Rapid7 Releases Attack Intelligence Report Examining High-Impact Attacks and Vulnerability Data Trends
Rapid7 has released its 2024 Attack Intelligence Report, highlighting significant trends in cyber threats, based on data dating back to 2019. The report reveals that more than half (53%) of mass compromise events in 2023 stemmed from zero-day vulnerabilities, a notable increase from 43% in 2022. It also notes that 36% of widely exploited vulnerabilities occurred in network perimeter technologies.
Other key points include the prevalence of simpler exploits like command injection, and that 41% of incidents observed in 2023 resulted from missing or weak multi-factor authentication. Rapid7 tracked over 5,600 ransomware incidents in 2023. The report underscores the critical need for zero-day patching and enhanced logging to combat these advanced threats.
- Rapid7's new report provides detailed analysis of over 1,500 vulnerability data points and 180 advanced threat campaigns.
- 53% of mass compromise events in 2023 were due to zero-day vulnerabilities, highlighting the growing trend and need for vigilance.
- 36% of widely exploited vulnerabilities occurred in network perimeter technologies, emphasizing areas that need improved security measures.
- Rapid7 tracked over 5,600 ransomware incidents in 2023, showcasing the depth of their threat intelligence.
- The number of unique ransomware families decreased from 95 in 2022 to 43 in 2023, indicating some containment of new strains.
- Mass compromise events from zero-day vulnerabilities have increased from 43% in 2022 to 53% in 2023.
- 41% of incidents in 2023 were due to missing or unenforced multi-factor authentication, highlighting significant security lapses.
- A pronounced shift towards well-planned zero-day attacks by single adversaries was noted, increasing the scale of compromises.
- Zero-day vulnerabilities in network edge devices are particularly concerning, with 60% of vulnerabilities in 2023 exploited as zero-days.
- The median time between vulnerability disclosure and exploitation remains in single digits, underscoring the rapid pace of attacks.
Insights
Rapid7's recent findings highlight a critical shift in the cybersecurity landscape. The increasing prevalence of zero-day vulnerabilities resulting in mass compromise events emphasizes the growing sophistication and persistence of cyber threats. Particularly, the report's data indicating that
For a retail investor, understanding the implications of this shift is crucial. Companies involved in cybersecurity, like Rapid7, could see increased demand for their services as organizations seek to bolster their defenses. However, this also means that the companies’ ability to innovate and stay ahead of these threats is paramount. Investors should monitor how effectively Rapid7 and similar firms can respond to this evolving threat landscape through their products and strategic initiatives.
The report's findings should serve as a wake-up call for businesses to prioritize multi-factor authentication (MFA) and timely patch management. The data showing that
From a market perspective, Rapid7’s detailed analysis of the threat landscape offers valuable insights into the potential growth trajectory for cybersecurity solutions. With the report noting a nearly
Moreover, the reduction in the number of unique ransomware families from 95 in 2022 to 43 in 2023 suggests that while the threat landscape is becoming more sophisticated, it is also becoming more consolidated. This consolidation could imply that fewer, but more dangerous, cybercrime groups are operating, which might increase the demand for advanced threat detection and mitigation services. Investors should look into how Rapid7 plans to address these concentrated threats and the potential revenue growth from subscription-based security solutions.
Multi-year trend shows more zero-day vulnerabilities leading to mass compromise events
BOSTON, May 21, 2024 (GLOBE NEWSWIRE) -- Rapid7, Inc. (NASDAQ: RPD), a leader in extended risk and threat detection, today announced the release of its 2024 Attack Intelligence Report. The report provides expert insights and guidance that security practitioners can use to better understand and anticipate modern cyber threats.
The research underpinning the Attack Intelligence Report is based on more than 1,500 curated vulnerability and exploit data points; analysis of 180-plus advanced threat campaigns; thousands of tracked ransomware incidents, extortion communications, and dark web posts; and insights from trillions of security events across Rapid7 MDR and threat analytics telemetry.
Several significant findings arose from this vast examination of information dating back to 2019 and as recent as early 2024. For example, in 2023, for the second time in the last three years, more mass compromise events arose from zero-day vulnerabilities (
“Our data shows 2021 to have been the dividing line between a ‘then’ and a ‘now’ in zero-day attacks,” said Caitlin Condon, director of vulnerability intelligence at Rapid7 and the report’s primary author. “Since that time, the median number of days between vulnerability disclosure and exploitation, which we began tracking several years ago, has stayed in single digits across the CVEs in our annual datasets; widespread exploitation of major vulnerabilities has shifted from a notable event to a baseline expectation; and ransomware attacks regularly take entire public-facing systems offline, sometimes for weeks or months at a time.”
In addition to a consistently high number of zero days leading to mass compromise events, the report notes a “pronounced shift” in the way these events are playing out. Instead of following the historical pattern of “many attackers, many targets,” nearly a quarter (
Additional key findings from the 2024 Attack Intelligence Report include:
- Mass compromise events stemming from exploitation of network edge devices have almost doubled since the start of 2023, with
36% of widely exploited vulnerabilities occurring in network perimeter technologies. More than60% of the vulnerabilities Rapid7 analyzed in network and security appliances in 2023 were exploited as zero-days. - While skilled adversaries are still fond of memory corruption exploits, most of the widely exploited CVEs from the past few years have arisen from simpler, more easily exploitable root causes, like command injection and improper authentication issues.
41% of incidents Rapid7 MDR observed in 2023 were the result of missing or unenforced multi-factor authentication (MFA) on internet-facing systems, particularly VPNs and virtual desktop infrastructure.- Rapid7 Labs tracked more than 5,600 separate ransomware incidents over the course of 2023 and the first few months of 2024. The number of unique ransomware families reported across 2023 incidents decreased by more than half, from 95 new families in 2022 to 43 in 2023.
“This is a mature, well-organized cybercrime ecosystem at work, with increasingly sophisticated mechanisms to gain access, establish persistence, and evade detection,” said Condon. “The data is telling us that we are experiencing the intensification of a multi-year trend; now more than ever, implementing zero-day patching procedures for critical technologies is key.”
The report notes that network edge devices are at particular risk of n-day and zero-day exploitation, and Rapid7 recommends that vulnerabilities in these devices be mitigated as soon as vendor-provided patches or workarounds are available. The report also indicates that enabling logging and ensuring it is working as expected are critical for allowing security operations teams to hunt for the more elusive indicators of compromise and suspicious activity representing incidents executed by the mature attacker groups identified in the research.
To access the complete Rapid7 2024 Attack Intelligence Report, which includes additional practical guidance for defenders, visit https://www.rapid7.com/research/report/2024-attack-intelligence-report/.
About the 2024 Attack Intelligence Report
Since 2020, Rapid7 has released an annual Vulnerability Intelligence Report with curated vulnerability data and in-depth analyses of exploit trends. In an effort to broaden the scope of this research and offer a more holistic view of the attack landscape, this year's report — renamed The Attack Intelligence Report — combines vulnerability and exploit research with hands-on data from Rapid7's managed detection and response (MDR) division, as well as the company’s threat analytics and emergent threat response teams.
About Rapid7
Rapid7, Inc. (NASDAQ: RPD) is on a mission to create a safer digital world by making cybersecurity simpler and more accessible. We empower security professionals to manage a modern attack surface through our best-in-class technology, leading-edge research, and broad, strategic expertise. Rapid7’s comprehensive security solutions help more than 11,000 global customers unite cloud risk management with threat detection and response to reduce attack surfaces and eliminate threats with speed and precision. For more information, visit our website, check out our blog, or follow us on LinkedIn or X.
Rapid7 Media Relations
Stacey Holleran
Sr. Product & Research Communications Manager
press@rapid7.com
(857) 216-7804
Rapid7 Investor Contact
Elizabeth Chwalk
Sr. Director, Investor Relations
investors@rapid7.com
(617) 865-4277
FAQ
What did Rapid7's 2024 Attack Intelligence Report reveal about zero-day vulnerabilities?
How many ransomware incidents did Rapid7 track in 2023?
What percentage of vulnerabilities in network perimeter technologies were widely exploited in 2023?
What was a major cause of security incidents according to the 2024 Attack Intelligence Report?