drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Spring 2026
    • DRJ Fall 2026 Call for Presentations
    • DRJ Fall 2026
    • DRJ Scholarship
    • Tracey Rice Memorial Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • 2026 Media Kit
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee

Darktrace’s 2024 Annual Threat Report Reveals Continued Rise in MaaS Threats and Growing Use of Evasion Tactics

by Jon Seals | February 19, 2025 | | 0 comments

  • Malware-as-a-Service (MaaS) now represents 57% of threats detected, a 17% increase on H1 2024
  • The sophistication of phishing attacks continues to rise, with spear phishing making up 38% of attacks
  • Threat actors increasingly focus on evasion via edge device vulnerabilities, Living-off-the-Land (LOTL) techniques and hijacking of critical business tools like Dropbox and SharePoint

CAMBRIDGE, UK – Darktrace, a global leader in AI for cybersecurity, today announced the findings of Darktrace’s 2024 Annual Threat Report, revealing that Malware-as-a-Service (MaaS) is now responsible for more than half (57%) of all cyber threats to organizations[1], marking the continued growth of Cybercrime-as-a-Service (CaaS) models. These insights, observed by Darktrace’s Threat Research team using its unique Self-Learning AI across its customer fleet of nearly 10,000 customers spanning all major industries globally, detail a shifting threat landscape that continues to grow in complexity, marked by rising sophistication of common threats.

Cybercrime-as-a-Service threats persist

The persistence of CaaS models, particularly Ransomware-as-a-Service (RaaS) and MaaS is growing rapidly as less experienced threat actors access new tools to carry out disruptive attacks. According to the report, use of MaaS tools rose 17% in the latter half 2024, from 40% in the first six months to 57% of campaign activity identified by the Darktrace Threat Research.

The use of Remote Access Trojans (RATs) also saw a significant increase in the latter half of the year, representing 46% of campaign activity identified, compared to only 12% in the first half. RATs allow an attacker to remotely control an infected device, enabling them to conduct further malicious activity such as data exfiltration, credential theft, or surveillance, underscoring the rising complexity and increased risk of day-to-day threats.

Darktrace’s Threat Research team tracked several ransomware threats impacting customers, from novel strains like Lynx to re-emerging threats including Akira, RansomHub, Black Basta, Fog and Qilin. While these groups have been observed frequently using phishing as an attack vector, there has also been a shift toward more sophisticated techniques. These include the use of legitimate tools like AnyDesk and Atera to mask command and control (C2) communications, LOTL techniques for lateral movement, data exfiltration to commonly used cloud storage services and use of file-transfer technology for rapid exploitation and double extortion methods.

Inboxes Under Siege

Phishing remains attackers’ preferred technique, with over 30.4 million phishing emails detected across Darktrace’s customer fleet between December 2023 and December 2024. The techniques observed highlight how threat actors continue to curate more targeted and sophisticated emails to improve the success of their campaigns. Of all the phishing emails detected in 2024:

  • 38% were spear-phishing attempts, tailored attacks on high value individuals
  • 32% used novel social engineering techniques including AI generated text with linguistic complexity, like increased text volume, punctuation, and sentence length
  • 70% successfully passed the widely used DMARC authentication approach
  • 55% passed through all existing security layers before Darktrace detection
  • Over 940,000 malicious QR codes were identified 

Darktrace also observed an increase in threat actors targeting third-party services employees rely on, like Zoom Docs, QuickBooks, HelloSign, Adobe, and Microsoft SharePoint, to send phishing emails. By leveraging trusted platforms and domains, malicious actors can bypass traditional security measures and increase the likelihood of their phishing attempts being successful. These efforts highlight how threat actors continually adapt and evolve to keep pace with the emergence of new technologies that represent new avenues to exploit.

Nathaniel Jones, VP of Threat Research at Darktrace, comments, “Email is at the forefront of the evolving threats we’re seeing across the threat landscape. Ransomware-as-a-Service tools, combined with the growing use of AI, are allowing even low-skilled attackers to engineer convincing, targeted email attacks at scale, and making it harder than ever for traditional security measures to keep up.”

Evading Detection Via Edge Device Vulnerabilities and LOTL Techniques

Threat actors are increasingly focused on evading detection rather than causing disruption, often leveraging vulnerabilities in edge, perimeter or internet-facing devices to gain initial access to networks and then using LOTL techniques, the malicious use of legitimate tools present on a system, to remain undetected.

The most significant campaigns observed in 2024 involved the ongoing exploitation vulnerabilities in edge and perimeter network technologies, with 40% of identified campaign activity in the first half of the year involving the exploitation of internet-facing devices. Some of the most common exploitations involved Ivanti Connect Secure (CS) and Ivanti Policy Secure (PS) appliances, Palo Alto Network (PAN-OS) firewall devices, and Fortinet appliances. For example, Darktrace detected anomalous malicious activity on Palo Alto firewall devices as early as March 26th on customer networks, now recognized as evidence of PAN-OS exploitation,17 days prior to public disclosure on April 12th. 

In addition to vulnerabilities, Darktrace has also observed threat actors increasingly using stolen credentials to log into remote network access solutions like VPNs to gain initial access to networks. Following initial access, threat actors will use legitimate tools and processes already present on infected systems to achieve their goals while remaining undetected.

Many traditional tools struggle to identify and stop these attacks as differentiating between legitimate use by administrators and malicious use by attackers is challenging without an established baseline of normal user behavior. While often used by more sophisticated actors like Advanced Persistent Threats (APTs), smaller criminal enterprises also benefit from exploiting native tools, saving time and money by avoiding the need for custom malware development that might be blocked by traditional security tools once indicators of compromise (IoCs) are published.

“The combination of Cybercrime-as-a-Service, automation and AI are increasing the sophistication and diversity of attack techniques faster than ever – from AI-enhanced phishing campaigns to evolving ransomware strains,” said Nathaniel Jones, VP of Threat Research at Darktrace. “Detecting and responding to threats in progress is no longer sufficient. Organizations must prioritize cyber resilience by proactively addressing weaknesses across systems, people, and data before attackers can exploit them.”


[1] Based on attempted attacks detected across Darktrace’s customer fleet

Related Content

  1. Disaster Recovery Journal
    ‘Other Duties As Assigned’
  2. Disaster Recovery Journal
    Business Continuity Integration with Supply Chain Management: The Why and How
  3. Disaster Recovery Journal
    Glossary

Recent Posts

Destructive Activity Targeting Stryker Highlights Emerging Supply Chain Risks

March 13, 2026

EC-Council Establishes Global CISO Council to Address AI Governance and Emerging Technology Risks

March 13, 2026

Intruder Releases the Security Middle Child Report, Revealing How the Cybersecurity Industry Is Leaving Midmarket Businesses Behind

March 13, 2026

HackerOne Research Finds AI Security Gap as Testing Lags Behind Adoption

March 13, 2026

Panzura CloudFS 8.7 Cuts Infrastructure Costs, Simplifies Management, and Preps for Agentic AI Workflows

March 13, 2026

ThreatDown Uncovers First Cyber Attack Abusing Deno JavaScript Runtime for Fileless Malware Delivery

March 13, 2026

Archives

  • March 2026 (40)
  • February 2026 (76)
  • January 2026 (61)
  • December 2025 (45)
  • November 2025 (58)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2026 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Fall 2026 | Resilience In Motion

    Leave your details below for a chance to win a free pass to DRJ Fall 2026 | Resilience In Motion. The winner will be announced on July 30. Join us for DRJ's 75th Conference!
    Enter Now