The five most commonly exploited services in critical infrastructure sectors were File Transfer Protocol (FTP), Remote Desktop Protocol (RDP), Remote Procedure Call (RPC), Server Message Block (SMB), Internet Relay Chat (IRC).
The five most commonly exploited services in critical infrastructure sectors were File Transfer Protocol (FTP), Remote Desktop Protocol (RDP), Remote Procedure Call (RPC), Server Message Block (SMB), Internet Relay Chat (IRC). — This cybersecurity statistic was published by CISA in January 2025. It covers topics including Exploitable services. The original data appears in Cybersecurity Performance Goals Adoption Report. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
The five most commonly exploited services in critical infrastructure sectors were File Transfer Protocol (FTP), Remote Desktop Protocol (RDP), Remote Procedure Call (RPC), Server Message Block (SMB), Internet Relay Chat (IRC). This data was published by CISA and covers Exploitable services.
Where does this data come from?
This statistic comes from Cybersecurity Performance Goals Adoption Report, published by CISA on January 1, 2025. You can view the original report at Cybersecurity Performance Goals Adoption Report | CISA.
What cybersecurity topics does this cover?
This statistic relates to Exploitable services. Browse more statistics on Exploitable services or from CISA.