Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
DNS‑record analysis shows uneven DMARC enforcement among FIFA World Cu...
Highlights of Asia’s 2026 premier integrated security event
Study: Cyber resilience in APAC foundational but not future-ready
Popular PC utility website served malware-laced installers for 19 hour...
Fake crypto app on official app store drains US$9.5M from 50 victims
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      How AI is supercharging insider threats

      How AI is supercharging insider threats

      Wednesday, April 15, 2026, 12:29 PM Asia/Singapore | Features
    • Featured

      Q-Day is coming. Are you ready?

      Q-Day is coming. Are you ready?

      Tuesday, April 14, 2026, 12:40 PM Asia/Singapore | Features
    • Featured

      How lean defence teams turn endpoint insights into measurable risk reduction

      How lean defence teams turn endpoint insights into measurable risk reduction

      Monday, April 13, 2026, 3:15 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

News

Exploits remained the most frequently used initial infection vector in 2024: report

By CybersecAsia editors | Friday, April 25, 2025, 3:38 PM Asia/Singapore

Exploits remained the most frequently used initial infection vector in 2024: report

Explore this and other key cyber trends encountered by one cybersecurity firm’s incident response operations in 2024

Based on its incident response and investigation metrics* conducted between 1 Jan 2024 and 31 Dec 2024, a cybersecurity firm has rounded up some key cyber statistics for the period.

    First, the 12-month data indicated that attackers were seizing every opportunity to further their objectives, through: Infostealers malware, the targeting of unsecured data repositories, and the exploitation of gaps and risks (e.g., supply chain risks) introduced as organizations continue their migrations to the cloud.

    Second, the financial sector continued to be the most targeted industry, with the global median dwell time rising to 11 days from 10 days in similar data analyses for 2023 (compared to 16 days for 2022).

    Other key findings

    Third, the number of financially-motivated actors rose, while the number of espionage incidents dipped: 55% of threat groups active in 2024 data were financially motivated: a steady increase from 52% in 2023 and 48% in 2022. About 8% of threat groups in the data were motivated by espionage: a slight decrease from 10% in 2023 data analyzed. Also:

    • Ransomware trends: The most commonly observed initial infection vector for ransomware-related intrusions, when the vector could be identified, was brute-force attacks. Password spraying, virtual private network (VPN) devices compromised through default credentials, and high-volume Remote Desktop Protocol (RDP) login attempts were examples of the types of brute-force attacks investigate in 2024.
    • Stolen credentials reached a new high: The most common initial infection vector was exploits (33%) for the fifth consecutive year. Stolen credentials (16%) rose to the second most common in 2024, marking the first time this vector has reached this level. The remaining top five vectors included email phishing (14%), web compromises (9%), and prior compromises (8%).
    • Infostealer malware becoming a foundational threat: These malware families were often distributed through infected personal and contractor devices, leading to a record high in stolen credentials as an initial infection vector, and driving surges in credential-based attacks and cloud/SaaS breaches.
    • The most frequently targeted industries: Financial (17.4%), business and professional services (11.1%), high tech (10.6%), government (9.5%), and healthcare (9.3%). These targeting trends were mostly consistent with data from prior years.
    • Provenance of incident discovery: In 2024, external sources first alerted organizations of a compromise 57% of the time, and 43% of the time it was identified internally. External notifications are divided into 43% from entities such as law enforcement and cybersecurity vendors, and 14% from adversaries, often in the form of ransom notes. 
    • Other notable trends in the 2024 data: North Korean IT workers posing as remote contractors to gain insider access; Iranian threat actors ramping up destructive and espionage operations —particularly against Israeli targets — and China-nexus groups exploiting zero-day vulnerabilities and edge devices to evade detection. Also, threat actors in 2024 usually gained access to targeted systems through brute-force attacks, third-party-access [supply-chain] compromise, social engineering voice calls (voice phishing or vishing), SIM swapping, and Bring Your Own Device (BYOD) such as infected USB storage devices.

    According to Vivek Chudgar, Managing Director, Mandiant Consulting (JAPAC), the firm that reported on its 2024 incident data trends: “As financially motivated threats grow more sophisticated, our collective resilience depends on proactive threat intelligence, faster detection, and a relentless focus on closing security gaps before adversaries can exploit them.”

    *declared as “data collected from more than 450k+ hours of incident response engagements globally”, across the USA, JAPAC and EMEA regions

    Share:

    PreviousTeamT5 Warns of Global Risks Posed by Ivanti Vulnerability
    NextAI in EDR/XDR: Enhancing cybersecurity with a balance of machine and human expertise

    Related Posts

    Massively powerful botnet spotted: 5G-boosted DDoS attacks on the horizon

    Massively powerful botnet spotted: 5G-boosted DDoS attacks on the horizon

    Friday, September 10, 2021

    Are your in-house web applications harboring latent vulnerabilities?

    Are your in-house web applications harboring latent vulnerabilities?

    Friday, March 15, 2024

    How to outsmart filename masquerading: A practical guide to safer file handling

    How to outsmart filename masquerading: A practical guide to safer file handling

    Monday, May 26, 2025

    Another year like 2021, but worse: data protection/management trends 2022

    Another year like 2021, but worse: data protection/management trends 2022

    Tuesday, December 28, 2021

    Leave a reply Cancel reply

    You must be logged in to post a comment.

    Voters-draw/RCA-Sponsors

    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    Slide
    previous arrow
    next arrow

    CybersecAsia Voting Placement

    Gamification listing or Participate Now

    PARTICIPATE NOW

    Vote Now -Placement(Google Ads)

    Top-Sidebar-banner

    Whitepapers

    • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

      Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

      Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
    • 2024 Insider Threat Report: Trends, Challenges, and Solutions

      2024 Insider Threat Report: Trends, Challenges, and Solutions

      Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
    • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

      AI-Powered Cyber Ops: Redefining Cloud Security for 2025

      The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
    • Data Management in the Age of Cloud and AI

      Data Management in the Age of Cloud and AI

      In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

    Middle-sidebar-banner

    Case Studies

    • Cyber protection for medical clinics in Singapore

      Cyber protection for medical clinics in Singapore

      As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
    • India’s WazirX strengthens governance and digital asset security

      India’s WazirX strengthens governance and digital asset security

      Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
    • Bangladesh LGED modernizes communication while addressing data security concerns

      Bangladesh LGED modernizes communication while addressing data security concerns

      To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
    • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

      What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

      This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

    Bottom sidebar

    Other News

    • Tsingke Unveils ‘Zero-Contact’ Gene Synthesis to Safeguard Core Genetic Sequences

      Wednesday, April 15, 2026
      BEIJING, April 15, 2026 /PRNewswire/ …Read More »
    • NEC Asia Pacific to Showcase Trusted Public Safety and Digital Identity Innovations at Milipol TechX 2026

      Wednesday, April 15, 2026
      SINGAPORE, April 14, 2026 /PRNewswire/ …Read More »
    • Sprinto Expands to Australia with New Data Center to Power Localized, Audit-Ready Compliance

      Wednesday, April 15, 2026
      Sprinto combines local infrastructure with …Read More »
    • Hong Kong Anti-graft Watchdog: Clean Governance and Ethical Business is Key to Hong Kong’s Sustainable Business Development

      Thursday, April 9, 2026
      HONG KONG, April 9, 2026 …Read More »
    • Goodix Launches the World’s First eSE Solution Designed for AI Agents

      Thursday, April 9, 2026
      SHENZHEN, China, April 8, 2026 …Read More »
    • Our Brands
    • DigiconAsia
    • MartechAsia
    • Home
    • About Us
    • Contact Us
    • Sitemap
    • Privacy & Cookies
    • Terms of Use
    • Advertising & Reprint Policy
    • Media Kit
    • Subscribe
    • Manage Subscriptions
    • Newsletter

    Copyright © 2026 CybersecAsia All Rights Reserved.