Research Reveals 57% of Cyberattacks Start with Compromised Identity

Our in-depth report on cyberattacks in 2024 reveals the importance of data security.

Nolan Necoechea
2 min read
Last updated December 13, 2024
Varonis' cyberattack research report shows an identity crisis in cybersecurity

If you read the headlines this year, you might think the threat landscape is becoming more sophisticated. From state-sponsored attacks to election campaign hacks to new forms of ransomware, the threat landscape appears to be a minefield of sophisticated cyberattacks.

However, those headlines don’t reflect reality.

The truth is that bad actors either buy already stolen credentials or use tried-and-true techniques to gain access, like phishing and password spraying. Once in your environment, attackers overwhelmingly target data to exfiltrate or ransom.

To highlight how cyberattacks are occurring and how organizations can prevent catastrophic breaches, Varonis compiled The Identity Crisis report. Our researchers examined 35 cyberattacks from the first half of 2024 and found that bad actors typically don’t hack in using sophisticated techniques or malware. Instead, they log in.

In more than half (57%) of the cyberattacks examined, attackers compromised an identity to gain access to protected environments.

Blog_IdentityCrisisReport_InCopyImage1_V1

An analysis of cyberattacks in 2024

In our report, we reviewed 35 SEC Form 8-K filings disclosed between January and August 2024 and cross-referenced them with news sources, threat reports, and insights gathered by the Varonis’ Managed Data Detection and Response (MDDR) team.

The result is a clearer picture of how cyberattacks occur, what the consequences are, and how to protect your organization.

The identity crisis: The entry point for cyberattacks

What we found was that most cyberattacks start with an identity. In some cases, attackers used already compromised credentials, as in the targeted campaign against Snowflake customers. In other instances, attackers compromised an identity to gain access to the environment with techniques that included:

  • Compromised accounts
  • Compromised credentials
  • Data exposure
  • Insider threats
  • Password sprays
  • Phishing
  • Privilege escalation

Once attackers have access, they overwhelmingly target data. “Data exfiltration” was the most common reported consequence of cyberattacks, more prevalent even than “business disruption.”

While bad actors target various data types, our research found that customer data was by far the most targeted type.

Read the full Identity Crisis report
Download
Varonis Threat Eye

How Varonis prevents cyberattacks and secures data

In this threat environment, organizations must protect themselves at every phase of a cyberattack’s lifecycle, from the initial breach to data exfiltration.

Varonis enables security teams to stay ahead of bad actors with a unified approach to data security that can stop attackers at every step.

Safeguarding identities and right-sizing permissions

Most cyberattacks start with an identity. With that in mind, the first step is to unravel permissions structures and ensure that only the right people can access important files, folders, and mailboxes.

Varonis' identity protection capabilities seamlessly map identities and users across cloud, SaaS, and data centers in a single interface. Automated policies effortlessly eliminate stale users, excessive permissions, and misconfigured roles, and groups that bad actors can exploit.

Detecting abnormal behavior and insider threats

Once a bad actor with legitimate credentials is in your environment, it can be incredibly challenging to identify the threat.

Varonis uses behavior-based detections to alert you to abnormal behaviors that indicate a bad actor in your environment. Hundreds of expert-built threat models automatically detect anomalies, alerting you to unusual file access activity, email send/receive actions, permissions changes, and geo-hopping.

You can track threats and conduct advanced investigations with a complete forensics log of actions, including file access, email activity, and permissions changes.

Securing data and preventing data exfiltration

Varonis enables you to create granular policies to fit your organization’s needs, automatically fix gaps, and re-label files as your data changes — making downstream DLP controls more effective. 

The Varonis access graph factors in entitlements, group memberships, sharing links, muting permissions, and more, giving you the most accurate view of sensitive data risk and ensuring that automated policies don’t break business processes.

Curious to see how the Varonis unified platform can help your organization? Request a free Data Risk Assessment. We’ll show you where your sensitive data is at risk and provide you with actionable information to help you strengthen your data security.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

the-2021-healthcare-data-risk-report-reveals-1-out-of-every-5-files-is-open-to-all-employees
The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees
The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.
2019-data-risk-report-stats-and-tips-you-won’t-want-to-miss
2019 Data Risk Report Stats and Tips You Won’t Want to Miss
Our data risk report analyzed over 54 billion files across 30+ industries for the latest insights, stats and tips to improve your data security practices
dspm-report-highlights-risks-that-lead-to-significant-data-breaches  
DSPM Report Highlights Risks That Lead to Significant Data Breaches  
Varonis' new DSPM report reveals that typical companies are widening their blast radius by oversharing permissions, excess ghost users, lack of MFA, and more.
varonis-threat-labs-discovers-sqli-and-access-flaws-in-zendesk
Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk
Varonis Threat Labs found a SQL injection vulnerability and a logical access flaw in Zendesk Explore, the reporting and analytics service in the popular customer service solution, Zendesk.