Top 10 Attack Vectors Most Exploited by Hackers Revealed
A Joint Advisory Describes Most Preferred Initial Access Attack Vectors by Threat Actors.
Last updated on May 18, 2022
Various national cybersecurity authorities have recently published a joint advisory that discloses what are the top 10 attack vectors most exploited by cybercriminals.
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,,, Canada, New Zealand,, the Netherlands, and the United Kingdom.
#2 Privileges Not Properly Managed and Access Control Lists Packed with Errors
Without these practices properly implemented, access control rules cannot be enabled correctly and unauthorized entities (be it, users, or system processes) can achieve unauthorized access.
#3 Lack of Updates in the Software
Unpatched software may be a path for threat actors to abuse vulnerabilities that let them gain access to sensitive information. This can lead, for instance, to a denial-of-service attack.
#4 Default Configurations and Credentials
Factory-default configurations and default credentials are not secure and can let open doors to hackers.
These default credentials are not secure—they may be physically labeled on the device or even readily available on the internet. Leaving these credentials unchanged creates opportunities for malicious activity, including gaining unauthorized access to information and installing malicious software. Network defenders should also be aware that the same considerations apply for extra software options, which may come with preconfigured default settings.
#5 Lack of Enough Security Controls in Remote Services
Remote service compromise can be prevented through access control mechanisms, boundary firewalls, and employing intrusion detection system/intrusion prevention system sensors that have the role of identifying suspicious behavior on the network.
#6 Lack of Strong Password Policies
Hackers find methods to target weak passwords and accomplish unauthorized access to a system.
#7 Unprotected Cloud Services
Misconfiguration in cloud services can further lead to sensitive data theft and cryptojacking.
#8 Exposed Open Ports and Misconfigured Services
Threat actors employ scanning tools to look for open ports and leverage them as initial attack vectors. Besides, they can also compromise a service on a host to achieve initial access and further extend to compromising vulnerable entities. Some examples of high-risk services would be RDP, Server Message Block (SMB), Telnet, and NetBIOS.
#9 Phishing Is Not Blocked or Identified
A common technique among threat actors is to send phishing emails that are embedded with malicious macros, so the initial vector might be when the user opens the document within the email letting this way the infection process start.
#10 Ineffective Endpoint Detection & Response
Obfuscated malicious scripts, as well as PowerShell attacks, are used by threat actors to evade endpoint security controls and conduct their cyberattacks.
How to Reduce Breach Risks
The joint advisory further shares guidelines on how to safeguard networks that are vulnerable to the mentioned top ten attack vectors involving misconfigurations, poor security practices as well as weak security controls. These are:
implementing control accesses that involve a zero-trust model, restriction on local admin accounts, control over who has access to data and resources, ensuring that are no open RDP ports on machines, etc.;
enforcing credentials hardening which means implementing MFA, changing or disabling vendor-supplied default credentials, and monitoring systems for compromised credentials;
establishing centralized log management;
using EDR (Endpoint Detection & Response) tools for higher visibility into endpoints’ status;
Heimdal has all the cybersec solutions you need to protect your critical data and ensure a fully protected ecosystem. Visit our home page and choose from Privileged Access Management to manage privileged access and deescalate user permissions on threat detection, Patch & Asset Management to automate your patching deployment process to Endpoint Detection and Response (EDR) that offers exceptional prevention, threat-hunting, and remediation capabilities. Or choose them all for complete protection against cyber threats!
Hi! My name is Andra and I am a passionate writer interested in a variety of topics. I am curious about the cybersecurity world and what I want to achieve through what I write is to keep you curious too!