Skip to main content
HomeTopicsInitial Access

Initial Access

Cybersecurity statistics about initial access

Showing 1-9 of 9 results

In the fastest cases, attackers moved from initial access to data exfiltration in 72 minutes, four times faster than the previous year.

Palo Alto Unit 422/22/2026
Data Exfiltration

Comcast Business detected 4.7 billion phishing attempts, which specifically targeted human error and poor credential hygiene.

Comcast Business10/1/2025
Cyber threatPhishing

SCATTERED SPIDER moved from initial access to encryption by deploying ransomware in under 24 hours in one observed case

CrowdStrike8/4/2025
RansomwareInitial access

The top initial access vector observed in 2024 was a tie between exploitation of public facing applications and use of valid account credentials, both representing 30% of X-Force incidence response engagements.

IBM 4/17/2025
Initial accessPublic facing application

The average time from initial access to domain control has shrunk to under two hours.

DirectDefense4/15/2025
Initial accessDomain control

For Initial Access, the most observed technique by DirectDefense is Valid Accounts, which involves leveraging stolen credentials for unauthorized access. Alerts triggered for Initial Access include: First Ingress Authentication from Country, Multiple Country Ingress Authentications, Multiple Wireless Country Authentications.

DirectDefense4/15/2025
MITRE ATT&CKInitial access

DirectDefense mapped alerts to the MITRE ATT&CK® framework to identify the top five tactics. The top five tactics identified are: Initial Access, Persistence, Lateral Movement, Execution, and Credential Access.

DirectDefense4/15/2025
MITRE ATT&CKInitial access

4 of 5 (83%) financial fraud claims began with email.

At-Bay4/10/2025
Financial fraudClaim

Email was the preferred entry vector for cybercriminals, driving 43% of claims.

At-Bay4/10/2025
EmailCyber attack