1、2024 Data BreachInvestigations ReportPhishingExploit vulnerabilitiesCredentialsWeb applicationsEmailVPNDesktop sharingAbout the coverThis year,the report is delving deeper into the pathway to breaches in an effort to identify the most likely Action and vector groupings that lead to breaches given th
2、e current threat landscape.The cracked doorway on the cover is meant to represent the various ways attackers can make their way inside.The opening in the door shows the pattern of our combined“ways-in”percentages(see Figure 7 for a more straightforward representation),and it lets out a band of light
3、 displaying a pattern of the Action vector quantities.The inner cover highlights and labels the quantities in a less abstract way.Hope you enjoy our art house phase.42024 DBIR Table of contentsTable of contents1 Introduction 5Helpful guidance 6Summary of findings 72 Results and analysis Results and
4、analysis:Introduction 11VERIS Actors 15VERIS Actions 18VERIS Assets 23VERIS Attributes 253 Incident Classification Patterns Incident Classification Patterns:Introduction 28System Intrusion 30Social Engineering 36Basic Web Application Attacks 42Miscellaneous Errors 47Denial of Service 49Lost and Stol
5、en Assets 51Privilege Misuse 534 Industries Industries:Introduction 56Accommodation and Food Services 60Educational Services 61Financial and Insurance 62Healthcare 64Information 66Manufacturing 67Professional,Scientific and Technical Services 69Public Administration 70Retail 725 Regions Regional ana
6、lysis 756 Wrap-up Year in review 817 Appendices Appendix A:How to read this report 86Appendix B:Methodology 88Appendix C:U.S.Secret Service 92Appendix D:Using the VERIS Community Database(VCDB)to Estimate Risk 94Appendix E:Contributing organizations 96152024 DBIR IntroductionIntroductionGreetings!We