Palo Alto Networks, the global cybersecurity leader, released its latest report, ‘2024 Unit 42 Attack Surface Threat Report’, revealing the rapidly evolving landscape of cybersecurity threats. The study, drawn from several petabytes of data collected throughout 2023, highlights the growing challenges organisations face in securing their IT infrastructure amid constant changes and the increasing likelihood of AI-driven attacks.
This report underscores that organisations in critical sectors such as insurance, pharmaceuticals, and manufacturing are seeing a relentless evolution in their attack surfaces, making them prime targets for cyber criminals exploiting AI-generated vulnerabilities. As businesses continue to expand their digital footprints, the test of tracking and protecting all assets becomes increasingly difficult. Many organisations struggle to inventory their internet-facing applications, leaving them exposed to cyber threats that often begin with the exploitation of software vulnerabilities.
Key findings from the report include:
- Constantly Evolving Attack Surfaces: On average, an organisation’s attack surface introduces over 300 new services every month, accounting for nearly 32% of new high or critical cloud exposures. This rapid growth of new services without central oversight inevitably leads to misconfigurations and exposures, resulting in higher chances of a breach.
- Increased Risks from Lateral Movement and Data Exfiltration: Organisations experienced 73% of high-risk exposures within IT and Networking Infrastructure, Business Operations Applications, and Remote Access Services, which can be exploited for lateral movement and data exfiltration.
- Critical IT and Security Infrastructure Exposures: Over 25% of exposures involve critical IT and networking infrastructure, opening doors to opportunistic attacks. These include vulnerabilities in application-layer protocols and internet-accessible administrative login pages of routers, firewalls, VPNs, and other core networking and security appliances. Remote access services and business operation applications also constitute a significant portion of exposures, with each comprising over 23% of attack surface exposures.
High Vulnerability in Key Industries:
- Media and Entertainment: The industry experienced the highest rate of new services added, exceeding 7,000 per month.
- Telecommunications, Insurance, Pharma and Life Sciences: These industries saw substantial increases, with over 1,000 new services added to their attack surfaces.
- Critical Industries: Financial services, healthcare, and manufacturing saw their attack surfaces add over 200 new services every month.
The report also highlights the need for organisations to adopt AI-driven tools like Cortex Xpanse which provides continuous asset discovery and inventory. This capability is essential for maintaining complete visibility into the attack surface and reducing security risks.
Anil Valluri, MD and VP, Palo Alto Networks India and SAARC said, “As digital transformation and cloud adoption accelerate, the attack surface becomes more dynamic and challenging to secure, heightening the risk of AI-driven attacks that can scan billions of IP addresses in minutes to exploit vulnerabilities. With nearly half of exposures linked to remote access services and core networking infrastructure, and 23% to business operations applications, maintaining real-time visibility and monitoring is crucial. Leveraging AI-driven solutions for continuous asset discovery and inventory is essential to ensure comprehensive visibility and mitigate security risks.”
To secure attack surfaces effectively, maintaining persistent and comprehensive visibility across all assets, is essential for identifying and responding to risks such as high-profile vulnerabilities. Monitoring for unsanctioned services or shadow IT is critical to differentiate between known and unknown assets. Prioritising remediation efforts on high-severity vulnerabilities, especially those that are internet-exposed, is also crucial. Moreover, organisations should implement processes to address critical exposure risks in real time, optimise cloud configurations, and enforce secure data handling practices. Finally, staying informed about emerging threats and regularly reassessing the organisation’s attack surface are key strategies to mitigate risks.