You have 0 free articles left this month.
Register for a free account to access unlimited free content.
Powered by MOMENTUM MEDIA
lawyers weekly logo

Powered by MOMENTUMMEDIA

Breaking news and updates daily. Subscribe to our Newsletter
Advertisement

Most organisations are notified of compromise from external sources, says Mandiant

Organisations that fall victim to cyber attacks are most commonly notified by external parties, according to new findings.

Most organisations are notified of compromise from external sources, says Mandiant
expand image

Google’s cyber security firm, Mandiant, has released its M-Trends 2025 report, outlining the trends in the current cyber security landscape.

“By providing data and other security metrics in M-Trends, along with deeper dives on attacker trends, we illustrate how threat actors are conducting their operations, how they are achieving their goals, and what organisations need to be doing to prevent, detect, and respond to threats,” said Mandiant.

A key finding within the report is that the majority of organisations still only discover compromise when an external party reaches out, whether that be a third party such as a cyber security firm, law enforcement or media publication, or a threat actor sending a ransom note or other form of communication.

“The majority of organisations, 57 per cent, first learned of a 2024 compromise from an external source,” said Mandiant.

Of that 57 per cent, 43 per cent of organisations discovered compromise after being notified by an external source, the same percentage as organisations that discovered threats internally.

The remaining 14 per cent discovered compromise after being notified by an adversary.

“Adversary notifications typically take the form of ransom notes and represented 14 per cent of total detection sources in 2024,” said Mandiant.

Within the Japan and Asia Pacific region, external detection represents an even larger percentage, with 69 per cent of detections discovered externally.

The latest findings represent only a small increase from the previous year, with 54 per cent of compromise discovered externally and 46 per cent internally.

Mandiant also found that exploits continue to be the most common initial infection vector for the fifth year in a row.

The firm said that its investigations noted that roughly a third (33 per cent) of all initial infections were the result of exploits.

Stolen credentials were second at 16 per cent, the first time this vector has been in the silver position. This represents an increase in stolen credentials being used for compromise. Mandiant said that info-stealer malware is being increasingly deployed to steal credentials for compromise.

“A key takeaway from M-Trends 2025 is that attackers are seizing every opportunity to further their objectives,” said Mandiant.

“One way they are doing this is through the use of info-stealer malware, which is increasingly being used to enable instructions using stolen credentials.”

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.
You need to be a member to post comments. Become a member for free today!

newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.