Using the MITER ATT&CK matrix, experts from Security Code company presented an overview of the most popular techniques used by hackers in the first and third quarters of 2024. The main actions used by the attackers were “Inspecting system information” and “Decommitting/decoding files or information”. The first technique involves analyzing system data to find vulnerabilities, while the second is the process of hiding the actual content of malicious files to avoid detection. These methods were used 108 and 84 times, respectively.
Other popular techniques include Malicious File and PowerShell. A malicious file is an attack in which hackers trick the user into opening an infected document, allowing it to inject malicious code into the system. Often such methods are used as part of social engineering, for example through fake business emails. The PowerShell technique is used to abuse command line commands in the Windows operating system; It allows you to run remote or local commands and also download malicious files from the Internet.
As experts note, at the beginning of the year hackers became more involved in reconnaissance, examining system data and files, and from the second half of 2024 they began to implement more dangerous attacks using malicious files and PowerShell. Also at the top were techniques such as “Exfiltration via C2 channels” (using command and control servers to transfer data), “Web protocols”, “Data encryption” and “Phishing”. These techniques show how attackers continue to evolve their approach to hacking and surreptitiously extracting information.
Source: Ferra

I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.