In 2023, there was a noticeable shift in the cyber threat landscape, with newly disclosed vulnerabilities being rapidly exploited by attackers. Data indicates that vulnerabilities reported in 2023 and 2022 were responsible for 6% and 14% of all exploitation attempts, respectively. This demonstrates that recent vulnerabilities are more severe and easy to exploit and are adopted and weaponized by threat actors much faster than others. In comparison, relatively new vulnerabilities, disclosed between 2021 and 2023, accounted for over 30% of exploitation attempts, a marked increase from only 17% observed in 2021 for vulnerabilities disclosed between 2019 and 2021. This trend represents a departure from previous reliance on delayed update practices, by exploiting older, unpatched vulnerabilities, as evidenced by the “long-tail” distribution pattern seen in previous years.
Malicious Infrastructure by TLD (Top Level Domain)
This section highlights the most frequently used malicious Top-Level Domains (TLDs) as observed through Check Point’s ThreatCloud AI in 2023. Domains, whether used to disguise phishing sites or serving as command and control (C&C) centers for major botnets, are critical components in a threat actor’s infrastructure. Understanding trends associated with various TLDs equips defenders with another tool for assessing potential risks. Several factors may influence threat actors’ preference for a specific TLD, including the targeted organization they aim to impersonate, the availability of the TLD with their preferred domain registrar, or the cost associated with acquiring the TLD.
Percentage of new malicious domains by TLD per month 2022-2023
This section highlights the most frequently used malicious Top-Level Domains (TLDs) as observed through Check Point’s ThreatCloud AI in 2023. Domains, whether used to disguise phishing sites or serving as command and control (C&C) centers for major botnets, are critical components in a threat actor’s infrastructure. Understanding trends associated with various TLDs equips defenders with another tool for assessing potential risks. Several factors may influence threat actors’ preference for a specific TLD, including the targeted organization they aim to impersonate, the availability of the TLD with their preferred domain registrar, or the cost associated with acquiring the TLD.