Learning Library

← Back to Library

Backdoors, Ransomware, Extortion: 2022 Cyber Threat Trends

Key Points

  • Back doors topped X‑Force’s 2022 incident actions, accounting for 21 % of cases, and are increasingly used as the foothold for ransomware attacks, which remain the second‑most common threat (17 %).
  • Thread‑hijacking attacks—where attackers compromise email accounts and impersonate victims in ongoing conversations—doubled in frequency compared with 2021, enabling broader credential and data theft.
  • Extortion impacted over a quarter of all attacks in 2022, with manufacturing being the most targeted sector (30 % of incidents), highlighting the rise of victim‑pressure schemes that exploit customers and partners as pawns.
  • Although the total number of disclosed vulnerabilities hit a record high, weaponised exploits dropped by more than 9 % from 2018‑2022, yet threat actors still leverage the ~78 000 known exploits, often using old (3‑5‑year) ones, underscoring the need for strong passwords, MFA, and proactive cyber‑range simulations.

Full Transcript

# Backdoors, Ransomware, Extortion: 2022 Cyber Threat Trends **Source:** [https://www.youtube.com/watch?v=PsT2joRNvpI](https://www.youtube.com/watch?v=PsT2joRNvpI) **Duration:** 00:04:31 ## Summary - Back doors topped X‑Force’s 2022 incident actions, accounting for 21 % of cases, and are increasingly used as the foothold for ransomware attacks, which remain the second‑most common threat (17 %). - Thread‑hijacking attacks—where attackers compromise email accounts and impersonate victims in ongoing conversations—doubled in frequency compared with 2021, enabling broader credential and data theft. - Extortion impacted over a quarter of all attacks in 2022, with manufacturing being the most targeted sector (30 % of incidents), highlighting the rise of victim‑pressure schemes that exploit customers and partners as pawns. - Although the total number of disclosed vulnerabilities hit a record high, weaponised exploits dropped by more than 9 % from 2018‑2022, yet threat actors still leverage the ~78 000 known exploits, often using old (3‑5‑year) ones, underscoring the need for strong passwords, MFA, and proactive cyber‑range simulations. ## Sections - [00:00:00](https://www.youtube.com/watch?v=PsT2joRNvpI&t=0s) **Backdoors Driving Ransomware Threats** - The segment highlights how back‑door malware, now accounting for 21 % of incidents, is the primary vector enabling ransomware attacks, while thread‑hijacking email catfishing and extortion emerge as rapidly growing tactics in the 2022 X‑Force threat intelligence index. ## Full Transcript
0:00what do back doors ransomware catfishing 0:03extortion and exploitation have in 0:05common they are some of the top trends 0:07we identified in this year's X-Force 0:09threat intelligence index 0:13attackers followed the money and right 0:15now persistent access to corporate 0:17environments go for a lot of money on 0:19the dark web making back doors a 0:21profitable commodity for attackers 0:23representing 21 percent of cases back 0:26doors which are malware offering 0:28attackers remote access to compromise 0:30systems were the most common action 0:33observed in incidents in 2022 knocking 0:36out ransomware which held the top spot 0:38since 2020. attackers often use back 0:41doors or persistent access to execute 0:44ransomware attacks 0:45unless more businesses put their 0:47defenses on the offense today's backdoor 0:50problem will turn into tomorrow's 0:52ransomware crisis 0:57representing 17 percent of attacks 1:00worldwide ransomware was the second most 1:02common action observed in 2022 an exor 1:05study revealed that while there's been a 1:07slight decline in the prevalence of 1:09ransomware a taxed up 94 percent less 1:12time over the last few years 1:16thread hijacking attempts doubled 1:19compared to 2021. threat hijacking 1:22another form of catfishing is when an 1:24attacker compromises a victim's email 1:26account and replies to a recent email 1:29thread impersonating the victim by 1:32hijacking an email thread adversaries 1:34can trick a target's friends family even 1:38co-workers into providing access to 1:40sensitive information data or systems 1:43creating a chain reaction with multiple 1:45victims 1:49extortion is a battle tested technique 1:52that exerts pressure levers to inflict 1:55maximum pain on a victim organization 1:58and the latest scheme is involving 2:00customers and business partners as pawns 2:02extortion was the top impact observed in 2:052022 more than one quarter of attacks 2:08involved some form of extortion 2:11for the second year in a row 2:12manufacturing was the most extorted 2:14industry extortion accounted for 30 2:17percent of incidents in manufacturing 2:19and 27 percent in all Industries 2:27even as the number of vulnerabilities 2:29disclosed hit another record high the 2:32proportion of weaponized exploits to 2:34reported vulnerabilities has been 2:36trending down 2:37from 2018 to 2022 exploits relative to 2:41vulnerabilities dropped by more than 2:42nine percent 2:44attackers have access to nearly 78 000 2:48known exploits making it easier to use 2:50an existing exploit left unpatched 2:54rather than investing time and resources 2:57into developing a new one 2:59in 2022 X-Force observed several 3:02incidents resulting from three to five 3:04year old exploits so what can you do 3:12use adversary simulation to understand 3:14an attacker's view of both known and 3:17unknown risks this can help 3:19organizations take preventative measures 3:21before an incident happens 3:28take steps to protect yourself from 3:30thread hijacking such as using strong 3:32and unique passwords and enabling 3:36multi-factor Authentication 3:45for organizations that have a low 3:47threshold for downtime they need to have 3:49a proactive cyber security strategy 3:51including active threat assessment 3:53playbooks and other cyber range 3:56activities 3:57and remember 3:58to operate under the assumption of 4:11an assumed breach 4:13assume an attacker already has access to 4:15your environment and is moving around 4:17be proactive not reactive 4:20stop focusing on the perimeter start 4:22focusing on detection and response 4:25prioritize your security 4:28and when