Advancing UK Aerospace, Defence, Security & Space Solutions Worldwide
  • Home
  • /
  • Security
  • /
  • Darktrace releases Half-Year Threat Report 2024

Security

Darktrace releases Half-Year Threat Report 2024

Cambridge based Darktrace has today released its First 6: Half-Year Threat Report 2024, identifying key threats and attack methods facing businesses across the first half of 2024.

Above: Click to download First 6: Half-Year Threat Report 2024.
Courtesy Dark Trace

These insights, observed by Darktrace's Threat Research team using its unique Self-Learning AI across its customer fleet, shed light on the persistent nature of cyber threats and new techniques adopted by attackers attempting to sidestep traditional defences.

Advertisement
ODU RT

"The threat landscape continues to evolve, but new threats often build upon old foundations rather than replacing them. While we have observed the emergence of new malware families, many attacks are carried out by the usual suspects that we have seen over the last few years, still utilizing familiar techniques and malware variants," comments Nathaniel Jones, Director of Strategic Threat and Engagement at Darktrace. "The persistence of MaaS/RaaS service models alongside the emergence of newer threats like Qilin ransomware underscores the continued need for adaptive, machine learning powered, security measures that can keep pace with a rapidly evolving threat landscape."

Cybercrime-as-a-Service continues to pose significant risk for organisations
The findings show that cybercrime-as-a-service continues to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up a significant portion of malicious tools in use by attackers. Cybercrime-as-a-Service groups, such as Lockbit and Black Basta, provide attackers with everything from pre-made malware to templates for phishing emails, lowering the barrier to entry for cybercriminals with limited technical knowledge.

The most common threats Darktrace observed from January to June 2024 were:

  1. Information-stealing malware (29% of early triaged investigations)
  2. Trojans (15% of investigated threats)
  3. Remote Access Trojans (RATs) (12% of investigated threats)
  4. Botnets (6% of investigated threats)
  5. Loaders (6% of investigated threats)

The report also reveals the emergence of new threats alongside persistent ones. Notably, the rise of Qilin ransomware, which employs refined tactics such as rebooting infected machines in safe mode to bypass security tools and making it more difficult for human security teams to react quickly.

Advertisement
Leonardo animated rectangle

Per the report, double extortion methods are now prevalent amongst ransomware strains. As ransomware continues to be a top security concern for organizations, Darktrace's Threat Research Team has identified three predominant ransomware strains impacting customers: Akira, Lockbit and Black Basta. All three have been observed using double extortion methods.

Email phishing and sophisticated evasion tactics rise
Phishing remains a significant threat to organizations. Darktrace detected 17.8 million phishing emails across its customer fleet between December 21, 2023, and July 5, 2024. Alarmingly, 62% of these emails successfully bypassed Domain-based Message Authentication, Reporting, and Conformance (DMARC) verification checks which are industry protocols designed to protect email domains from unauthorized use, and 56% passed through all existing security layers.

The report highlights how cybercriminals are embracing more sophisticated tactics, techniques and procedures (TTPs) designed to evade traditional security parameters. Darktrace observed an increase in attackers leveraging popular, legitimate third-party services and sites, such as Dropbox and Slack, in their operations to blend in with normal network traffic. Additionally, there's been a spike in the use of covert command and control (C2) mechanisms, including remote monitoring and management (RMM) tools, tunneling, and proxy services.

Edge infrastructure compromise and exploitation of critical vulnerabilities are top concerns
Darktrace observed an increase in mass-exploitation of vulnerabilities in edge infrastructure devices, particularly those related to Ivanti Connect Secure, JetBrains TeamCity, FortiClient Enterprise Management Server, and Palo Alto Networks PAN-OS. These compromises often serve as a springboard for further malicious activities.

It is imperative that organizations do not lose sight of existing attack trends and CVEs – cybercriminals may resort to previous, predominately dormant methods to trick organizations. Between January and June, in 40% of cases investigated by the Threat Research team, attackers exploited Common Vulnerabilities and Exposures (CVEs).

For more in-depth analysis, download the First 6: Half-Year Threat Report 2024 at www.darktrace.com/resources/first-6-half-year-threat-report-2024.

Advertisement
General Atomics LB
Smiths Detection and METCO to open manufacturing facility in Saudi Arabia

Security

Smiths Detection and METCO to open manufacturing facility in Saudi Arabia

17 December 2025

METCO and Smiths Detection today announced that the opening of its new assembly and manufacturing facility in Saudi Arabia, designed to assemble, commission and manufacture advanced screening solutions – including Smiths Detection’s X-ray screening products – is scheduled for early next year.

NCSC warns mistaking AI vulnerability could lead to large-scale breaches

Security

NCSC warns mistaking AI vulnerability could lead to large-scale breaches

16 December 2025

The National Cyber Security Centre (NCSC) – a part of GCHQ – has shared critical insights cautioning cyber security professionals against comparing prompt injection and more classical application vulnerabilities classed as SQL injection.

Tyron Runflat set to establish UK centre of excellence

Defence Security

Tyron Runflat set to establish UK centre of excellence

16 December 2025

Tyron Runflat has invested in doubling its facility with the ambition of creating its first UK centre of excellence within the next five years.

Spaceport Cornwall and National Drone Hub launch UAS project

Aerospace Defence Security Space

Spaceport Cornwall and National Drone Hub launch UAS project

15 December 2025

The UK's first licensed spaceport, Spaceport Cornwall, has commenced work on a groundbreaking project with the National Drone Hub to establish a unique testing environment for uncrewed aerial systems (UAS).

Advertisement
Leonardo animated rectangle
Smiths Detection’s SDX 100100 DV HC on TSA ACSTL

Aerospace Security

Smiths Detection’s SDX 100100 DV HC on TSA ACSTL

15 December 2025

Smiths Detection's SDX 100100 DV HC X-ray scanner has been added to the Transportation Security Administration’s Air Cargo Screening Technology List (ACSTL), enabling its use by regulated operators across the US air cargo sector.

JFD Global to enhance Polish Navy

Defence Security

JFD Global to enhance Polish Navy's submarine rescue capability

11 December 2025

James Fisher (JFD Global) has secured a contract with PGZ Stocznia Wojenna, which will see JFD Global integrate a combined, hyperbaric and saturation diving system into the Polish Navy’s new salvage and rescue vessel, Ratownik.

Advertisement
ODU RT
Advertisement
General Atomics LB