{"id":51999,"date":"2023-05-19T19:00:01","date_gmt":"2023-05-19T19:00:01","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/three-common-initial-attack-vectors-account-for-most-ransomware-campaigns"},"modified":"2023-05-19T19:00:01","modified_gmt":"2023-05-19T19:00:01","slug":"3-common-initial-attack-vectors-account-for-most-ransomware-campaigns","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/","title":{"rendered":"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns"},"content":{"rendered":"<p>Most ransomware attackers use one of three main vectors to compromise networks and gain access to organizations&#8217; critical systems and data.<\/p>\n<p>The most significant vector in successful ransomware attacks in 2022, for example, involved the exploitation of public-facing applications, which accounted for 43% of all breaches, followed by the use of compromised accounts (24%) and malicious email (12%), according to Kaspersky&#8217;s recently released report, &#8220;The Nature of Cyber Incidents.&#8221;<\/p>\n<p>Both exploitation of applications and malicious emails declined as a share of all attacks compared with the previous year, while the use of compromised accounts increased from 18% in 2021.<\/p>\n<p>Bottom line: Doubling down on the most common attack vectors can go a long way to preventing a ransomware attack. &#8220;A lot of companies are not the initial targets for attackers but have weak IT security and [allowing them to] be hacked easily, so cybercriminals take the opportunity,&#8221; says <span>Konstantin Sapronov, head of the global emergency response team at Kaspersky. <\/span>&#8220;If we look at top three initial vectors, which together account for almost 80% of all cases, we can implement some defensive measures to mitigate them, and go a very long way to decreasing the likelihood of becoming a victim.&#8221;<\/p>\n<p>The top initial vectors cited by Kaspersky match an earlier report by incident-response firm Google Mandiant, which found that the <a href=\"https:\/\/www.darkreading.com\/ics-ot\/three-flaws-one-war-dominated-cyber-threat-landscape-2022\" target=\"_blank\" rel=\"noopener\">same common vectors made up the top three techniques<\/a> \u2014 exploitation of vulnerabilities (32%), phishing (22%), and stolen credentials (14%) <span>\u2014<\/span> but that ransomware actors tended to focus on exploitation and stolen credentials, which together accounted for nearly half (48%) of all ransomware cases.<\/p>\n<p>Ransomware took off in 2020 and 2021, but leveled off last year <span>\u2014<\/span> even dropping slightly. But this year, ransomware and a related attack \u2014 data leaks with a goal of collecting a ransom \u2014 appear to be increasing, with the number of organizations posted to data leak sites increasing in the first part of 2023, says Jeremy Kennelly, lead analyst for financial crime analysis at Mandiant.<\/p>\n<p>&#8220;This may be an early warning that the respite we saw in 2022 will be short-lived,&#8221; he says, adding that the ability to continue to use the same initial access vectors has helped attacks.<\/p>\n<p>&#8220;Actors engaging in ransomware operations haven\u2019t needed to evolve their tactics, techniques, and procedures (TTPs) significantly in recent years, as well understood strategies have continued to prove effective,&#8221; Kennelly says.<\/p>\n<h2 class=\"regular-text\">Unsurprising Trio: Exploits, Credentials, Phishing<\/h2>\n<p>In December 2022, the Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/news-events\/cybersecurity-advisories\/aa22-137a\" target=\"_blank\" rel=\"noopener\">warned that attackers were commonly using five initial access vectors<\/a>, including the three identified by both Kaspersky and Mandiant, as well as external remote services \u2014 such as VPNs and remote administration software \u2014 and third-party supply chain attacks, also known as trusted relationships.<\/p>\n<p>Most compromises are either quick or slow: Quick attacks compromise systems and encrypt data in days, while slow ones are where threat actors typically infiltrate deeper into the network over months, possibly conducting cyber espionage and then deploying ransomware or sending a ransom note, <a href=\"https:\/\/securelist.com\/kaspersky-incident-response-report-2022\/109680\/\" target=\"_blank\" rel=\"noopener\">according to Kaspersky&#8217;s report<\/a>.<\/p>\n<p>Exploitation of public-facing applications and the use of legitimate credentials also tend to be harder to detect without some sort of application or behavioral monitoring, leading to longer dwell times for attackers, says Kaspersky&#8217;s Sapronov.<\/p>\n<p>&#8220;[N]ot enough attention is paid to application monitoring,&#8221; he says. &#8220;Also, when attackers use [exploitation], they need to take more steps to reach their goals.&#8221;<\/p>\n<figure>\n<figure>\n<picture><source type=\"image\/webp\" media=\"(max-width: 576px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=480&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(max-width: 767px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/webp\" media=\"(min-width: 768px)\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"><source type=\"image\/jpeg\" srcset=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=jpg&amp;disable=upscale\"><img decoding=\"async\" data-image=\"9yeegmlru4ub\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" data-sys-asset-uid=\"blt1f81aa2d60d640b7\" alt=\"Chart of initial access vectors and dwell time\">\n<\/picture><figcaption>Exploitation is the top initial access vector and tends to lead to a quick ransomware attack or longer espionage. Source: Kaspersky<\/figcaption><\/figure>\n<\/figure>\n<h2 class=\"regular-text\">Tip: Track Exploitation Trends<\/h2>\n<p>Knowing the most common approaches attackers likely will take can help inform defenders. Companies should continue to prioritize vulnerabilities that have exploits in the wild, for example. By paying attention to the shifts in the threat ecosystem, companies can make sure that they are prepared for likely attacks, Mandiant&#8217;s Kennelly says.<\/p>\n<p>&#8220;Due to the velocity at which threat actors can weaponize exploit code to support intrusion operations, understanding which vulnerabilities are being actively exploited, whether exploit code is publicly available, and if a particular patch or remediation strategy is effective can easily save organizations from dealing with one or more active intrusions,&#8221; he says.<\/p>\n<p>But avoid putting too much emphasis on protecting against specific initial access vectors, as attackers continually adapt to defenses, Kennelly adds.<\/p>\n<p>&#8220;The specific infection vectors that are most common at a given time should not broadly change an organization&#8217;s defensive posture, as threat actors continually shift their operations to focus on whichever vectors prove most successful,&#8221; he says. &#8220;[A] decrease in the prevalence of any given vector does not mean it poses a significantly lower threat \u2014 for example, there has been a slow decline in the proportion of intrusions where access was obtained via phishing, but email is still used by many high-impact threat groups.&#8221;<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/three-common-initial-attack-vectors-account-for-most-ransomware-campaigns\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/three-common-initial-attack-vectors-account-for-most-ransomware-campaigns\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-51999","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Common Initial Attack Vectors Account for Most Ransomware Campaigns 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-19T19:00:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns\",\"datePublished\":\"2023-05-19T19:00:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/\"},\"wordCount\":791,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt1f81aa2d60d640b7\\\/64679724884ccb36354f6fce\\\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/\",\"name\":\"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt1f81aa2d60d640b7\\\/64679724884ccb36354f6fce\\\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"datePublished\":\"2023-05-19T19:00:01+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt1f81aa2d60d640b7\\\/64679724884ccb36354f6fce\\\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt1f81aa2d60d640b7\\\/64679724884ccb36354f6fce\\\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/","og_locale":"en_US","og_type":"article","og_title":"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-05-19T19:00:01+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns","datePublished":"2023-05-19T19:00:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/"},"wordCount":791,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/","url":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/","name":"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","datePublished":"2023-05-19T19:00:01+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt1f81aa2d60d640b7\/64679724884ccb36354f6fce\/kaspersky-exploit-type-v-time-to-detect.png?width=690&amp;quality=80&amp;format=webply&amp;disable=upscale"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/3-common-initial-attack-vectors-account-for-most-ransomware-campaigns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"3 Common Initial Attack Vectors Account for Most Ransomware Campaigns"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=51999"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/51999\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=51999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=51999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=51999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}