In the first quarter of 2023, the Secureworks Counter Threat Unit (CTU) delved into incident response (IR) data, uncovering essential insights into the evolving landscape of cybersecurity threats. This analysis—spanning from January to March—enabled researchers to dissect various incidents and provide guidance for organizations looking to bolster their security protocols.
"The motivation and context for IR engagements vary," explained a member of the Secureworks Counter Threat Unit. This variability is often influenced by factors such as an organization’s internal resources or external media scrutiny. Such considerations can significantly shape the type of security incidents that are prioritized.
"The motivation and context for IR engagements vary,"
The report highlights that early detection of malicious activity is crucial for preventing malware infections from escalating to full-blown ransomware attacks. "The vast majority of cyberattacks observed by Secureworks incident responders are likely financially motivated," noted another expert. This underscores the persistent threats posed by ransomware and business email compromise (BEC), which continue to loom large over the cybersecurity landscape.
"The vast majority of cyberattacks observed by Secureworks incident responders are likely financially motivated,"

Career Journey
During the Q1 2023 reporting period, malware infections made up nearly one-third of IR engagements, while network compromises followed at approximately 15%. Certain incidents could have progressed into more severe ransomware attacks had they not been intercepted early through proactive measures. The importance of effective extended detection and response (XDR) solutions cannot be overstated here.
Career Journey
Despite the low representation of specific incidents, such as BEC—accounting for just 7% of engagements—it remains a significant threat, as evidence of its impact on organizations persists. Similarly, ransomware, which constituted only 6% of investigated incidents, remains a considerable concern. According to the FBI’s Internet Crime Complaint Center, reports of ransomware actually declined in 2022, which may reflect companies’ increased ability to detect precursor activities early. "Some victims do not report incidents or retain IR services, meaning that the actual number may be higher," warned a CTU analyst, emphasizing the importance of comprehensive incident reporting.
"Some victims do not report incidents or retain IR services, meaning that the actual number may be higher,"
Championship Implications
Moreover, observations indicate that phishing was the most common initial attack vector (IAV) during this period, representing 34% of IR engagements. This was followed by the exploitation of vulnerabilities in internet-facing devices at 20%. In a noteworthy trend, the percentage related to drive-by downloads surged to 17%, up from a meager 2% across the prior year. This escalation points towards a growing interest from financially motivated actors in leveraging strategies such as SEO poisoning to launch attacks.
"Our tracking of leak sites indicates that name-and-shame ransomware tactics remain active," added another specialist from the team. The continued activity of these tactics highlights the need for organizations to maintain robust security measures and training programs to tackle multifaceted threats effectively.
"Our tracking of leak sites indicates that name-and-shame ransomware tactics remain active,"

As organizations continue to navigate an increasingly complex threat landscape, the practical recommendations issued by the CTU stress the necessity of implementing defined security controls and establishing training protocols designed to elevate awareness and resilience against ever-evolving cyber threats. The insights generated from the first quarter provide significant lessons for risk management and decision-making strategies moving forward.
With an eye now on the remaining months of 2023, organizations must remain vigilant. Advanced preparation and proactive strategies are no longer optional but imperative in the fight against cybercrime. As evolving tactics emerge, adapting to the changing dynamics of threats will be critical to ensuring the integrity and security of digital infrastructures.

