Pico's Red Report deals with trends in malware and attack tatics.
Picus Labs processed more than 1 million pieces of malware collected between January and December 2024 to reveal a comprehensive view of the latest tactics, techniques, and procedures being employed by adversaries across the planet. Each detected TTP was classified via the MITRE ATT&CK® Framework, which resulted in the identification of over 14 million malicious actions. This provided Picus with extremely granular insight into the most commonly deployed techniques, shedding light on critical information concerning these constantly shifting attack strategies. Among these, the most striking is that this yearʼs Red Report reveals that malware, specifically strains targeting credential stores, increased from 8% in 2023 to 25% in 2024, thus a 3X surge in prevalence, a fact that highlights the popularity and success of this emerging threat.
The Red Report also reveals that 93% of 2024ʼs malicious actions were carried out using the top ten MITRE ATT&CK techniques. These findings will help security teams make better-informed decisions and concentrate on defending against the most prevalent threats in today's cyber environment
Stealth Techniques Continue to Dominate:
Evasion and Persistence at the Core
T1055 Process Injection, seen in 31% of analyzed samples, shows further
movement to stealthier approaches as code injected into a legitimate
process evades detection in many security solutions. In addition, T1059
Command and Scripting Interpreter stands out among the top techniques
that allow attackers to conduct malicious operations through native tools,
such as PowerShell and Bash.
The Red Report 2025
The Red Report 2025™ reveals the tripling of malware targeting credentials from password stores. Discover the top 10 MITRE ATT&CK® techniques to defend against complex cyber threats.
See how to deal with T1055 Process Injection here: Advanced Plus Security - Victor M ESET based Persistence Stopping detailed Config
Last edited: