Skip to main content
HomeTopicsInitial access

Initial access

Cybersecurity statistics about initial access

Showing 1-8 of 8 results

Comcast Business detected 4.7 billion phishing attempts, which specifically targeted human error and poor credential hygiene.

Comcast Business10/1/2025
Cyber threatPhishing

SCATTERED SPIDER moved from initial access to encryption by deploying ransomware in under 24 hours in one observed case

CrowdStrike8/4/2025
RansomwareEncryption

The top initial access vector observed in 2024 was a tie between exploitation of public facing applications and use of valid account credentials, both representing 30% of X-Force incidence response engagements.

IBM 4/17/2025
Public facing applicationValid account credentials

The average time from initial access to domain control has shrunk to under two hours.

DirectDefense4/15/2025
Domain control

For Initial Access, the most observed technique by DirectDefense is Valid Accounts, which involves leveraging stolen credentials for unauthorized access. Alerts triggered for Initial Access include: First Ingress Authentication from Country, Multiple Country Ingress Authentications, Multiple Wireless Country Authentications.

DirectDefense4/15/2025
MITRE ATT&CKValid accounts

DirectDefense mapped alerts to the MITRE ATT&CK® framework to identify the top five tactics. The top five tactics identified are: Initial Access, Persistence, Lateral Movement, Execution, and Credential Access.

DirectDefense4/15/2025
MITRE ATT&CKPersistence

4 of 5 (83%) financial fraud claims began with email.

At-Bay4/10/2025
Financial fraudClaim

Email was the preferred entry vector for cybercriminals, driving 43% of claims.

At-Bay4/10/2025
EmailCyber attack