Best of E52 - 450,000 Hours on the Front Lines

Posted on April 29, 2025 • 7 min read • 1,458 words
Share via
Mandiant M-Trends 2025: 450K+ hours of incident response. Exploits lead at 33%, stolen credentials surpass phishing, North Korean IT workers at 5% of attack vectors, and dwell time drops to 11 days — but not because defenders are faster.
Best of E52 - 450,000 Hours on the Front Lines

Originally published April 29, 2025

What You Need to Know  

Mandiant’s M-Trends 2025 report distills findings from over 450,000 hours of incident response engagements conducted globally. If the Verizon DBIR is the census of the breach landscape, M-Trends is the field report — written by the teams who show up after the breach and work the cases.

This year’s findings reveal a threat landscape where exploits dominate initial access at 33%, stolen credentials have surpassed phishing as an entry vector, and North Korean operatives are literally getting hired by the companies they’re targeting. Dwell time has dropped to 11 days — but that’s not because defenders are faster. It’s because attackers are moving to extortion, which announces itself.

These are the trends executives can’t afford to ignore.


How Attackers Get In: The Initial Access Breakdown  

M-Trends maps exactly how adversaries breach organizations, and the 2025 data shows a clear hierarchy:

VectorShareTrend
Exploits33%Still #1 — unpatched vulnerabilities remain the top door
Stolen credentials16%Surpassed phishing — infostealers are fueling this
Phishing14%Now #3 — includes Adversary-in-the-Middle (AiTM) variants
North Korean IT workers5%Fraudulent employees gaining insider access
Brute forceSignificantDriving ransomware intrusions specifically

The stolen credentials finding is the one to watch. At 16%, credential theft has overtaken phishing (14%) as the second most common initial access vector. This reflects the explosion of infostealer malware — tools like LummaC2 and Raccoon that harvest credentials at scale from compromised endpoints and sell them on dark web marketplaces.

Phishing hasn’t gone away — it’s evolved. Adversary-in-the-Middle (AiTM) attacks now intercept MFA tokens in real time, turning what organizations thought was their strongest defense into a bypassed control.

INTEL [GLOBAL THREAT]: Stolen credentials surpassing phishing as an initial access vector signals a structural shift. Attackers increasingly buy access rather than earn it through social engineering. Organizations should monitor dark web credential markets, deploy endpoint detection for infostealer families, and assume that username/password combinations alone — even with basic MFA — are insufficient.


The North Korean Insider Problem  

Five percent of attack vectors now involve North Korean IT workers who get hired as legitimate employees at target organizations. This isn’t espionage through hacking — it’s espionage through HR.

These operatives use fraudulent identities, pass technical interviews, and secure remote employment at Western companies. Once inside, they have legitimate credentials, VPN access, and the trust of their teams. They’re not breaking in. They’re being invited in.

The scheme serves dual purposes: generating revenue for the DPRK regime and providing persistent insider access to corporate networks and intellectual property. It’s social engineering at the organizational level — not targeting an employee, but becoming one.

INTEL [TECHNIQUE]: North Korean fraudulent employment operations represent a novel insider threat that bypasses traditional perimeter defenses entirely. Organizations should strengthen identity verification in hiring processes, validate employment history through independent channels, and implement behavioral analytics for remote employees with access to sensitive systems.


The Dwell Time Paradox  

The headline metric looks good: median global dwell time has dropped to 11 days. Faster detection, right?

Not exactly. The drop is driven largely by the rise of ransomware and extortion — attacks that announce themselves. When an attacker encrypts your systems and drops a ransom note, dwell time drops to near-zero by design. 14% of breaches are now discovered because the attacker tells you via ransom notification.

The real detection story is in the split:

Detection MethodShare
External notification57% — someone else tells you
Ransom/extortion notice14% — the attacker tells you
Internal detection29% — you find it yourself

When 57% of breaches are detected externally — by law enforcement, partners, or third parties — it means most organizations still aren’t finding intrusions on their own. The 11-day median is an output metric, not a capability metric.

INTEL [INDUSTRY PATTERN]: The 11-day median dwell time masks a detection gap: 57% of breaches are found externally and 14% by the attackers themselves. Only 29% are detected internally. Organizations citing improved dwell time as evidence of security maturity should examine whether the improvement reflects actual detection capability or simply faster attacker monetization.


Ransomware and the Extortion Evolution  

Ransomware appeared in 21% of all M-Trends investigations, with brute-force attacks serving as a primary entry point. But the data reveals a more nuanced picture:

  • Data theft occurred in 37% of investigations — nearly double the ransomware rate
  • Multifaceted extortion (data theft + encryption combined) appeared in 6% of cases
  • Attackers are increasingly stealing data without deploying ransomware at all

This is the extortion evolution: why encrypt systems (which is noisy, detectable, and often recoverable from backups) when you can quietly steal data and threaten to publish it? The economics favor theft over encryption — lower operational risk, fewer detection triggers, and victims can’t recover stolen data the way they can restore encrypted files.


Living Off the Land: Your Tools Are Their Tools  

Mandiant continues to document extensive use of “living off the land” techniques — attackers using legitimate tools already present in the environment. PowerShell, WMI, RDP, PsExec, and native OS utilities serve as both administrative tools and attack infrastructure.

This is why M-Trends data shows such a gap between internal and external detection. Traditional security tools are built to flag known malicious software. When the attacker uses the same tools your IT team uses daily, the signal disappears into the noise.

FIR Risk Platform MITRE ATT&CK Analysis:

  • Initial Access: T1190 (Exploit Public-Facing Application) — 33% of intrusions
  • Initial Access: T1078 (Valid Accounts) — stolen credentials at 16%
  • Initial Access: T1566 (Phishing) — including AiTM variants
  • Execution: T1059 (Command and Scripting Interpreter) — living off the land
  • Lateral Movement: T1021 (Remote Services) — RDP, PsExec abuse
  • Impact: T1486 (Data Encrypted for Impact) — ransomware at 21%
  • Exfiltration: T1041 (Exfiltration Over C2 Channel) — data theft at 37%

Cloud and SaaS: The Expanding Attack Surface  

M-Trends highlights cloud environments and SaaS platforms as increasingly targeted — and often poorly defended. Weak credentials, misconfigured identity providers, and overprivileged service accounts give attackers lateral movement paths that don’t touch traditional network monitoring.

Unsecured data repositories — SharePoint, GitHub, cloud storage buckets — continue to be low-hanging fruit. When organizations migrate to the cloud without migrating their security posture, they’re not modernizing — they’re expanding the attack surface.


What Organizations Should Actually Do  

The M-Trends data points to five priorities:

  1. Patch what matters, fast — Exploits lead at 33%. Prioritize edge devices, VPNs, and internet-facing infrastructure. The window between disclosure and exploitation is shrinking.

  2. Treat credentials as a primary attack vector — Stolen credentials at 16% means infostealer defense is now as important as phishing defense. Deploy endpoint detection for credential harvesting tools, monitor dark web marketplaces, and implement phishing-resistant MFA (FIDO2/WebAuthn).

  3. Verify your people — North Korean IT worker infiltration at 5% means hiring processes are now a security control. Strengthen identity verification, validate employment history independently, and monitor remote worker behavior.

  4. Build detection that finds attackers, not just malware — With 57% external detection and pervasive living-off-the-land, organizations need behavioral analytics and threat hunting capabilities that identify anomalous use of legitimate tools.

  5. Prepare for data theft without encryption — 37% of investigations involved data theft. Ransomware-only response plans are incomplete. Build capabilities to detect exfiltration, not just encryption.


What We’re Watching  

Infostealer-to-access pipeline. Stolen credentials surpassing phishing suggests a maturing supply chain: infostealers harvest, markets sell, operators breach. The initial access broker economy is industrializing.

DPRK employment operations. 5% today — but this vector is scalable, low-cost, and nearly invisible to traditional security controls. Expect growth.

Extortion without encryption. Data theft at nearly 2x the ransomware rate signals where the business model is heading. Quieter, harder to detect, impossible to recover from with backups alone.

AiTM phishing. Real-time MFA bypass changes the calculus on authentication. Phishing-resistant MFA isn’t a nice-to-have — it’s the only MFA that still works against sophisticated adversaries.


The Bottom Line  

Mandiant’s 450,000 hours of incident response work paint a clear picture: attackers are getting in through unpatched systems, stolen credentials, and — increasingly — the front door of your HR department. Once inside, they use your own tools against you, and most organizations still can’t detect them without outside help.

The 11-day dwell time sounds like progress. Look closer, and it’s attackers moving faster to monetize — not defenders moving faster to detect.

The organizations that will weather this landscape are the ones treating credential theft like the primary threat vector it’s become, investing in detection that goes beyond signature matching, and recognizing that the insider threat now includes people who were never really employees at all.


Find all editions: FIR Risk Tuesday

All newsletters and source materials: FIR Risk Intelligence on GitHub