Learning Library

← Back to Library

Ransomware and Phishing Rates Decline, Threat Landscape Shifts

Key Points

  • The IBM X‑Force Threat Intelligence Index highlights how insight into hacker activity—gleaned from dark‑web chatter and real‑world incidents—helps organizations build stronger defenses.
  • Ransomware activity has declined for the third consecutive year, with ransom payments falling 35%, thanks in part to law‑enforcement takedowns of high‑profile ransomware groups.
  • Attackers are shifting tactics from pure encryption‑for‑payment attacks to data‑theft and extortion schemes, threatening public disclosure or personal use of stolen information.
  • Phishing attempts dropped by 50%, offering a temporary reprieve, but the report cautions that the underlying risk of data breaches remains and warrants continued vigilance.
  • Persistent, sophisticated malware infections decreased as investments in security tools—particularly endpoint detection and response (EDR) solutions—enhanced advanced detection and mitigation capabilities.

Full Transcript

# Ransomware and Phishing Rates Decline, Threat Landscape Shifts **Source:** [https://www.youtube.com/watch?v=iGE7b_XQqtY](https://www.youtube.com/watch?v=iGE7b_XQqtY) **Duration:** 00:12:54 ## Summary - The IBM X‑Force Threat Intelligence Index highlights how insight into hacker activity—gleaned from dark‑web chatter and real‑world incidents—helps organizations build stronger defenses. - Ransomware activity has declined for the third consecutive year, with ransom payments falling 35%, thanks in part to law‑enforcement takedowns of high‑profile ransomware groups. - Attackers are shifting tactics from pure encryption‑for‑payment attacks to data‑theft and extortion schemes, threatening public disclosure or personal use of stolen information. - Phishing attempts dropped by 50%, offering a temporary reprieve, but the report cautions that the underlying risk of data breaches remains and warrants continued vigilance. - Persistent, sophisticated malware infections decreased as investments in security tools—particularly endpoint detection and response (EDR) solutions—enhanced advanced detection and mitigation capabilities. ## Sections - [00:00:00](https://www.youtube.com/watch?v=iGE7b_XQqtY&t=0s) **IBM X-Force Threat Report Overview** - A concise walkthrough of IBM’s annual threat intelligence findings, highlighting the recent decline in ransomware payments, law‑enforcement successes, evolving attacker tactics, and a bonus dark‑web insight. - [00:03:07](https://www.youtube.com/watch?v=iGE7b_XQqtY&t=187s) **Credential Theft and Rising Infostealers** - The speaker notes that compromised credentials remain the primary entry point for attacks, phishing overall is down but infostealer usage has surged 84%, and dark‑web discussions reveal that the top disclosed vulnerabilities are being widely shared. - [00:06:14](https://www.youtube.com/watch?v=iGE7b_XQqtY&t=374s) **AI Production Surge Fuels New Threats** - As AI moves from proof‑of‑concept to full production, a rapidly expanding attack surface is leading to high‑profile data breaches and ransomware‑as‑a‑service incidents, underscoring the urgent need for robust AI security. - [00:09:17](https://www.youtube.com/watch?v=iGE7b_XQqtY&t=557s) **Mitigating Sprawl with Centralized Security** - The speaker urges replacing passwords with passkeys and using automated discovery, centralized identity, and secrets management to curb data and identity sprawl—including shadow AI—thereby shrinking the attack surface before AI‑driven threats become prevalent. - [00:12:23](https://www.youtube.com/watch?v=iGE7b_XQqtY&t=743s) **Managing Risk of Core Infrastructure Tools** - The speaker warns that essential networking and security tools pose significant threats, urging listeners to monitor advisories and keep software patched as outlined in the IBM X‑Force Threat Intelligence Index. ## Full Transcript
0:00Information is power. 0:01The more you know, the more you can do. 0:03And that is especially true in the world of cybersecurity. 0:06The more, you know about what hackers are doing, the better job you can in building defenses. 0:11That's why the annual IBM X-Force Threat Intelligence Index Report is so important. 0:16In this report, IBM security researchers published their findings 0:20based upon what they've seen on the dark web 0:23in hacker discussions, as well as in real world incident response scenarios. 0:28In this video, we're gonna take a look at the findings, the good, the bad, and the ugly. 0:34Oh, and also some recommendations as to what you can do to defend yourself against some of the most common attacks. 0:40And stick around to the end for a bonus finding regarding what we learned on the dark web. 0:46Okay, let's start with the good news. 0:48Well, turns out ransomware was actually down. 0:51For the third year in a row, it's been down. 0:54And in fact, payments for ransomware situations are down 35%. 1:00It's a lot of good news. 1:02And also in this good news, part of the reason that these payments 1:05have gone down 1:06and the reason ransomware maybe is not quite as prevalent, law enforcement has been helping us a lot here. 1:12In fact, they've broken up a couple of very high profile ransomware rings and that's showing its effect here as well. 1:18But we're seeing the ransomware attackers change their approach and their tactics and their goals. 1:24So for instance, in the past, they were predominantly looking to encrypt your data and then charge you to get it back. 1:31Now they're looking just to steal the data 1:33and maybe extort you and say, I'm going to publicize this to the world if you don't pay me. 1:37Or they just use the data themselves. 1:40So there's a lot of different things that can be happening here. 1:43It's not all good news, but there's definitely some improvement. 1:46How about another piece of good news? 1:49Phishing attacks. 1:49actually down, 50%. 1:54Now that is good news because phishing has been one of the number one causes of data breaches. 1:59Doesn't mean data breaches are all gone. 2:01In fact, don't celebrate on this one yet. 2:03We're going to talk a little more about this when we get to the bad because there's a flip side to this one. 2:07But it's still good to see that at least there is some improvement in this space. 2:12And then one more bit of good news that I want to give you is that 2:15down were the number of persistent malware samples that were out there. 2:22The number of different cases where people were able to do this kind of really sophisticated malware 2:27that's very difficult to get rid of, we saw that go down. 2:31And why do we think this is a case? 2:33Well, it turns out some of your investments in terms of IT security, cybersecurity tools, it seems to be paying off. 2:40In fact, it looks like EDR, endpoint detection and response capabilities, were contributing to this. 2:47and a better ability to do advanced detection. 2:51of using cybersecurity tools. 2:53All of these contributed to causing persistent malware to have less of an effect on our environment. 2:59All right, let's take a look at the bad. 3:02Well, one of the things that was not good for us is that credential theft was up. 3:07In fact, it was the number one entry point, according to our research, 3:13and it was accounting for up to 30% of the ways that people were getting into systems. 3:19That's a big problem. 3:20It's easier to log in than it is to hack in, as you've heard me say on videos before. 3:25So if I can just steal your credentials, I can get in and I can be you and I could do all the things that you can do. 3:30It's a problem. 3:31We still need to address this. 3:33Related to this is the fact that even though I just told you that phishing attacks were down, 3:39well, it turns out of the types of attacks that are actually getting through, we're seeing an increase in a specific type, 3:46and those are the ones that deal with infostealers. 3:49In fact, we saw those up 84%. 3:53Now, what's an info stealer? 3:54Well, it's basically software that goes on your system and then it's trying to steal information about you. 3:59For instance, credentials. 4:00So we just talked about those. 4:02So it could steal your login, password. 4:05It could steal information about you as well that could later be used as part of an identity theft situation. 4:12We could steal credit card numbers, all those kinds of things. 4:15So information stealing. 4:17is of course what the bad guys are after, and we're seeing that continue to increase. 4:22One more set of bad things that we saw relates to the dark web. 4:27So in our research, when we went and looked at the dark web, 4:30we found that of the top ten vulnerabilities that were being discussed on the dark web, 4:35all of them had publicly available exploits. 4:39So that means these are not just theoretical threats. 4:42These are threats that are real and people are talking about them, the people that are able. 4:46and ready and willing to do something about it. 4:50Another thing we saw was, again, so much of this is about credentials. 4:54And in terms of credentials, we're seeing different types of services. 4:58Yeah, there's a service. 4:59There's a service called access as a service, 5:02where someone basically puts up a system that is able to be able to 5:07steal credentials or allow you to leverage other people's existing credentials. 5:13So access as a service is in fact a thing. 5:16And we're seeing more of this kind of stuff that relates to attacker in the middle. 5:22Attacker in the Middle is another way if I'm able to insert myself into the path 5:27between where you are and where you're trying to log into, 5:31then I may be able to intercept your credentials or other information about you. 5:36So this is something that's been around for a long time, but we're an increase in these types of activities. 5:42Now one other area that still is kind of to be determined, and that's artificial intelligence. 5:49What is this going to do for us or to us? 5:52Well, last year's report, we made an observation, and we're kind of repeating that observation again. 5:58And that is, when a technology hits a certain point in its adoption curve, 6:03that's when we expect to start seeing it really be exploited. 6:07So if you think about AI, well, an AI project, the way it may go would be like this. 6:12We've got different levels. 6:14we've got where we start off with a proof of concept, we might move into a pilot mode, then we go into production. 6:21Well it turns out if once a technology kind of hits this sort of fifty percent that's an inflection point. 6:30When AI projects start moving more and more into production, 6:33although right now I think we're seeing some in production but we're seeing a lot that are still down in this space, 6:39once we start seeing more and more projects go into production, 6:42we expect that we're gonna see more and attacks in this space. 6:46So we're seeing early signs of it already, and here's your warning, be on the lookout for this. 6:52Learn how to secure your AI environment because it's a new attack surface. 6:56And now for the ugly. 6:58In one instance, a popular AI chatbot exposed over one million sensitive records, including user chat histories and API keys. 7:08Look, the bottom line is if you don't provide your users with a better alternative that is secure, 7:12then they'll use one that isn't and you'll end up with results like this. 7:16We also learned that when it comes to ransomware as a service, 7:21yeah, that's a thing as well, ransomware as a service, 7:25there may be no honor among thieves. 7:28So for instance, we found in 2024, the largest breach of medical data in US history. 7:34It affected over a hundred million users. 7:38And it resulted in a ransom of $22 million being paid. 7:44Well, how did this thing work? 7:45Well, it turns out that we have what we call a ransomware as a service provider. 7:50So the provider creates this system and then an affiliate, 7:55someone who comes along and leverages the system and uses it in order to attack an organization. 8:01So that's what happened. 8:02And as I said, the 100 million user records were compromised. 8:07They paid the ransom, 22 million, they send it back. 8:11And you would think then the money would go to this individual who actually launched the attack. 8:17Nope, they got cut out of it. 8:19As the provider ended up cutting them out of the deal, 8:22pocketing the money themself, and now you end up with two losers in this situation. 8:28Okay, now we've taken a look at the good, the bad, and the ugly. 8:33What are you supposed to do about this? 8:35Well, I'm gonna give you three main areas of recommendations that you can 8:39do to make yourself less likely to be a victim of these situations. 8:44So the first one we're gonna talk about, look, I mentioned over here a lot about credentials. 8:50The bad guys are coming for your credentials. 8:52So what should you be doing to safeguard those? 8:55Well, there's a lot of things in fact you can do. 8:58Multi-factor authentication is one where you use something 9:01you have something you know, something you are, you combine all of those together, 9:06but let me tell you, what's even better than having a password that is strong is not having a password at all. 9:13Use a passkey. 9:14I've talked about this in other videos, so you can go take a look at that. 9:17But passkeys are a stronger alternative that are much more difficult to be phished and stolen. 9:22So if we just remove that from the attack surface, we're already a lot better situation. 9:27Another area that we need to address is the sprawl. 9:31sprawl of data and identities. 9:34So we've got data that is proliferating across our environment. 9:38It's really easy to copy stuff, spin up a new cloud instance and put some 9:43sensitive data in there because you're wanting to do some testing against it. 9:47Same thing with AI. 9:48And we can end up with shadow AI implementations 9:51that we're not aware of that have now exposed us to some additional threats. 9:56So be able to discover, automatically have tools that can go out and find 10:01data in your environment, AI as it's deployed in your environment. 10:05And when it comes to identities, those can also get sprawled a lot of different places. 10:11So we need to be able to centralize the management of those. 10:15We need a secrets management system where we can store all the sensitive information, 10:20the passwords, the API keys, and the things of that sort, digital certificates, all of those kinds of things. 10:25Do those things in a much more manageable way. 10:28and it will be much more difficult for bad guys to take advantage. 10:31And then as I mentioned, AI is coming. 10:34I'm sure you're aware of that. 10:35What are we supposed to do to be prepared for that? 10:37I put that in one of the things where we haven't seen so many attacks there yet, 10:42so that means there's still time for us to avoid it. 10:46So what should you be doing? 10:47Think about AI as a development pipeline. 10:50In fact, what we do is we have data that then is used to train a model, 10:56and then that model is what we go against and do inferences. 11:00So we have data, we have model, and we have usage. 11:04We need to secure the data, we need to the secure the model, we need secure the usage. 11:09I've got to secure every one of those things and take a look at what are the 11:12attacks like in each one of these, because AI is a new attack surface. 11:17So if I look at this whole thing, the other thing I conclude from this is that it runs on an IT infrastructure. 11:24So I have to secure. 11:26this basic IT infrastructure. 11:28This is IT security 101, the stuff we've always done. 11:31We have to keep doing that, but now we have to secure the data that 11:34goes into training AI, the models themselves, and the usage of those things also, 11:39and maybe even look at governance over the whole system as well. 11:43Do all of those and you'll be in a better situation to deal with these attacks. 11:48Now, let's take a look at what we learned on the dark web with our bonus topic. 11:54X-Force monitors the dark web for attacker discussions. 11:57And what they found was that the top three vulnerabilities discussed made up half of the mentions of the top 10. 12:04So let's drill in on those three. 12:06And what did those three elements have in common? 12:09Well, they were all purpose-built proprietary operating systems for next-gen firewalls, 12:15and they allowed for a remote attack to execute arbitrary code on these systems. 12:20That means a bad guy across the world. 12:23can control your infrastructure. 12:26The reason that's scary is these tools make up the core networking and security infrastructure 12:30for most environments, so the risk is substantial. 12:34What should you do about these? 12:35Well, first of all, monitor security advisories. 12:39Secondly, keep software levels up to date. 12:42So, in the end, that's a quick summary of the IBM X-Force Threat Intelligence Index report, 12:47the good, the bad, and the ugly, and what you can do about it, because information is power, 12:53and now, you have the power.