February 27, 2018 By David Bisson 2 min read

More than half of external attackers use social engineering as their point of entry into target organizations, a new study on incident response revealed.

According to F-Secure’s “Incident Response Report,” 52 percent of external attackers used social engineering to infiltrate target companies. The remaining 48 percent exploited technical weaknesses.

Social Engineering Attacks by the Numbers

The majority of social engineering instances occurred in targeted attacks, the study found. The financial, manufacturing, security and technology industries all experienced campaigns in which bad actors picked a target and went after it. In fact, some verticals, such as the gaming, public and service sectors, encountered only targeted campaigns.

Not all attacks were targeted, however. There were also opportunistic campaigns in which nefarious individuals struck simply because they saw an opportunity to do so. These attacks accounted for 45 percent of incident response investigations disclosed by the company’s security consultants.

F-Secure’s experts observed numerous subtypes of incidents. The most common subcategory was attacks in which threat actors abused a weakness in an organization’s internet infrastructure (21 percent). That’s just 1 percent higher than insider threats (20 percent), followed by malicious email attachments (18 percent), phishing/spear phishing (16 percent) and brute force (9 percent).

Security consultants also witnessed wide discrepancies in attackers’ progress. In 29 percent of cases, bad actors succeeded only in breaching the perimeter. Many others went further than that and capitalized on their headway by deploying malware (20 percent) and exfiltrating data (12 percent).

Room for Improvement in Incident Response

In total, 79 percent of these reported attacks were successful, while 13 percent were false positives resulting from “IT problems or other issues being misunderstood as security incidents by the reporting organization.”

F-Secure principal security consultant Tom Van de Wiele said he believes these findings reflect the challenge of figuring out whether an incident occurred. “Once an organization has the facts based on detection capabilities, and not rumors or assumptions, then the process can continue with the next step, which is usually containment and eradication,” he said, as quoted in an F-Secure blog post.

The authors of the report advised companies to invest in better detection capabilities, such as an endpoint detection and response solution. They also emphasized the importance of using threat intelligence to more quickly and efficiently respond to security incidents and eliminate false positives.

More from

Threat intelligence to protect vulnerable communities

2 min read - Key members of civil society—including journalists, political activists and human rights advocates—have long been in the cyber crosshairs of well-resourced nation-state threat actors but have scarce resources to protect themselves from cyber threats. On May 14, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) released a High-Risk Communities Protection (HRCP) report developed through the Joint Cyber Defense Collaborative that addresses the threat to these vulnerable groups, with findings contributed by the X-Force Threat Intelligence team.Cyber criminals seek stolen credentialsThe HRCP…

Overheard at RSA Conference 2024: Top trends cybersecurity experts are talking about

4 min read - At a brunch roundtable, one of the many informal events held during the RSA Conference 2024 (RSAC), the conversation turned to the most popular trends and themes at this year’s events. There was no disagreement in what people presenting sessions or companies on the Expo show floor were talking about: RSAC 2024 is all about artificial intelligence (or as one CISO said, “It’s not RSAC; it’s RSAI”). The chatter around AI shouldn’t have been a surprise to anyone who attended…

3 recommendations for adopting generative AI for cyber defense

3 min read - In the past eighteen months, generative AI (gen AI) has gone from being the source of jaw-dropping demos to a top strategic priority in nearly every industry. A majority of CEOs report feeling under pressure to invest in gen AI. Product teams are now scrambling to build gen AI into their solutions and services. The EU and US are beginning to put new regulatory frameworks in place to manage AI risks.Amid all this commotion, hackers and other cybercriminals are hardly…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today