Defensive Security Podcast Episode 305
Digest
This podcast discusses the key findings of the Mandiant M-Trends report on cybersecurity trends. The report, while acknowledging potential biases due to Mandiant's client base, offers valuable insights into current attack vectors and malware. Surprisingly, vulnerability exploitation surpasses phishing as the most common initial attack vector, emphasizing the critical need for robust patching and secure coding practices. Stolen credentials and web compromises remain significant threats, further highlighting the importance of multi-factor authentication. The report also notes a surprising involvement of North Korean IT workers in some attacks. Regarding malware, the report indicates a decline in new malware families, suggesting a shift towards "living off the land" attacks using existing system tools. However, a concerning rise in Linux malware is observed. The podcast concludes by emphasizing crucial security recommendations: implementing multi-factor authentication (especially phishing-resistant MFA), regular password rotation (particularly for service accounts), improved logging and detection capabilities, and a strong understanding of shared responsibilities in cloud security. The hosts stress the challenges of gaining sufficient visibility into cloud attack surfaces and the importance of secure cloud practices.
Outlines

Introduction and Mandiant M-Trends Report Overview
The episode introduces the Mandiant M-Trends report, acknowledging potential biases while highlighting its value in understanding cybersecurity trends. The hosts also briefly discuss their upcoming vacations and a sponsor message for InVisicle Oak.

Key Findings: Intrusion Vectors
The podcast details the report's findings on intrusion vectors, noting that vulnerability exploitation surpasses phishing as the most common initial attack vector. Stolen credentials and web compromises are also highlighted, along with the surprising involvement of North Korean IT workers.

Key Findings: Malware Trends and North Korean Actors
The discussion shifts to malware trends, including a decline in new malware families and a rise in Linux malware. The surprising involvement of North Korean IT workers in attacks is further discussed.

Security Recommendations and Cloud Security Challenges
The hosts discuss Mandiant's security recommendations, focusing on multi-factor authentication, password rotation, improved logging and detection, and secure cloud practices. They emphasize the importance of understanding shared responsibilities in cloud environments and the challenges of gaining sufficient visibility into cloud attack surfaces.
Keywords
Mandiant M-Trends Report
Annual report analyzing cybersecurity trends based on Mandiant's incident response data; provides insights into attack vectors, malware, and security recommendations.
Vulnerability Exploitation
Attack method leveraging software flaws to gain unauthorized access; requires patching and secure coding practices.
Stolen Credentials
Compromised usernames and passwords; multi-factor authentication is crucial for mitigation.
Multi-Factor Authentication (MFA)
Security measure requiring multiple forms of authentication; crucial for mitigating credential theft.
Linux Malware
Malware targeting Linux systems; a growing threat area.
Cloud Security
Protecting data and systems in cloud environments; requires understanding shared responsibilities.
Phishing
A social engineering attack where malicious actors attempt to trick users into revealing sensitive information.
North Korean Actors
Reference to the involvement of North Korean IT workers in cyberattacks.
Q&A
What are the most common initial intrusion vectors identified in the Mandiant M-Trends report?
Vulnerability exploitation, followed by stolen credentials and phishing.
How does the Mandiant report address the issue of malware trends?
A decline in new malware families and a rise in Linux malware are observed, suggesting a shift towards "living off the land" attacks.
What key security recommendations are emphasized in the podcast based on the Mandiant report?
Multi-factor authentication, password rotation, robust logging and detection, and secure cloud practices, including understanding shared responsibilities.
Show Notes
In this episode, we discuss the Google Mandiant 2025 M-Trends report. The report is available here: https://services.google.com/fh/files/misc/m-trends-2025-en.pdf
Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec



