Intel 471 presents the 471 Cyber ​​Threat Report


The data-driven report analyzes emerging cyber threats and trends that will dominate through 2023

Wilmington, Del., August 4, 2022 /PRNewswire/ — Intel 471the leading provider of cyber threat intelligence to leading intelligence, security and fraud teams around the world, was released today The 471 Cyber ​​Threat Report; 2022-2023 Trends & Predictions. This study analyzes current and commonly used Tactics, Techniques, and Procedures (TTPs) adopted by prominent threat actors, how these threats have impacted organizations, and predictive intelligence assessments of threats organizations should be prepared to counter over the next year.

3 key steps to protecting your business from cyber underground threats

The report describes the most impactful threats that have fueled the cybercrime ecosystem over the past year and the TTPs employed by the actors behind them. It provides recommended steps organizations should take to protect against existing and emerging threats on the horizon.

“It is important to not only draw attention to the TTPs commonly used by the most capable threat actors, but also to provide a rich context for how these TTPs can impact organizations at each stage of the cyberattack chain and how they can be leveraged by tactical defenders and high-level decision makers,” said Intel 471 Chief Intelligence Officer, Michael DeBolt. “Findings from our latest research will help organizations get the attacker, credential, malware and vulnerability information they need to refine their cyber defense strategy, adapt their security practices and prepare for 2023.”

Other key findings from the report include:

  • Some of the most prominent cyber threats observed over the past year include compromised access and data, ransomware, the return of Emotet malware, and vulnerability exploits. Many of these can be mitigated with a comprehensive identity access password program and patching and update policy, as well as continuous monitoring for compromised credential breaches by third parties.

  • Evolving threats included hacktivism, one-time password (OTP) bypass services, supply chain attacks, and information-stealing malware. Fostering a culture of cybersecurity awareness is critical to combat employee negligence, which is synonymous with OTP and information-stealing malware.

  • The threat landscape will continue to be characterized by an increase in ransomware attacks and a demand for network accessThreat actors will continue to exploit vulnerabilities, and hacktivism will likely remain a threat.

Intel 471 also identified a number of cyber threat trends that are likely to dominate the landscape in 2023 and beyond:

  • As Well-known ransomware groups like LockBit continue to offer evolving products with targeted services, the number of vulnerabilities has decreased while they have increased in severity. In fact, multiple vulnerabilities have been some of the top threats facing organizations over the past year.

  • World events have further complicated the threat landscape of Russia invasion of Ukraine act as a catalyst for further polarization of the background. The most prolific threat to date has been KillNet, a pro-Russian group that gained notoriety for orchestrating distributed denial-of-service (DDoS) attacks against pro-NATO countries and organizations.

  • Threat actors monetize criminal services with great success in 2022. Multi-factor authentication (MFA) is a common security practice and Threat actors are turning to OTP bypass services to bypass this security layer. This area of ​​the underground ecosystem is likely to grow as demand for these services increases in the future.

  • The use of information theft will continue until 2023; Since the beginning of 2022, supply has increased significantly compared to the same period of 2021.

With the constant evolution across the cyber threat landscape and the resilience that threat actors continue to demonstrate, organizations need insights based on research and intelligence on the most prominent threat actors to understand their activities and stay ahead of the next attack added DeBolt. “As threat actors and groups adapt their methods to remain resilient to new and emerging security measures, organizations should stay current on the top TTPs of adversaries and adapt their security systems based on this information, to deal with new and sophisticated types of compromise. “

The report also includes case studies on LockBit 2.0, the most potent ransomware strain observed by Intel 471 November 2021 through May 2022and the release of version 3.0, which will be just as influential as 2.0, as well as the Russian invasion in 2022 Ukraine and the subsequent emergence of pro-Russian hacktivist groups.

To help organizations protect themselves from threat actors and their ever-evolving TTPs, The 471 Cyber ​​Threat Report provides a set of risk mitigation recommendations designed to help organizations and their security teams strengthen their security practices, identify potential threats, and isolate their sensitive information to avoid becoming victims of new ransomware strains and malware.

You can download the full report here.

About Intel471

Intel 471 empowers enterprises, government agencies, and other organizations to win the cybersecurity war by providing near real-time insights into the latest malicious actors, relationships, threat patterns, and upcoming attacks relevant to their organizations.

The firms TITAN platform collects, interprets, structures and validates human-led, automated results. Customers around the world use this threat intelligence with our proprietary framework to map the criminal underground, focus on the activities that matter most, and tailor their resources and reporting to business needs. Intel 471 serves as a trusted advisor to security teams, providing ongoing trend analysis and helping you leverage the platform. Learn more at

Media contact:
Johann Kreuzer / Maxime Olshan Cantin
Lumina Communications for Intel 471
[email protected]

Intel 471 logo

Intel 471 logo



View original content to download multimedia:

SOURCE Intel 471


About Author

Comments are closed.