Cyber Claims Outlook 2024: Trends, Threats, and Tomorrow's Challenges
This presentation analyzes current cyber insurance claims data to identify prevalent attack vectors and their financial impact on organizations. It highlights the dominance of phishing, RDP exploitation, and VPN vulnerabilities as primary initial access methods, while emphasizing the rise of supply chain attacks and double extortion. The talk provides actionable insights for security professionals on the importance of MFA and proactive incident response to mitigate the escalating costs of data breaches.
The Real Cost of Ignoring MFA: Lessons from Recent Ransomware Trends
TLDR: Recent claims data confirms that phishing, exposed RDP, and VPNs without MFA remain the primary entry points for ransomware actors. Attackers are increasingly shifting toward supply chain compromises and double extortion, where data is both encrypted and exfiltrated to maximize leverage. Security teams must prioritize MFA enforcement and rapid patching to disrupt these predictable, high-impact attack paths.
Ransomware is not evolving in a vacuum. While the headlines focus on the latest zero-day exploit, the reality on the ground for incident responders is far more mundane. The most effective attacks are still the ones that rely on the path of least resistance. If you are still debating the necessity of multi-factor authentication (MFA) in 2024, you are ignoring the data that shows exactly how threat actors are gaining initial access to enterprise environments.
The Anatomy of Initial Access
Data from recent claims shows a clear hierarchy of intrusion vectors. Phishing remains the undisputed king, largely because it is cheap, scalable, and requires zero technical sophistication to deploy. Attackers are using generative AI to craft highly convincing lures, making it harder for employees to distinguish between legitimate business correspondence and malicious payloads.
Beyond phishing, the persistence of exposed Remote Desktop Protocol (RDP) and VPNs without MFA is a failure of basic hygiene. When an attacker scans the internet and finds an open RDP port, they do not need a complex exploit chain. They need a wordlist and a bit of patience. The same applies to VPNs. If you have a VPN concentrator exposed to the public internet without a second factor of authentication, you are essentially leaving the front door unlocked.
For a pentester, these are the first things you check. If you can find a VPN endpoint, you are already halfway to a domain admin compromise. The OWASP Identification and Authentication Failures category is not just a theoretical risk; it is the primary driver of the financial losses we see in the insurance market today.
The Shift to Double Extortion and Supply Chain Attacks
Encryption is no longer the only goal. Modern ransomware groups have pivoted to double extortion, where they exfiltrate sensitive data before triggering the encryption routine. This forces the victim into a corner: pay the ransom to recover your files, or pay to prevent the public release of your proprietary data.
This shift has fundamentally changed the economics of a breach. When data is exfiltrated, the incident is no longer just an IT recovery problem; it is a legal and regulatory nightmare. The Change Healthcare incident serves as a stark reminder of how a single supply chain compromise can ripple across an entire industry, causing massive operational disruption and financial damage.
Supply chain attacks are particularly dangerous because they bypass traditional perimeter defenses. If your vendor is compromised, your own security posture becomes secondary to the trust you placed in that third party. Pentesters should focus more on mapping these trust relationships. During an engagement, look for service accounts or VPN tunnels that connect your target to external partners. These are often the most overlooked and least monitored paths in the network.
Why MFA is Your Only Real Seatbelt
Many organizations treat MFA as a "nice to have" or a checkbox for compliance. This is a mistake. MFA is the only control that consistently disrupts the automated, opportunistic attacks that characterize the current threat landscape. Even if an attacker successfully phishes a user's credentials, the lack of a valid MFA token stops them in their tracks.
The data shows that when MFA is absent, the time to compromise is measured in minutes. When it is present, the attacker is forced to either move on to an easier target or invest significantly more time and resources into bypassing the authentication mechanism. While techniques like session token theft exist, they are significantly more difficult to execute than simply logging in with stolen credentials.
Moving Beyond the Perimeter
Defenders need to stop thinking about the network as a static, defensible castle. The perimeter has dissolved. Your focus should be on identity-centric security. If you are not monitoring for anomalous login patterns or enforcing strict conditional access policies, you are already behind.
For those of us on the offensive side, the message is clear: the low-hanging fruit is still abundant. Organizations are still failing to implement basic controls like MFA and are still leaving critical infrastructure exposed. Until that changes, the ransomware industry will continue to thrive.
If you want to make a real impact on your next engagement, stop looking for the "cool" exploit and start looking for the misconfigured VPN or the service account with excessive privileges. That is where the real damage is happening, and that is where you can provide the most value to your clients. The tools and techniques are well-documented, but the execution remains consistently poor. Use that to your advantage, and help your clients understand that security is not about buying more tools; it is about closing the gaps that attackers are already walking through.
Vulnerability Classes
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Counter Deception: Defending Yourself in a World Full of Lies




