Introducing the Cybereason TTP Briefing: Frontline Threat Intelligence Insights

![](https://www.cybereason.com/hubfs/Consulting/TTP%20Briefing/Jan%20-%20May%202025/BLOG_Images_Template_v2%20%2821%29.png)Introducing the Cybereason TTP Briefing: Frontline Threat Intelligence Insights===============================================================================Written ByCybereason Consulting Team Gain insight into the latest attack trends, techniques, and procedures our [Incident Response experts](/consulting/incident-response-retainer) are actively facing with the brand new TTP Briefing, a report built on frontline threat intelligence from our global incident response (IR) investigations, enriched by noteworthy detections from our SOC.
![Download the full report](https://no-cache.hubspot.com/cta/default/3354902/interactive-191894810716.png)
The TTP Briefing is grounded in real-world investigations led by Cybereason’s IR and SOC teams across industries and geographies. The findings highlight thorny challenges organizations face, even with baseline protections like EDR and MFA, revealing where attackers are finding success – and where defenders need to focus to harden against, respond to, and recover from today’s most pressing threats.This first edition of our TTP Briefing covers intel gathered from January through May. Let’s explore a few key findings:Most Common Threat Types
![TTP Briefing Jan-May – Incident Type1](https://www.cybereason.com/hs-fs/hubfs/Consulting/TTP%20Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20Incident%20Type1.png?width=846&height=489&name=TTP%20Briefing%20Jan-May%20-%20Incident%20Type1.png)* [Business Email Compromise](/blog/bec-security-configuration-snapshot) (BEC) was the most common incident type, accounting for 41% of observed threats.* Ransomware followed closely at 28%, with variants like [Qilin](/blog/threat-alert-qilin-seizes-control), Medusa, and Play showing increased activity.* Cloud intrusions made up 13% of incidentsInitial Intrusion Vector (How Are They Getting In?)![TTP Briefing Jan-May – IIV](https://www.cybereason.com/hs-fs/hubfs/Consulting/TTP%20Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20IIV.png?width=846&height=491&name=TTP%20Briefing%20Jan-May%20-%20IIV.png)Unsurprisingly, phishing and social engineering remain the dominant intrusion vector (46%), followed by credential abuse and exploited vulnerabilities.In our report, we’ve combined the various email- and sms-based phishing tactics along with social engineering tactics that may involve stolen credentials and repeated helpdesk calls to trick agents into resetting or temporarily deactivating MFA.MFA Coverage Still Lacking -& MFA Bypass is Widespread![TTP Briefing Jan-May – MFA](https://www.cybereason.com/hs-fs/hubfs/Consulting/TTP%20Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20MFA%20.png?width=693&height=447&name=TTP%20Briefing%20Jan-May%20-%20MFA%20.png)Only 36% of BEC victims had MFA in place at the time of the account compromise, which is a big concern in itself, but among those that had MFA in place, attackers were able to bypass MFA protection in over half of cases.Most Targeted Industries -& Company Sizes![TTP Briefing Jan-May – sectors](https://www.cybereason.com/hs-fs/hubfs/Consulting/TTP%20Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20sectors%20.png?width=846&height=536&name=TTP%20Briefing%20Jan-May%20-%20sectors%20.png)Across all industries, organizations with revenue between $11M and $100M were the most frequently impacted, underscoring the pressure on mid-sized companies to mature their defenses without enterprise-sized resources.Tactics Across the Intrusion Path![Intrusion Path](https://www.cybereason.com/hs-fs/hubfs/Consulting/TTP%20Briefing/Jan%20-%20May%202025/Intrusion%20Path.png?width=2698&height=1232&name=Intrusion%20Path.png)The TTP Briefing provides data across the five stages of the intrusion path, from initial intrusion to persistence and escalation techniques, to exfiltration and monetization tactics. Noteworthy findings include:* Remote access tools like AnyDesk, MeshAgent, and ScreenConnect were common in establishing persistence.* Escalation often leveraged Mimikatz and LSASS dump techniques.* Data exfiltration was achieved primarily using utilities like RClone and WinSCP.* For nearly 1 in 5 cases (18%), attackers leveraged living-off-the-land binaries (LOLBins) to avoid detection, move laterally, and deploy software including remote access tools and malware.
A Look Into Dwell Time![TTP Briefing Jan-May – DwellTime](https://www.cybereason.com/hs-fs/hubfs/Consulting/TTP%20Briefing/Jan%20-%20May%202025/TTP%20Briefing%20Jan-May%20-%20DwellTime.png?width=656&height=458&name=TTP%20Briefing%20Jan-May%20-%20DwellTime.png)In the TTP Briefing, we excluded any MDR clients and measured dwell time as the initial date of the compromise until our IR team was engaged. We saw dwell time longer than 31 days in 45% of cases, which is very far from ideal.Often, delays weren’t just due to detection gaps, but also lack of a proper[incident response plan](/consulting/incident-response-plans-tabletop-exercises) and needing to find and onboard vendors to run the investigation. We strongly encourage security and risk leaders to build a [Resilience Retainer](/consulting/incident-response-retainer) that matches their needs and can provide a path toward increased preparedness and effective response ahead of a new incident.![Download the full report](https://no-cache.hubspot.com/cta/default/3354902/interactive-191894810716.png)
If you would like more information about this report, our team is available 24×7 at [response@cybereason.com](mailto:response@cybereason.com) Share ![Share on twitter](https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/twitter-gray.svg) ![Share on facebook](https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/facebook-gray.svg) ![Share on linkedin](https://www.cybereason.com/hubfs/dam/images/images-web/blog-images/template-images/linkedin-gray.svg) About the Author#### Cybereason Consulting Team### Related Posts![Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies](https://www.cybereason.com/hubfs/blog-post-text%20%28126%29.png)#### [Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies](https://www.cybereason.com/blog/webinar-thursday-september-8th-2022-ransomware-impact-on-incident-response-strategies)Over the last five years ransomware operations evolved both in capabilities and the degree of organizational structure behind it. In this webinar, we’ll cover the changes, what they mean and how cybersecurity strategies need to adapt to match this changing threat. But most importantly, have we learned from our past mistakes? ![Webinar August 4th 2022: Ransomware Impact on Incident Response Strategies](https://www.cybereason.com/hubfs/blog-post-text%20%28122%29.png)#### [Webinar August 4th 2022: Ransomware Impact on Incident Response Strategies](https://www.cybereason.com/blog/webinar-july-28th-2022-ransomware-impact-on-incident-response-strategies)Over the last five years ransomware operations evolved both in capabilities and the degree of organizational structure behind it. In this webinar, we’ll cover the changes, what they mean and how cybersecurity strategies need to adapt to match this changing threat. But most importantly, have we learned from our past mistakes? [#### SubscribeNever miss a blog.](#blog-subscribe) #### Recent Posts[Introducing the Cybereason TTP Briefing: Frontline Threat Intelligence Insights](https://www.cybereason.com/blog/ttp-briefing-jan-may-2025) [Ransomware Gangs Collapse as Qilin Seizes Control](https://www.cybereason.com/blog/threat-alert-qilin-seizes-control) [Copyright Phishing Lures Leading to Rhadamanthys Stealer Now Targeting Europe](https://www.cybereason.com/blog/rhadamanthys-stealer-europe) #### Categories* [Research](https://www.cybereason.com/blog/category/research)* [Podcasts](https://www.cybereason.com/blog/category/podcasts)* [Webinars](https://www.cybereason.com/blog/category/webinars)* [Resources](https://www.cybereason.com/blog/category/resources)* [Videos](https://www.cybereason.com/blog/category/videos)* [News](https://www.cybereason.com/blog/category/news)[All Posts](/blog/category/research) ### Related Posts![Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies](https://www.cybereason.com/hubfs/blog-post-text%20%28126%29.png)#### [Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies](https://www.cybereason.com/blog/webinar-thursday-september-8th-2022-ransomware-impact-on-incident-response-strategies)Over the last five years ransomware operations evolved both in capabilities and the degree of organizational structure behind it. In this webinar, we’ll cover the changes, what they mean and how cybersecurity strategies need to adapt to match this changing threat. But most importantly, have we learned from our past mistakes? ![Webinar August 4th 2022: Ransomware Impact on Incident Response Strategies](https://www.cybereason.com/hubfs/blog-post-text%20%28122%29.png)#### [Webinar August 4th 2022: Ransomware Impact on Incident Response Strategies](https://www.cybereason.com/blog/webinar-july-28th-2022-ransomware-impact-on-incident-response-strategies)Over the last five years ransomware operations evolved both in capabilities and the degree of organizational structure behind it. In this webinar, we’ll cover the changes, what they mean and how cybersecurity strategies need to adapt to match this changing threat. But most importantly, have we learned from our past mistakes? NEWSLETTER### Never miss a blogGet the latest research, expert insights, and security industry news.[Subscribe](#blog-subscribe) Want to see the Cybereason Defense Platform in action? [Schedule a Demo](https://www.cybereason.com/request-a-demo) X

Related Tags:
Play

NAICS: 524 – Insurance Carriers And Related Activities

NAICS: 56 – Administrative And Support And Waste Management And Remediation Services

NAICS: 54 – Professional

Scientific

Technical Services

NAICS: 561 – Administrative And Support Services

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 52 – Finance And Insurance

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 522 – Credit Intermediation And Related Activities

Associated Indicators: