<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>MOVEit &amp;mdash; Kevin Neely&#39;s Security Notes</title>
    <link>https://infosec.press/ktneely/tag:MOVEit</link>
    <description>A place where I can post security-related long-form thoughts, notes, and articles</description>
    <pubDate>Tue, 14 Apr 2026 14:28:54 +0000</pubDate>
    <item>
      <title>2024 Data Breach Investigations Report (DBIR) summary</title>
      <link>https://infosec.press/ktneely/2024-data-breach-investigations-report-dbir-summary</link>
      <description>&lt;![CDATA[The annual Verizon Data Breach Investigation Report is out, and along with it an accounting of the #cybersecurity compromise and data breach happenings for the past year.  As always, it&#39;s filled with data analysis and some trending commentary from the previous DBIR report.&#xA;&#xA;The following is a TL;DR summary generated using fabric by Daniel Miessler with some very minor editing.&#xA;&#xA;SUMMARY:                                          &#xA;This year, the 2024 DBIR reveals a significant rise in vulnerability exploitation and ransomware attacks, emphasizing the urgent need for enhanced cybersecurity measures.                                        &#xA;                                                                  &#xA;TRENDS:                                                        &#xA;Vulnerability exploitation tripled from last year, driven by zero-day vulnerabilities.                                             &#xA;Ransomware and extortion-related breaches accounted for 32% of all breaches.                                                       &#xA;Human error remains a significant factor, involved in 68% of breaches.                                                             &#xA;Third-party breaches increased by 68%, highlighting supply chain vulnerabilities.                                                                                                   &#xA;Financially motivated attacks dominate, with ransomware and extortion leading the charge.                                          &#xA;The median loss from #ransomware and extortion attacks was $46,000.                                                                 &#xA;Phishing remains a critical initial attack vector, with a notable increase in reporting rates.                                     &#xA;The use of stolen credentials and exploitation of vulnerabilities are top methods for system intrusion.                            &#xA;The #MOVEit vulnerability significantly impacted the threat landscape, affecting numerous industries, continuing the trend of &#34;secure file transfer&#34; systems being a significant risk to both company and customer data.&#xA;MOVEit and remote access (e.g. VPN) compromises are the focus of successful system-compromise attacks.&#xA;                                                               &#xA;STATISTICS:                                                    &#xA;180% increase in attacks involving vulnerability exploitation.&#xA;Ransomware accounts for 23% of breaches, with pure extortion at 9%.                                                                &#xA;Human element involved in 68% of breaches.  &#xA;15% of breaches involved third-party vulnerabilities.&#xA;Errors contributed to 28% of breaches.                                                                                             &#xA;Financial motives behind 92% of industries targeted by ransomware.                                          &#xA;Median loss from ransomware/extortion attacks is $46,000.                                                                          &#xA;20% of users reported phishing attempts in simulations.                                                                            &#xA;Median time to click on a phishing email is 21 seconds.         &#xA;Exploitation of vulnerabilities as the initial breach action doubled from last year.                              &#xA;                                                                                                                                     &#xA;QUOTES:                                                                                                                           &#xA;&#34;Ransomware and extortion-related threats continue to evolve, posing significant risks across industries.&#34;  &#xA;&#34;The human element remains a critical vulnerability in cybersecurity defenses.&#34;                                             &#xA;&#34;Supply chain vulnerabilities are increasingly being exploited by attackers.&#34;                                                      &#xA;&#34;Misdelivery errors highlight the ongoing challenge of human error in data breaches.&#34;                                              &#xA;&#34;Financially motivated attacks dominate the cyber threat landscape.&#34;                                                               &#xA;&#34;The MOVEit vulnerability has had a profound impact on the cybersecurity threat landscape.&#34;                                        &#xA;&#34;Increased reporting rates for phishing attempts indicate growing awareness among users.&#34;                                          &#xA;&#34;The rapid response to phishing emails underscores the need for continuous user education.&#34;                                        &#xA;&#34;Stolen credentials and vulnerability exploitation remain preferred methods for attackers.&#34;                     &#xA;&#34;The rise in third-party breaches underscores the importance of vendor security assessments.&#34;                                     &#xA;                                                                                           &#xA;RECOMMENDATIONS:                                                                                                                  &#xA;Implement multi-factor authentication to mitigate the risk of stolen credentials.                      &#xA;Regularly update and patch systems to protect against vulnerability exploitation.               &#xA;Conduct continuous phishing awareness training for all employees.                                         &#xA;Perform thorough security assessments of third-party vendors and suppliers.                                 &#xA;Deploy endpoint detection and response solutions to identify and mitigate ransomware attacks.                           &#xA;Encourage the reporting of phishing attempts and provide clear reporting procedures.                           &#xA;Utilize web application firewalls to protect against basic web application attacks.                                &#xA;Establish robust data backup and recovery processes to minimize the impact of ransomware.              &#xA;Monitor for unusual activity indicating the misuse of privileges by internal actors.                                &#xA;]]&gt;</description>
      <content:encoded><![CDATA[<p>The annual Verizon <a href="https://www.verizon.com/business/resources/T611/reports/2024-dbir-data-breach-investigations-report.pdf" rel="nofollow">Data Breach Investigation Report</a> is out, and along with it an accounting of the <a href="/ktneely/tag:cybersecurity" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">cybersecurity</span></a> compromise and data breach happenings for the past year.  As always, it&#39;s filled with data analysis and some trending commentary from the previous DBIR report.</p>

<p>The following is a TL;DR summary generated using <a href="https://github.com/danielmiessler/fabric" rel="nofollow">fabric</a> by Daniel Miessler with some very minor editing.</p>

<h2 id="summary">SUMMARY:</h2>

<p>This year, the 2024 DBIR reveals a significant rise in vulnerability exploitation and ransomware attacks, emphasizing the urgent need for enhanced cybersecurity measures.</p>

<h2 id="trends">TRENDS:</h2>
<ul><li>Vulnerability exploitation tripled from last year, driven by zero-day vulnerabilities.<br></li>
<li>Ransomware and extortion-related breaches accounted for 32% of all breaches.<br></li>
<li>Human error remains a significant factor, involved in 68% of breaches.<br></li>
<li>Third-party breaches increased by 68%, highlighting supply chain vulnerabilities.<br></li>
<li>Financially motivated attacks dominate, with ransomware and extortion leading the charge.<br></li>
<li>The median loss from <a href="/ktneely/tag:ransomware" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">ransomware</span></a> and extortion attacks was $46,000.<br></li>
<li>Phishing remains a critical initial attack vector, with a notable increase in reporting rates.<br></li>
<li>The use of stolen credentials and exploitation of vulnerabilities are top methods for system intrusion.<br></li>
<li>The <a href="/ktneely/tag:MOVEit" class="hashtag" rel="nofollow"><span>#</span><span class="p-category">MOVEit</span></a> vulnerability significantly impacted the threat landscape, affecting numerous industries, continuing the trend of “secure file transfer” systems being a significant risk to both company and customer data.</li>
<li>MOVEit and remote access (e.g. VPN) compromises are the focus of successful system-compromise attacks.
<br></li></ul>

<h2 id="statistics">STATISTICS:</h2>
<ul><li>180% increase in attacks involving vulnerability exploitation.</li>
<li>Ransomware accounts for 23% of breaches, with pure extortion at 9%.<br></li>
<li>Human element involved in 68% of breaches.<br></li>
<li>15% of breaches involved third-party vulnerabilities.</li>
<li>Errors contributed to 28% of breaches.<br></li>
<li>Financial motives behind 92% of industries targeted by ransomware.<br></li>
<li>Median loss from ransomware/extortion attacks is $46,000.<br></li>
<li>20% of users reported phishing attempts in simulations.<br></li>
<li>Median time to click on a phishing email is 21 seconds.<br></li>
<li>Exploitation of vulnerabilities as the initial breach action doubled from last year.<br>
<br></li></ul>

<h2 id="quotes">QUOTES:</h2>
<ul><li>“Ransomware and extortion-related threats continue to evolve, posing significant risks across industries.”<br></li>
<li>“The human element remains a critical vulnerability in cybersecurity defenses.”<br></li>
<li>“Supply chain vulnerabilities are increasingly being exploited by attackers.”<br></li>
<li>“Misdelivery errors highlight the ongoing challenge of human error in data breaches.”<br></li>
<li>“Financially motivated attacks dominate the cyber threat landscape.”<br></li>
<li>“The MOVEit vulnerability has had a profound impact on the cybersecurity threat landscape.”<br></li>
<li>“Increased reporting rates for phishing attempts indicate growing awareness among users.”<br></li>
<li>“The rapid response to phishing emails underscores the need for continuous user education.”<br></li>
<li>“Stolen credentials and vulnerability exploitation remain preferred methods for attackers.”<br></li>
<li>“The rise in third-party breaches underscores the importance of vendor security assessments.”<br>
<br></li></ul>

<h2 id="recommendations">RECOMMENDATIONS:</h2>
<ul><li>Implement multi-factor authentication to mitigate the risk of stolen credentials.<br></li>
<li>Regularly update and patch systems to protect against vulnerability exploitation.<br></li>
<li>Conduct continuous phishing awareness training for all employees.<br></li>
<li>Perform thorough security assessments of third-party vendors and suppliers.<br></li>
<li>Deploy endpoint detection and response solutions to identify and mitigate ransomware attacks.<br></li>
<li>Encourage the reporting of phishing attempts and provide clear reporting procedures.<br></li>
<li>Utilize web application firewalls to protect against basic web application attacks.<br></li>
<li>Establish robust data backup and recovery processes to minimize the impact of ransomware.<br></li>
<li>Monitor for unusual activity indicating the misuse of privileges by internal actors.<br></li></ul>
]]></content:encoded>
      <guid>https://infosec.press/ktneely/2024-data-breach-investigations-report-dbir-summary</guid>
      <pubDate>Thu, 02 May 2024 02:08:21 +0000</pubDate>
    </item>
  </channel>
</rss>