Cybersecurity threatscape: Q1 2024

In Q1 2024, the number of incidents increased by 7% compared to the previous quarter. One of the most common consequences of successful cyberattacks was again the leak of confidential information—72% for individuals and 54% for organizations. Attackers more frequently used malware against individuals: the share of such incidents increased by 9% compared to the previous quarter, reaching 68%. In successful attacks on organizations, we see a reduction of 11% in the use of ransomware compared to the previous quarter (from 54% to 43%). Meanwhile, there was an increase in the use of remote access tools by attackers in attacks on both organizations (32%) and individuals (37%): an increase of 10% and 27% respectively compared to the previous quarter. Social engineering remains the most dangerous threat for individuals, accounting for 85% of such incidents, and one of the most popular attack vectors on organizations, accounting for 52%.

Attack consequences

Cyberattacks in Q1 2024 led to various consequences: criminals successfully attacked both small enterprises and industry giants, sometimes causing city-wide disruptions. Criminals were mainly focused on obtaining confidential information (accounting for 54% of attacks) and disrupting the core activities of organizations (33%). Despite the trend towards using RATs, we shouldn't forget ransomware, which can lead to the execution of non-tolerable events. For example, the incident in February with Lurie Children's Hospital in Chicago. This attack affected the hospital's internet, email, telephone communication, and access to the MyChart platform. Local media reported that planned procedures were postponed, ultrasound and CT scan results were unavailable, and doctors had to write prescriptions manually. The Rhysida extortion group claimed responsibility for the attack: claiming to have stolen 600 GB of hospital data, the criminals demanded a ransom of 60 BTC (about $4 million).

Consequences of attacks (percentage of successful attacks)
Figure 10. Consequences of attacks (percentage of successful attacks)

Here is a list of attacks in the first quarter that had a negative impact and wide repercussions:

  • In February, attackers managed to infiltrate the systems of the German battery manufacturer Varta. As a result of the attack, the company halted production at five plants. The announcement of the shutdown did not go unnoticed, and the company's shares fell by 4.75%.
  • In January, Tietoevry faced an attack by the Akira ransomware. The attack affected a data center, consequently impacting the company's clients. Among them was Sweden's largest cinema chain: due to the attack, people were unable to buy tickets online. The building materials supplier Moelven also suffered, and the agricultural products supplier Grangården had to close its stores during the recovery period.
  • On February 21, the BlackCat (ALPHV) ransomware gang attacked the medical technology services company Optum. As a result, the Change Healthcare platform crashed. It's the largest payment exchange platform between doctors, pharmacies, healthcare providers, and patients in the US healthcare system. Due to the incident, doctors and pharmacies had to find alternative ways to submit insurance claims. According to First Health Advisory, a digital health risk assurance firm, the failure cost providers approximately $100 million per day.

In successful attacks on organizations resulting in the leak of confidential information, attackers most often aimed to steal personal data (37% of stolen information) and credentials (17%), as well as trade secrets (22%). Attacks on individuals largely aimed at stealing their credentials (39%) and personal data (25%).

Types of data stolen
Figure 11. Types of data stolen (in successful attacks on organizations)
Types of data stolen (in successful attacks on individuals)
Figure 12. Types of data stolen (in successful attacks on individuals)

In Q1, we noted that, among information stolen from organizations, the share of credentials increased by 7% compared to the previous quarter. Reasons for this growth include the widespread distribution of malware by attackers and numerous phishing campaigns. Throughout March, PT Expert Security Center experts recorded phishing messages disguised as Microsoft mailings. Attached to the emails were PDF documents containing a fake DocuSign and a QR code. The QR code took the user to a phishing page disguised as the Microsoft login page, where only the victim’s password needed to be entered.

QR code leading to a phishing page.jpg
Figure 13. QR code leading to a phishing page

A similar phishing campaign targeting bank employees was recorded by PT ESC experts in January. The emails contained a link to a phishing page imitating the bank's website. The campaign also aimed to steal credentials.

Phishing page imitating the bank's website
Figure 14. Phishing page imitating the bank's website

The most notable data breaches in Q1:

  • In January, researchers discovered a database containing 26 billion records with data from users of popular foreign and Russian social networks and resources such as LinkedIn, Twitter, Snapchat, Adobe, Tencent, and others. The found database was named "mother of all breaches."
  • At the end of January, Viamedis suffered a major data breach from a cyberattack. The breach affected 33 million people. The company stated that the information included names, dates of birth, insurer data, social security numbers, marital status, citizenship status, and guarantees available for payment by third-parties.
  • As a result of a security breach at a French employment agency, information on 43 million people was compromised. The stolen data includes names, dates and places of birth, social security numbers, France Travail IDs, email addresses, postal addresses, and phone numbers.
  • Hyundai Motor Europe suffered a Black Basta ransomware attack, resulting in the theft of 3 terabytes of corporate data. The specific data stolen was not disclosed, but it is known to relate to various departments of the company, including legal, sales, human resources, accounting, IT, and management.

InfoTo protect against cyberattacks, we recommend following our general guidelines on personal and corporate cybersecurity.

In view of the events in Q1, we strongly recommend remaining vigilant online, and refraining from opening suspicious links or opening email attachments from unverified sources. Given the large number of attacks distributing malware through legitimate services, developers should pay close attention to the repositories and package managers used in their projects, implement software supply chain security practices, and deploy application security tools.

Organizations should develop vulnerability management processes and participate in bug bounty programs. First and foremost, fix vulnerabilities that attackers are already known to exploit and for which publicly available exploits exist.

We also recommend using web application firewalls to harden the network perimeter. To protect devices against malware, use sandboxes to analyze file behavior in a virtualized environment, detect malicious activity, and act in time to prevent damage to your company.

To protect your organization from potential breaches, it is important to pay attention to the protection of data. We recommend conducting regular inventory and classification of assets, establishing data access control policies, monitoring access to sensitive information, and using specialized solutions that apply the "data-centric security" concept.

Statistics

Number of incidents in 2023 and 2024 (by quarter)
Figure 15. Number of incidents in 2023 and 2024 (by quarter)
Categories of victim organizations
Figure 16. Categories of victim organizations

Chart.png

22% of attacks targeted individuals

Percentage of successful attacks
Figure 17. Targets of attacks (percentage of successful attacks)
Malware distribution methods in successful attacks on organizations
Figure 18. Malware distribution methods in successful attacks on organizations
Malware distribution methods in successful attacks on individuals
Figure 19. Malware distribution methods in successful attacks on individuals
Target OS in malware attacks (percentage of successful attacks)
Figure 20. Target OS in malware attacks (percentage of successful attacks)

About the report

This report contains information on current global information security threats based on Positive Technologies' own expertise, investigations, and reputable sources.

We estimate that most cyberattacks are not made public due to reputational risks. As a consequence, even companies specializing in incident investigation and analysis of hacker activity are unable to quantify the precise number of threats. Our research seeks to draw the attention of companies and ordinary individuals who care about information security to the key motives and methods of cyberattacks, as well as to highlight the main trends in the changing cyberthreat landscape.

This report considers each mass attack (for example, phishing emails sent to multiple addresses) as one separate attack, not several. For explanations of terms used in this report, please refer to the glossary on the Positive Technologies website.

Get in touch

Fill in the form and our specialists
will contact you shortly