Threat IntelHIGH

Routine Access - New Threat Report Reveals Intrusion Tactics

Featured image for Routine Access - New Threat Report Reveals Intrusion Tactics
BCBleepingComputer
Blackpoint CyberSSL VPNsocial engineeringRMM toolsRoadk1ll
🎯

Basically, hackers are using regular access methods instead of breaking in through vulnerabilities.

Quick Summary

A new report reveals that modern intrusions increasingly rely on valid credentials and routine access. This shift poses significant risks across various industries. Organizations must adapt their security measures to counter these evolving tactics.

What Happened

According to Blackpoint Cyber’s 2026 Annual Threat Report, a significant shift in how cyber intrusions occur has been identified. Instead of exploiting software vulnerabilities, attackers are increasingly using valid credentials and legitimate tools to gain access to systems. This report, based on thousands of security investigations, reveals that routine user actions have become a primary entry point for many intrusions.

The analysis indicates that SSL VPN abuse is the most common method for attackers, accounting for 32.8% of incidents. This means that many breaches are happening through seemingly legitimate means, making them harder to detect. Attackers can log in using compromised credentials, allowing them to navigate internal networks without raising immediate alarms.

Who's Being Targeted

The report highlights that various industries, including manufacturing, healthcare, financial services, and construction, are being affected by these intrusion tactics. The use of Remote Monitoring and Management (RMM) tools has also been noted, with 30.3% of incidents involving their abuse. Tools like ScreenConnect were found in over 70% of rogue RMM cases, making it difficult for organizations to distinguish between legitimate and malicious use.

Social engineering tactics are also prevalent, with deceptive campaigns driving 57.5% of incidents. These tactics often involve users being tricked into executing commands that appear harmless, further complicating detection efforts.

Tactics & Techniques

Attackers are increasingly leveraging social engineering techniques rather than sophisticated exploits. The report indicates that many incidents begin with users being prompted to perform actions that seem routine, such as entering commands into their systems. This method allows attackers to execute their plans without traditional malware downloads or exploits.

In cloud environments, attackers are capturing authenticated session tokens post-Multi-Factor Authentication (MFA) to gain access. This highlights a critical gap where even robust security measures like MFA can be circumvented if session tokens are reused. The report emphasizes that understanding these tactics is crucial for organizations to defend against such intrusions effectively.

Defensive Measures

The findings of the report suggest that organizations need to reassess their security strategies. Remote access should be treated as high-risk activity, and organizations must maintain an inventory of approved RMM tools. It is also essential to restrict unapproved software installations and apply Conditional Access controls that evaluate device posture and session risk.

By recognizing the patterns of these intrusions, security teams can implement more effective defenses. The report serves as a wake-up call, urging organizations to adapt to the evolving landscape of cyber threats where attackers are using everyday access methods to infiltrate systems.

🔒 Pro insight: The reliance on legitimate access methods indicates a need for enhanced visibility and monitoring of user activities in organizations.

Original article from

BCBleepingComputer· Sponsored by Blackpoint Cyber
Read Full Article

Related Pings

HIGHThreat Intel

TeamPCP Supply Chain Campaign - First Victim Confirmed

The TeamPCP supply chain campaign has confirmed its first victim. Recent updates reveal critical developments and narrowed attribution to Axios. Organizations must stay alert to protect against these sophisticated threats.

SANS ISC·
HIGHThreat Intel

Cyber Brief - Key Cybersecurity Developments in March 2026

March 2026 was a pivotal month in cybersecurity. Significant sanctions were imposed on Iranian and Chinese entities, while cybercrime incidents surged. The landscape is shifting, highlighting the need for robust defenses.

CERT-EU Threat Intelligence·
HIGHThreat Intel

Chinese Hackers Target European Governments in Espionage

Chinese hackers from TA416 are ramping up cyber espionage against European governments. This resurgence threatens national security and diplomatic relations. Organizations must enhance their defenses to counter these sophisticated attacks.

Infosecurity Magazine·
HIGHThreat Intel

Romania Faces Daily Cyberattacks - Defense Minister Reports

Romania is facing a staggering number of cyberattacks daily, threatening public institutions and national security. With links to Russian hackers, these attacks are systematic and sophisticated. Romanian officials are ramping up defenses to combat this ongoing threat.

The Record·
HIGHThreat Intel

Attackers Exploit Trusted Tools - 3 Reasons You Should Care

Attackers are now using trusted tools against organizations, complicating detection and response efforts. This trend poses a significant risk to security teams. Understanding this shift is crucial for improving defenses.

The Hacker News·
HIGHThreat Intel

UK Manufacturers - 80% Report Cyber Attacks in Past Year, Financial Losses Common

A recent study reveals that 80% of UK manufacturers faced cyber incidents in the past year, leading to significant financial losses and operational disruptions. The findings underscore the need for enhanced cybersecurity strategies at the executive level.

The Register Security·