Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Security
  • /
  • Darktrace End of Year Threat Report reveals shifting threats

Security

Darktrace End of Year Threat Report reveals shifting threats

Cambridge based Darktrace has released its 2023 End of Year Threat Report, identifying the key threats and attack methods facing businesses observed across the past six months.

Above: The diagram represents Darktrace detections containing indicators of compromise (IoCs) that have been associated with particular MaaS and RaaS threats. The size of the bubble displayed relates to the frequency of detections observed across the Darktrace fleet. 
Courtesy Darktrace

These insights, observed by Darktrace’s unique Self-Learning AI across its customer fleet, shed light on rapid shifts in the cyber security landscape and new techniques adopted by attackers attempting to sidestep traditional defences.

Advertisement
ODU RT

The findings show that as-a-Service attacks continue to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up the majority of malicious tools in use by attackers. As-a-Service tools can provide attackers with everything from pre-made malware to templates for phishing emails, payment processing systems and even helplines to enable criminals to mount attacks with limited technical knowledge.

The most common as-a-Service tools Darktrace saw in use from July to December 2023 were:

  • Malware loaders (77% of investigated threats[1]), which can deliver and execute other forms of malware and enable attackers to repeatedly target affected networks.
  • Cryptominers (52% of investigated threats), which use an infected device to mine for cryptocurrency.
  • Botnets (39% of investigated threats), enrol users in wider networks of infected devices, which attackers then leverage in larger-scale attacks on other targets.
  • Information-stealing malware (36% of investigated threats), malicious software like spyware or worms, designed to secretly access and collect sensitive data from a victim’s computer or network.
  • Proxy botnets (15% of investigated threats), more sophisticated botnets that use proxies to hide the true source of their activity.

The report also reveals a changing of the guard. In its First 6: Half-Year Threat Report, Darktrace identified Hive ransomware as one of the major Ransomware-as-a-Service attacks at the beginning of 2023. With the dismantling of Hive by the US government in January 2023, Darktrace observed the rapid growth of a range of threats filling the void, including ScamClub, a malvertising actor notorious for spreading fake virus alerts to notable news sites, and AsyncRAT, responsible for attacking US infrastructure employees in recent months.

Attackers shift to advanced solutions to bypass conventional security measures‍
As businesses continue to rely on email and collaboration tools for communication, methods such as phishing continue to cause a headache for security teams. Darktrace detected 10.4 million phishing emails across its customer fleet between the 1st September and the 31st December 2023.

However, the report also highlights how cybercriminals are embracing more sophisticated tools and tactics designed to evade traditional security parameters. One example is the rise of Microsoft Teams phishing in which attackers contact employees through Teams, posing as a co-worker and tricking them into clicking malicious links. In one case in September 2023, Darktrace identified a suspected Teams phisher attempting to trick users into clicking a SharePoint link that would download the DarkGate malware and deploy further strains of malware across the network.

Advertisement
ODU RT

Another new trend identified is the growth of malware developed with multiple functions to inflict maximum damage. Often deployed by sophisticated groups like cyber cartels, these Swiss Army knife-style threats combine capabilities. For example, the recent Black Basta ransomware also spreads the Qbot banking trojan for credential theft. Such multi-tasking malware lets attackers cast a wide net to monetise infections.

"Throughout 2023, we observed significant development and evolution of malware and ransomware threats, as well as changing attacker tactics and techniques resulting from innovation in the tech industry at large, including the rise in generative AI. Against this backdrop, the breadth, scope, and complexity of threats facing organizations has grown significantly,” commented Hanah Darley, Director of Threat Research, Darktrace. “Security teams face an up-hill battle to stay ahead of attackers, and need a security stack that keeps them ahead of novel attacks, not chasing yesterday’s threats.”

Download the 2023 End of Year Threat Report at darktrace.com/threat-report-2023.

 

 

 

Advertisement
FIA2026 animated banner
Getac to demo integrated tactical solutions at SOF Week 2026

Defence Security Events

Getac to demo integrated tactical solutions at SOF Week 2026

15 May 2026

Getac, a provider of rugged computing and mobile video solutions and a manufacturer with advanced in-house capabilities, will demo its portfolio of rugged laptops, tablets and command solutions at SOF Week 2026, 18th-21st May in Tampa, Florida.

Blighter partners with JoongAng Advanced Materials

Security

Blighter partners with JoongAng Advanced Materials

14 May 2026

Blighter has partnered with JoongAng Advanced Materials, a supplier of industrial solutions and AI integrator, to grow its electronic scanning array (ESA) radars business in the Republic of Korea (RoK) and across East Asia.

NPAS gains funding for additional helicopters

Aerospace Security

NPAS gains funding for additional helicopters

14 May 2026

The National Police Air Service (NPAS) has welcomed confirmation from the UK Minister of State for Policing and Crime that funding has been approved for two additional brand-new police helicopters to complement its National Fleet Replacement Programme (FRP).

Cambridgeshire Constabulary to deploy LFR in Peterborough

Security

Cambridgeshire Constabulary to deploy LFR in Peterborough

13 May 2026

State-of-the-art Live Facial Recognition (LFR) technology will be deployed for the first time in Cambridgeshire this coming Saturday (16th May 2026) in Peterborough.

Advertisement
ODU RT
Met makes an arrest every 35 minutes in live facial recognition pilot

Security

Met makes an arrest every 35 minutes in live facial recognition pilot

13 May 2026

In new results released by the Metropolitan Police today, over 170 wanted criminals were arrested during a live facial recognition pilot in Croydon, which saw static cameras deployed for the first time.

SMD selects D-RisQ to advance autonomous systems

Aerospace Defence Security

SMD selects D-RisQ to advance autonomous systems

13 May 2026

Malvern based D-RisQ Ltd has been selected by SMD to accelerate development of their autonomy programme.

Advertisement
ODU RT
Advertisement
Hexagon leaderboard