Arctic Wolf Labs Threat Report

Whitepaper

Published March 2024

x

Most BEC incidents – whether involving account compromise or limited to spoofing or masquerading – can be traced to phishing, while 46.3% of non-BEC attacks are driven by credential reuse. More specifically, 39% of non-BEC incidents Arctic Wolf investigated involved an attacker using credentials to log in to an external remote access application, while another 7.3% of non-BEC incidents leveraged previously compromised credentials to gain direct access to a victim’s environment via other asset types. Organisations can strengthen their security posture by enforcing robust identity controls, including strong multifactor authentication (MFA) and passwordless authentication techniques, and by implementing modern identity and access management (IAM) infrastructures