WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Report – Mandiant’s M-Trends 2024 Report on Targeted Attack Activity in 2023
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Report – Mandiant’s M-Trends 2024 Report on Targeted Attack Activity in 2023

Author: Chase Snow

Created: Tuesday, April 23, 2024 - 17:52

Categories: Cybersecurity, Security Preparedness

Mandiant recently released its M-Trends 2024 report which highlights targeted attack activity of 4000 different attack groups throughout 2023. It provides a deep look at the evolving cyber threat landscape taken from Mandiant’s incident response investigations and threat intelligence analysis of high-impact attacks around the globe.

Some main points from the report include:

  • Attackers are taking greater strides to evade detection. Many of Mandiant’s observations demonstrate a more concerted effort by attackers to evade detection and remain undetected on systems for longer periods of time. This includes an increased targeting of endpoint devices, and platforms that traditionally lack endpoint detection and response solutions. Zero-day usage also increased by 56% over the same reporting period in 2022, and more “living off the land” tactics, or use of legitimate, pre-installed tools and software within an environment were observed.  
  • Attackers are increasingly exploiting vulnerabilities in computer systems. Moving away from traditional phishing tactics, attackers are increasingly using software vulnerabilities to gain initial access to networks and systems. Attackers gained initial access through exploiting vulnerabilities in 38% of intrusions, a 6% increase since 2022, and phishing as an initial access vector decreased from 22% to 17% in 2023 over the same period.
  • Attacker dwell times have decreased. Despite the above trends, dwell time, which represents the period of time an attacker is on a system before being detected, is down to 10 days from 16 days in 2022. This may be attributed to defenders getting better at detecting threats, however ransomware, which is on the rise, plays a major role in decreasing the overall dwell time that an attacker has access to compromised systems and is the most likely reason for the decrease.

To obtain a copy of this year’s M-trends report, visit Mandiant. For additional analysis on the report, see Google and Infosecurity Magazine.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar