VULNERABILITIES


ONLY 26% OF NEW VULNERABILITIES HAD KNOWN EXPLOITS

The proportion of vulnerabilities with a known exploit declined 10 percentage
points over the last few years. However, cybercriminals already have access to
more than 78,000 known exploits. This access made it easier to exploit older,
unpatched vulnerabilities, highlighting the need for a well-defined
vulnerability management strategy, including better understanding your attack
surface and risk-based prioritization of patches.

New vulnerabilities with exploits
0%
Of known exploits were new in 2022
0%



TIP:


YOU NEED TO ANALYZE MULTIPLE FACTORS

Identify, prioritize and remediate the vulnerabilities that matter most.

Schedule a 1:1 consultation with an X-Force expert





RANSOMWARE


FAST RANSOMWARE ATTACKS DEMAND FASTER RESPONSES

While there was a slight decline in ransomware attacks, an X-Force study found
that the time to execute attacks dropped 94% over the last few years. What took
months now takes attackers mere days. With attackers moving faster,
organizations must take a proactive, threat-driven approach to cybersecurity.

60+ days

2019 ransomware deployment time

9.5 days

2020 ransomware deployment time

3.85 days

2021 ransomware deployment time




EXPERT INSIGHT: RANSOMWARE REALITIES

John Dwyer, Head of Research, IBM Security X-Force, talks about the need for
speed when it comes to ransomware attacks.

IBM Security X-Force Threat Intelligence Index 2023 Insight: John Dwyer (00:51)


NEXT STEPS


READ THE FULL REPORT

Download the report for additional insights and recommendations.




TALK TO AN EXPERT

Schedule time to speak with an X-Force expert.




PRODUCTS & SOLUTIONS

 * Top products & platforms
 * Industries
 * Artificial intelligence
 * Blockchain
 * Business operations
 * Cloud computing
 * Data & Analytics
 * Hybrid cloud
 * IT infrastructure
 * Security
 * Supply chain


LEARN ABOUT

 * What is Hybrid Cloud?
 * What is Artificial intelligence?
 * What is Cloud Computing?
 * What is Kubernetes?
 * What are Containers?
 * What is DevOps?
 * What is Machine Learning?


POPULAR LINKS

 * IBM Consulting
 * Communities
 * Developer education
 * Support - Download fixes, updates & drivers
 * IBM Research
 * Partner with us - Partner Plus
 * Training - Courses
 * Upcoming events & webinars


ABOUT IBM

 * Annual report
 * Career opportunities
 * Corporate social responsibility
 * Diversity & inclusion
 * Industry analyst reports
 * Investor relations
 * News & announcements
 * Thought leadership
 * Security, privacy & trust
 * About IBM


SELECT A COUNTRY/REGION

United States - EnglishAfghanistan - EnglishAlgeria - FrenchAngola -
PortugueseAnguilla - EnglishAntigua and Barbuda - EnglishArgentina -
SpanishAruba - EnglishAustralia - EnglishAustria - GermanBahamas -
EnglishBahrain - EnglishBangladesh - EnglishBarbados - EnglishBelgium/Luxembourg
- DutchBelgium/Luxembourg - EnglishBelgium/Luxembourg - FrenchBermuda -
EnglishBolivia - SpanishBotswana - EnglishBrazil - PortugueseBrunei Darussalam -
EnglishBulgaria - BulgarianBulgaria - EnglishBurkina Faso - FrenchCambodia -
EnglishCameroon - EnglishCameroon - FrenchCanada - EnglishCanada - FrenchCayman
Islands - EnglishChad - FrenchChile - SpanishChina - Chinese
(Simplified)Colombia - SpanishCongo - FrenchCongo, The Democratic Republic of
the - FrenchCosta Rica - SpanishCroatia - CroatianCroatia - EnglishCuracao -
EnglishCyprus - EnglishCzech Republic - CzechCzech Republic - EnglishDenmark -
DanishDenmark - EnglishDominica - EnglishEcuador - SpanishEgypt - EnglishEstonia
- EnglishEstonia - EstonianEthiopia - EnglishFinland - EnglishFinland -
FinnishFrance - FrenchGabon - FrenchGermany - GermanGhana - EnglishGreece -
EnglishGreece - GreekGrenada - EnglishGuyana - EnglishHong Kong S.A.R. of China
- EnglishHungary - EnglishHungary - HungarianIndia - EnglishIndonesia -
EnglishIraq - EnglishIreland - EnglishIsrael - EnglishIsrael - HebrewItaly -
ItalianIvory Coast - FrenchJamaica - EnglishJapan - JapaneseJordan -
EnglishKazakhstan - EnglishKazakhstan - KazakhKenya - EnglishKorea, Republic of
- KoreanKuwait - EnglishLatvia - EnglishLatvia - LatvianLebanon - EnglishLibya -
EnglishLithuania - EnglishLithuania - LithuanianMadagascar - FrenchMalawi -
EnglishMalaysia - EnglishMauritius - EnglishMauritius - FrenchMexico -
SpanishMontserrat - EnglishMorocco - FrenchMozambique - PortugueseNamibia -
EnglishNepal - EnglishNetherlands - DutchNetherlands - EnglishNew Zealand -
EnglishNiger - FrenchNigeria - EnglishNorway - EnglishNorway - NorwegianOman -
EnglishPakistan - EnglishParaguay - SpanishPeru - SpanishPhilippines -
EnglishPoland - PolishPortugal - EnglishPortugal - PortugueseQatar -
EnglishRomania - EnglishRomania - RomanianRussian Federation - RussianSaint
Kitts and Nevis - EnglishSaint Lucia - EnglishSaint Vincent and the Grenadines -
EnglishSaudi Arabia - ArabicSaudi Arabia - EnglishSenegal - FrenchSerbia -
EnglishSerbia - SerbianSeychelles - FrenchSierra Leone - EnglishSingapore -
EnglishSlovakia - EnglishSlovakia - SlovakSlovenia - EnglishSlovenia -
SlovenianSouth Africa - EnglishSpain - SpanishSri Lanka - EnglishSuriname -
EnglishSweden - EnglishSweden - SwedishSwitzerland - FrenchSwitzerland -
GermanTaiwan - Chinese (Traditional)Taiwan - EnglishTanzania, United Republic of
- EnglishThailand - EnglishTrinidad and Tobago - EnglishTunisia - FrenchTurkey -
TurkishTurks and Caicos Islands - EnglishUganda - EnglishUkraine -
EnglishUkraine - UkrainianUnited Arab Emirates - ArabicUnited Arab Emirates -
EnglishUnited Kingdom - EnglishUruguay - SpanishUzbekistan - EnglishUzbekistan -
UzbekVenezuela - SpanishVietnam - EnglishVietnam - VietnameseVirgin Islands,
British - EnglishYemen - EnglishZambia - EnglishZimbabwe - EnglishUnited States
- English

--------------------------------------------------------------------------------

 * Contact IBM
 * Privacy
 * Terms of use
 * Accessibility
 * Cookie Preferences




Let’s talk

Contact Us
FR–En


HELLO! HOW CAN WE HELP YOU?

I need support



I have a sales question



Close



Close



Close



IBM web domains

ibm.com, ibm.dev, ibm.org, ibm-zcouncil.com, insights-on-business.com, jazz.net,
merge.com, micromedex.com, mobilebusinessinsights.com, promontory.com,
proveit.com, ptech.org, resource.com, s81c.com, securityintelligence.com,
skillsbuild.org, softlayer.com, storagecommunity.org, strongloop.com,
teacheradvisor.org, think-exchange.com, thoughtsoncloud.com, trusteer.com,
truven.com, truvenhealth.com, alphaevents.webcasts.com, betaevents.webcasts.com,
ibm-cloud.github.io, ibmbigdatahub.com, bluemix.net, mybluemix.net, ibm.net,
ibmcloud.com, redhat.com, galasa.dev, blueworkslive.com, swiss-quantum.ch,
altoromutual.com, blueworkslive.cn, blueworkslive.com, cloudant.com, ibm.ie,
ibm.fr, ibm.com.br, ibm.co, ibm.ca, silverpop.com,
community.watsonanalytics.com, eclinicalos.com, datapower.com,
ibmmarketingcloud.com, thinkblogdach.com, truqua.com, my-invenio.com,
skills.yourlearning.ibm.com, bluewolf.com, asperasoft.com, instana.com,
taos.com, envizi.com
About cookies on this site Our websites require some cookies to function
properly (required). In addition, other cookies may be used with your consent to
analyze site usage, improve the user experience and for advertising. For more
information, please review your cookie preferences  options and IBM’s privacy
statement. To provide a smooth navigation, your cookie preferences will be
shared across the IBM web domains listed here.

Accept all Required only