<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: 0x57Origin</title>
    <description>The latest articles on Forem by 0x57Origin (@0x57origin).</description>
    <link>https://forem.com/0x57origin</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3633954%2F92e5cd60-42b9-4be5-a163-d4a5878295bc.png</url>
      <title>Forem: 0x57Origin</title>
      <link>https://forem.com/0x57origin</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/0x57origin"/>
    <language>en</language>
    <item>
      <title>I Built NimPacket, a Raw Packet Crafting Library in Nim, and It Turned Into One of My Best Cyber Projects</title>
      <dc:creator>0x57Origin</dc:creator>
      <pubDate>Thu, 04 Dec 2025 06:17:12 +0000</pubDate>
      <link>https://forem.com/0x57origin/i-built-nimpacket-a-raw-packet-crafting-library-in-nim-and-it-turned-into-one-of-my-best-cyber-1n0g</link>
      <guid>https://forem.com/0x57origin/i-built-nimpacket-a-raw-packet-crafting-library-in-nim-and-it-turned-into-one-of-my-best-cyber-1n0g</guid>
      <description>&lt;p&gt;For my cybersecurity masters work, I wanted to go deeper than running tools and reading packet captures. I wanted to understand what was happening inside the packets themselves. Instead of calling Scapy or hiding behind Python abstractions, I decided to build my own packet manipulation library from scratch in Nim. That became NimPacket, and it turned out to be one of the most useful and eye opening projects I have done.&lt;/p&gt;

&lt;p&gt;NimPacket gives full control of IPv4, TCP, UDP, and ICMP headers. Everything is exposed at the byte level. You can set fields, flip flags, stack layers, serialize to raw bytes, and then parse real traffic back into readable structures. Working at this depth made me understand not just how protocols work but how they fail and how attackers take advantage of them.&lt;/p&gt;

&lt;p&gt;I included real examples so the library is not just a research exercise. There is a working SYN port scanner, a raw packet sniffer, and an ICMP echo builder. These examples helped validate the code and also give anyone reading the repository a clear idea of how to apply the library in actual security work. It runs smoothly on Kali and makes it easy to build custom packet tools without relying on heavy frameworks.&lt;/p&gt;

&lt;p&gt;The project taught me a lot about checksum algorithms, endian handling, field packing, and protocol specifications. It also showed me why low level networking is still important for people in cybersecurity. You cannot fully understand network attacks unless you know what each byte represents and why it is there.&lt;/p&gt;

&lt;p&gt;If you want to see the code or try it out, the repository is here:&lt;br&gt;
&lt;a href="https://github.com/0x57Origin/NimPacket" rel="noopener noreferrer"&gt;https://github.com/0x57Origin/NimPacket&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;I am always open to feedback from people who have more experience in systems programming or raw socket work, so feel free to check it out and let me know what you think.&lt;/p&gt;

</description>
      <category>python</category>
      <category>ai</category>
      <category>programming</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Enter RE_VAULT and Try Your Hand at Black Cipher</title>
      <dc:creator>0x57Origin</dc:creator>
      <pubDate>Tue, 02 Dec 2025 19:44:54 +0000</pubDate>
      <link>https://forem.com/0x57origin/introducing-revault-my-public-archive-of-reverse-engineering-projects-3a8b</link>
      <guid>https://forem.com/0x57origin/introducing-revault-my-public-archive-of-reverse-engineering-projects-3a8b</guid>
      <description>&lt;h2&gt;
  
  
  RE_VAULT: My growing archive of reverse engineering challenges
&lt;/h2&gt;

&lt;p&gt;When I first got into reverse engineering, I kept running into the same problem.&lt;/p&gt;

&lt;p&gt;Either the binaries were so trivial that you could finish them in five minutes, or they were full blown malware samples that assumed you already knew what you were doing. There was not much in the middle that felt like a structured way to get better.&lt;/p&gt;

&lt;p&gt;So I started building my own targets.&lt;/p&gt;

&lt;p&gt;This repository is where I am collecting them.&lt;/p&gt;

&lt;p&gt;GitHub: &lt;a href="https://github.com/0x57Origin/RE_VAULT/tree/main" rel="noopener noreferrer"&gt;https://github.com/0x57Origin/RE_VAULT/tree/main&lt;/a&gt;&lt;br&gt;&lt;br&gt;
Contact for solutions: &lt;a href="mailto:0x57Origin@proton.me"&gt;0x57Origin@proton.me&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  What is RE_VAULT
&lt;/h2&gt;

&lt;p&gt;RE_VAULT is my public archive of reverse engineering projects and challenge binaries.&lt;/p&gt;

&lt;p&gt;Right now the main thing inside it is a project called:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Flag Hunt 2 - Black Cipher Edition&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It is a C program that behaves like a hostile forensic artifact. It has menus, decoy output, fake analysis modules, and a lot of traps. Underneath that, it hides multiple independent challenges that all live inside the same binary.&lt;/p&gt;

&lt;p&gt;There are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;10 primary flags&lt;/li&gt;
&lt;li&gt;1 hidden bonus flag that is never printed&lt;/li&gt;
&lt;li&gt;multiple layers of obfuscation and misdirection&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The goal is simple. Give people something that feels closer to a weird piece of malware or an incident artifact, but still designed for learning.&lt;/p&gt;




&lt;h2&gt;
  
  
  Who this is for
&lt;/h2&gt;

&lt;p&gt;If any of this sounds like you, then Black Cipher is probably useful:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You are learning Ghidra or another RE tool and want more than simple crackmes
&lt;/li&gt;
&lt;li&gt;You want to understand the tricks used in real malware, without touching actual live malware
&lt;/li&gt;
&lt;li&gt;You enjoy C, low level behavior, and weird control flow
&lt;/li&gt;
&lt;li&gt;You want to practice thinking like both the attacker and the analyst
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can treat this project in three ways:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;As a pure puzzle. Run the binary, poke at it, and try to get all flags with Ghidra and a notebook.
&lt;/li&gt;
&lt;li&gt;As a learning lab. Focus on one module at a time, for example only the VM or only the heap artifact.
&lt;/li&gt;
&lt;li&gt;As reference material. Read the C source to understand how certain evasive patterns are implemented.&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  How Black Cipher behaves
&lt;/h2&gt;

&lt;p&gt;When you run the binary, you do not get a clean CTF style interface. You get something that looks more like a small analysis console:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A banner that pretends to be a forensic tool
&lt;/li&gt;
&lt;li&gt;A list of "analysis modules"
&lt;/li&gt;
&lt;li&gt;Each menu option triggers a different challenge path
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Some modules will print noise. Some will fail. Some will show partial information. Only a few of them will give you a clean flag without effort.&lt;/p&gt;

&lt;p&gt;That is by design.&lt;/p&gt;

&lt;p&gt;Part of the challenge is figuring out which output is real, which is a decoy, and which is an encoded form of something you can decode yourself.&lt;/p&gt;




&lt;h2&gt;
  
  
  Spoiler warning
&lt;/h2&gt;

&lt;p&gt;The rest of this article talks about the internal structure of the binary.&lt;/p&gt;

&lt;p&gt;I will not give any exact flag strings or full solutions here, but I will describe what each module is roughly doing. If you want to go in completely blind, stop reading now, clone the repo, build the program, and only come back later.&lt;/p&gt;

&lt;p&gt;GitHub again:&lt;br&gt;&lt;br&gt;
&lt;a href="https://github.com/0x57Origin/RE_VAULT/tree/main" rel="noopener noreferrer"&gt;https://github.com/0x57Origin/RE_VAULT/tree/main&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  High level structure of the challenges (light spoilers)
&lt;/h2&gt;

&lt;p&gt;Each menu entry in Black Cipher maps to a different style of challenge. The idea was to compress a whole "mini curriculum" of RE techniques into one executable.&lt;/p&gt;

&lt;p&gt;Here is what you are really dealing with.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. String decryption module
&lt;/h3&gt;

&lt;p&gt;This module is about encrypted strings and simple obfuscation.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The binary keeps an encoded string table in memory
&lt;/li&gt;
&lt;li&gt;A decoder routine performs a mix of XOR and rotation
&lt;/li&gt;
&lt;li&gt;If you find that routine in Ghidra and follow it, you can recover real text
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The raw output when you run it looks wrong on purpose. The point is to make you pull the decoder out, not just rely on printing.&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Control flow tracer
&lt;/h3&gt;

&lt;p&gt;This is a function pointer maze.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There is a table of function pointers
&lt;/li&gt;
&lt;li&gt;Some point to dead ends, some to decoys, one path leads to the real flag
&lt;/li&gt;
&lt;li&gt;The correct sequence is not obvious from the strings
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Reversing this is good practice for reconstructing strange control flow and focusing on what is actually executed rather than what looks interesting.&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Hash verification system
&lt;/h3&gt;

&lt;p&gt;This module is built around a custom hash.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Input is run through a polynomial style hashing function
&lt;/li&gt;
&lt;li&gt;The code never stores the answer string in plain form
&lt;/li&gt;
&lt;li&gt;You are expected to reimplement the hash and find the right input
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is a common pattern in license checks and challenges. It rewards careful reading of the decompiled logic and a bit of scripting on the side.&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Binary data extractor
&lt;/h3&gt;

&lt;p&gt;Here you deal with data hidden in the binary sections.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The program walks over what looks like random bytes in a data segment
&lt;/li&gt;
&lt;li&gt;A simple transform turns those bytes into something meaningful
&lt;/li&gt;
&lt;li&gt;Again, the program does not present the final result nicely on screen
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You will probably end up using Ghidra to inspect the .rodata layout and then write a small script to decode what you find.&lt;/p&gt;

&lt;h3&gt;
  
  
  5. Anti tamper detector
&lt;/h3&gt;

&lt;p&gt;This one focuses on anti debugging tricks.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Uses ptrace to detect basic debugging
&lt;/li&gt;
&lt;li&gt;Contains timing based checks that complain if something feels off
&lt;/li&gt;
&lt;li&gt;Only reveals the flag when the checks pass
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This encourages you to understand what the anti debug logic is doing and either patch it out or simulate the expected behavior.&lt;/p&gt;

&lt;h3&gt;
  
  
  6. Virtual machine analyzer
&lt;/h3&gt;

&lt;p&gt;This is a small custom VM.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There is a bytecode array in the binary
&lt;/li&gt;
&lt;li&gt;An interpreter loop implements a set of opcodes
&lt;/li&gt;
&lt;li&gt;Running the VM with the right state eventually triggers a flag print
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can either reverse the VM and emulate it in a script, or step through it and watch what it is computing.&lt;/p&gt;

&lt;h3&gt;
  
  
  7. Mathematical solver
&lt;/h3&gt;

&lt;p&gt;This is a logic trap.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The program shows you equations that are not actually the ones that matter
&lt;/li&gt;
&lt;li&gt;The real constraints are hidden behind different branches
&lt;/li&gt;
&lt;li&gt;Only a very specific input satisfies the true condition path
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you try to solve the visible math directly, you will get nowhere. You need to trace which conditions are actually used in the path that prints the flag.&lt;/p&gt;

&lt;h3&gt;
  
  
  8. Memory forensics tool
&lt;/h3&gt;

&lt;p&gt;This challenge lives on the heap.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A struct is allocated and partially filled with encoded data
&lt;/li&gt;
&lt;li&gt;The program prints noisy bytes related to that memory
&lt;/li&gt;
&lt;li&gt;The clean flag never appears directly
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To win here, you should identify the struct layout in Ghidra, understand the encoding used inside it, and reconstruct the original content.&lt;/p&gt;

&lt;h3&gt;
  
  
  9. Network protocol decoder
&lt;/h3&gt;

&lt;p&gt;This module pretends to be packet analysis.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A fake PCAP style blob is embedded in the binary
&lt;/li&gt;
&lt;li&gt;Simple protocol checks determine how it is parsed
&lt;/li&gt;
&lt;li&gt;A small decoder recovers a hidden message from it
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The idea is to get used to the pattern "embedded binary blob plus decode routine" which you will see a lot in malware and droppers.&lt;/p&gt;

&lt;h3&gt;
  
  
  10. Multi stage hash validator
&lt;/h3&gt;

&lt;p&gt;The last visible flag rides on a chain of hashes.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The input is run through several custom hash like functions
&lt;/li&gt;
&lt;li&gt;Each one feeds into the next
&lt;/li&gt;
&lt;li&gt;Only a very specific string survives all checks
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To solve this, you basically have to replicate the full chain in a script and let it guide you.&lt;/p&gt;




&lt;h2&gt;
  
  
  The hidden bonus flag
&lt;/h2&gt;

&lt;p&gt;There is an eleventh flag that is never printed and never referenced in an obvious way.&lt;/p&gt;

&lt;p&gt;The only hints I will give here:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It lives in a custom section of the binary
&lt;/li&gt;
&lt;li&gt;The bytes are encrypted and reversed
&lt;/li&gt;
&lt;li&gt;The logic that explains how to decrypt it is split across several unrelated functions
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you are comfortable with ELF internals, custom sections, and Ghidra scripting, you will eventually find it. It is not meant to be fast. It is meant to reward full understanding of the binary.&lt;/p&gt;




&lt;h2&gt;
  
  
  How to get the solutions
&lt;/h2&gt;

&lt;p&gt;By design, the repository does not include the full solutions.&lt;/p&gt;

&lt;p&gt;There is a separate solutions document that walks through:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;how to find each challenge in Ghidra
&lt;/li&gt;
&lt;li&gt;what to look for in the decompiled code
&lt;/li&gt;
&lt;li&gt;how the encoding and hashing actually work
&lt;/li&gt;
&lt;li&gt;concrete steps from first load to final flag
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;an instructor who wants to use this in a class
&lt;/li&gt;
&lt;li&gt;a student who got stuck and needs to check their work
&lt;/li&gt;
&lt;li&gt;someone reviewing my code and wants to see my full reasoning
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;You can email me and I can share the solutions privately.&lt;/p&gt;

&lt;p&gt;Contact: &lt;strong&gt;&lt;a href="mailto:0x57Origin@proton.me"&gt;0x57Origin@proton.me&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Please mention "Black Cipher" or "Flag Hunt 2" in the subject so I know what you are asking about.&lt;/p&gt;




&lt;h2&gt;
  
  
  Final notes
&lt;/h2&gt;

&lt;p&gt;RE_VAULT is not meant to be a one off project. It is where I plan to keep building and collecting more reverse engineering challenges over time.&lt;/p&gt;

&lt;p&gt;Right now the main focus is Black Cipher. In the future I want to add:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;smaller warmup binaries
&lt;/li&gt;
&lt;li&gt;more VM based puzzles
&lt;/li&gt;
&lt;li&gt;challenges that mix file formats, crypto, and protocol analysis
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you try the project and have feedback, ideas, or want to collaborate on future challenges, feel free to reach out.&lt;/p&gt;

&lt;p&gt;GitHub repo again:&lt;br&gt;&lt;br&gt;
&lt;a href="https://github.com/0x57Origin/RE_VAULT/tree/main" rel="noopener noreferrer"&gt;https://github.com/0x57Origin/RE_VAULT/tree/main&lt;/a&gt;&lt;br&gt;&lt;br&gt;
Email for solutions or questions:&lt;br&gt;&lt;br&gt;
&lt;strong&gt;&lt;a href="mailto:0x57Origin@proton.me"&gt;0x57Origin@proton.me&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>c</category>
      <category>cybersecurity</category>
      <category>programming</category>
    </item>
    <item>
      <title>I built a beginner-friendly reverse engineering challenge using Ghidra</title>
      <dc:creator>0x57Origin</dc:creator>
      <pubDate>Sun, 30 Nov 2025 05:40:45 +0000</pubDate>
      <link>https://forem.com/0x57origin/i-built-a-beginner-friendly-reverse-engineering-challenge-using-ghidra-5hl8</link>
      <guid>https://forem.com/0x57origin/i-built-a-beginner-friendly-reverse-engineering-challenge-using-ghidra-5hl8</guid>
      <description>&lt;h3&gt;
  
  
  Spoiler Warning: The breakdown below explains how each challenge works. If you want to attempt it blind, stop reading after the GitHub link.
&lt;/h3&gt;

&lt;p&gt;I spent the weekend putting together a small reverse engineering project, and honestly, it turned out way better than I expected. When I first got into reversing, I kept running into the same problem: everything online was either too advanced or too boring. So I decided to build something simple enough for beginners, but still fun to dig through with Ghidra.&lt;/p&gt;

&lt;p&gt;The project is called Flag Hunt, and it is up on GitHub here:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;a href="https://github.com/0x57Origin/Flag_Hunt" rel="noopener noreferrer"&gt;https://github.com/0x57Origin/Flag_Hunt&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;The whole idea is to give people a small binary they can load into Ghidra and actually learn something in the first 10 minutes instead of feeling lost. It is a short C program with five tiny challenges, each one teaching a concept you will see over and over again in real reverse engineering work.&lt;/p&gt;

&lt;p&gt;Challenge 1: The warmup&lt;/p&gt;

&lt;p&gt;The first challenge is about as simple as it gets. The program asks for a 4 digit PIN, and the PIN is literally hardcoded in the binary. This teaches one of the first things every beginner learns: check the strings. Ghidra practically hands you the answer. It is silly and easy, but it warms you up for the next steps.&lt;/p&gt;

&lt;p&gt;Challenge 2: Understanding XOR&lt;/p&gt;

&lt;p&gt;After that, things get more interesting. The program checks a password, and if you get it right, it calls a decoding function. This is where beginners usually freeze up, but you do not need to be a genius. You just look at how the function works. It loops through each byte and XORs it with one key. Once you spot that pattern, you can write a five line Python script and decode the flag yourself. That feeling when the readable text appears is addictive.&lt;/p&gt;

&lt;p&gt;Challenge 3: A tiny math puzzle&lt;/p&gt;

&lt;p&gt;The third challenge checks three integers against a couple of equations. At first it looks confusing, but it is not a math test. It teaches you to slow down and read the conditions. You do not need calculus. You can brute force the values or solve them by hand. This builds confidence with condition logic, which is something you use constantly in reverse engineering.&lt;/p&gt;

&lt;p&gt;Challenge 4: Custom hashing&lt;/p&gt;

&lt;p&gt;Now it gets fun. Instead of comparing your input directly, the program hashes it with a custom function. When I first learned reversing, custom hash functions always scared me. But once you decompile it and see the logic, copying it into Python and brute forcing the right word is not as hard as it looks. This challenge teaches patience and pattern recognition.&lt;/p&gt;

&lt;p&gt;Challenge 5: Final phrase&lt;/p&gt;

&lt;p&gt;The last challenge is simple once you beat the others. It checks a final phrase, then decodes the last encoded flag. By now, you already know how to decode it because the earlier challenges prepared you for it.&lt;/p&gt;

&lt;p&gt;I built this whole project to help people get comfortable with Ghidra without feeling overwhelmed. The decompiler does most of the heavy lifting. You just need curiosity and patience. If you want to try it, grab the project from GitHub, load the binary into Ghidra, and see how far you can get before peeking at the walkthrough.&lt;/p&gt;

&lt;p&gt;It is honestly one of the best ways to learn reverse engineering from scratch.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>programming</category>
    </item>
    <item>
      <title>Inside DBIR 2025: Why Vulnerability Exploits &amp; Credential Abuse Are Dominating Breaches</title>
      <dc:creator>0x57Origin</dc:creator>
      <pubDate>Fri, 28 Nov 2025 07:18:29 +0000</pubDate>
      <link>https://forem.com/0x57origin/inside-dbir-2025-why-vulnerability-exploits-credential-abuse-are-dominating-breaches-8c0</link>
      <guid>https://forem.com/0x57origin/inside-dbir-2025-why-vulnerability-exploits-credential-abuse-are-dominating-breaches-8c0</guid>
      <description>&lt;h2&gt;
  
  
  &lt;strong&gt;The 2025 Breach Landscape: Biggest Dataset in DBIR History&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The 2025 Verizon Data Breach Investigations Report (DBIR) analyzed the largest volume of breach data ever recorded** in the history of the report. Verizon said:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;22,000+ security incidents&lt;/li&gt;
&lt;li&gt;12,195 confirmed data breaches&lt;/li&gt;
&lt;li&gt;Victims spanning 139 countries&lt;/li&gt;
&lt;li&gt;Data contributed by nearly 100 cybersecurity organizations&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This year’s dataset is important because it reflects a major shift in attacker behavior.&lt;br&gt;
Over the last 2–3 years, software vendors have unintentionally expanded the global attack surface through weak edge-device security, misconfigured cloud services, and delayed patching cycles.&lt;/p&gt;

&lt;p&gt;What used to be occasional vendor mistakes has now transformed into what the report calls:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;“a widespread and insidious problem that can have a devastating effect on enterprises.”&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;For defenders, that means breaches are no longer isolated events; they’re happening at a scale and speed that’s fundamentally different from previous years.&lt;/p&gt;

&lt;h3&gt;
  
  
  The Three Major Initial Access Vectors (Credentials, Exploitation, Phishing)
&lt;/h3&gt;

&lt;p&gt;The DBIR 2025 data indicates that most breaches continue to originate from the same three entry points. The percentages shift slightly year to year, but the pattern stays consistent:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Stolen credentials -&amp;gt; 22%&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Exploitation of vulnerabilities -&amp;gt; 20%&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Phishing/social engineering -&amp;gt; 16%&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These three techniques comprise a significant portion of initial access events across nearly every industry.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Credential Abuse (22%)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Credential-based attacks continue to be the single most common way intruders enter a system. Victims usually don’t notice anything unusual because the activity looks like a normal login.&lt;/p&gt;

&lt;p&gt;A few points the report highlights:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Many stolen credentials come from older breaches.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some are reused across multiple accounts.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Secrets leaked on GitHub or other repos take a median of 94 days to be remediated.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In many cases, the origin of the stolen credential is never discovered.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The main takeaway:&lt;/strong&gt;&lt;br&gt;
Attackers don’t need an exploit when they can simply log in.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Exploitation of Vulnerabilities (20%)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is the category with the biggest jump compared to last year, up 34%.&lt;/p&gt;

&lt;p&gt;The most notable change is where the exploitation is happening:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Edge devices&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;VPN appliances&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Public-facing services&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The DBIR notes that exploitation against edge devices and VPNs went from 3% last year to 22% this year. That’s nearly an eight-fold increase.&lt;/p&gt;

&lt;p&gt;Patching is a clear issue:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Only 54% of edge vulnerabilities were fully remediated.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Median time to patch: 32 days.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;That one-month gap is the opportunity window that attackers take advantage of.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;3. Phishing &amp;amp; Pretexting (16%)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Phishing is still one of the most reliable ways attackers steal credentials or trick employees into granting access. It didn’t disappear; it simply settled into a stable percentage while other attack methods grew.&lt;/p&gt;

&lt;p&gt;This year’s changes include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;More MFA prompt bombing&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;More Adversary-in-the-Middle (AiTM) login capture&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;More malicious software downloads through poisoned search results&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Increased state-sponsored social engineering activity&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Notably:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;52% of social engineering breaches had an espionage motivation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;55% had a financial motivation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some nation-state groups were involved in both types of operations.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Overall, social engineering remains a dependable way for attackers to bypass defenses when technical controls fail.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why These Three Methods Dominate&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The DBIR doesn’t frame it dramatically. The explanation is straightforward:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Credentials are easy to steal or purchase.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Exploits scale well with automation.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Phishing works because humans make mistakes.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Together, these three methods explain most of the initial access cases seen in 2024–2025 data.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Ransomware Growth, Human Error, and the Shift Toward Third-Party Breaches&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The DBIR 2025 numbers show three major trends that shaped most breaches this year:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Ransomware is increasing again, human involvement is staying high, and third-party breaches are doubling.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Each of these has different causes, but together they paint a clear picture of how attackers operate today.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;1. Ransomware in 44% of Breaches (Up 37% From Last Year)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Ransomware continues to be one of the most common outcomes after attackers gain access. The report shows:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;44% of all breaches involved ransomware (with or without encryption)&lt;/li&gt;
&lt;li&gt;Up from 32% last year&lt;/li&gt;
&lt;li&gt;A 37% increase&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Even with the rise, ransom payments have started to drop:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Median payment: $115,000 (down from $150,000)&lt;/li&gt;
&lt;li&gt;64% of organizations refused to pay -&amp;gt; (this was only 50% two years ago)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;One interesting detail is the difference between large companies and small ones:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Large orgs: ransomware in 39% of breaches&lt;/li&gt;
&lt;li&gt;Small orgs: ransomware in 88% of breaches&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Small businesses continue to get hit hardest because they lack patching speed and detection.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;2. Human Involvement in Breaches Remains High (60%)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Despite more MFA, more training, and better tools, the human element remains a major factor:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;60% of breaches involved some type of human action&lt;/li&gt;
&lt;li&gt;Last year: 61%&lt;/li&gt;
&lt;li&gt;Essentially unchanged&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The report breaks down human-driven errors into categories:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Phishing / Social engineering → stolen credentials&lt;/li&gt;
&lt;li&gt;Misconfiguration or mistakes&lt;/li&gt;
&lt;li&gt;Downloading or installing malware&lt;/li&gt;
&lt;li&gt;Interacting with malicious MFA prompts&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The overlap between social engineering and credential abuse is significant. A phishing email may steal the credentials, but the breach is then logged as credential misuse.&lt;/p&gt;

&lt;p&gt;The DBIR emphasizes that many orgs now have two chances to stop the attacker:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;During the social engineering attempt&lt;/li&gt;
&lt;li&gt;During the credential misuse attempt&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;But most still miss both.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;3. Third-Party Breaches Doubled (15% → 30%)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This is one of the more concerning shifts in the dataset.&lt;/p&gt;

&lt;p&gt;DBIR reports that breaches involving third-party access or systems doubled in the last year:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;15% last year&lt;/li&gt;
&lt;li&gt;30% this year&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Major reasons:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Credential reuse across environments&lt;/li&gt;
&lt;li&gt;Contractors with overly broad access&lt;/li&gt;
&lt;li&gt;Supply chain exposures&lt;/li&gt;
&lt;li&gt;Secrets leaked in external repositories&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A standout datapoint:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Median time for an organization to fix leaked secrets on GitHub: 94 days.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;That’s nearly three months of exposure.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;4. Espionage-Motivated Breaches Rising (17%)&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Another shift this year is the increase in espionage-focused attacks:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;17% of breaches now involve espionage&lt;/li&gt;
&lt;li&gt;Many tied to state-sponsored actors&lt;/li&gt;
&lt;li&gt;Heavy use of zero-days and edge-device vulnerabilities&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The report mentions that around 28% of incidents involving state actors included a financial motive, meaning certain groups are now mixing intelligence gathering and revenue generation.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;5. MFA Bypass Techniques: Prompt Bombing, Token Theft, AiTM&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This year had enough data to analyze MFA bypass methods clearly:&lt;/p&gt;

&lt;p&gt;Top techniques seen:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Prompt bombing (MFA fatigue)&lt;/li&gt;
&lt;li&gt;Token theft&lt;/li&gt;
&lt;li&gt;Adversary-in-the-Middle (AiTM)&lt;/li&gt;
&lt;li&gt;SIM swapping and account hijacking&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Microsoft 365 telemetry showed:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;40% of attacks had suspicious logins&lt;/li&gt;
&lt;li&gt;31% came from token theft&lt;/li&gt;
&lt;li&gt;MFA interrupt (push fatigue) is also significant&lt;/li&gt;
&lt;li&gt;AiTM present but less common&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The point is: MFA helps, but attackers now adjust to whichever part of MFA is weakest.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Conclusion: What the 2025 DBIR Really Tells Us&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;The numbers in the 2025 DBIR point to something straightforward:&lt;br&gt;
attackers aren’t getting “more creative,” they’re getting more efficient.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Stolen credentials are still an easy way in.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Unpatched edge devices are now one of the fastest-growing targets.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Phishing continues to work because human behavior doesn’t change as fast as technology.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ransomware keeps showing up because it still makes attackers money.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Third-party weak spots are becoming the new normal.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;State-sponsored groups are mixing intelligence work with financial crime.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Nothing in the report suggests attackers are slowing down.&lt;br&gt;
What is changing is the speed of exploitation, the automation behind attacks, and the shrinking gap between vulnerability disclosure and real-world exploitation.&lt;/p&gt;

&lt;p&gt;The takeaway is simple:&lt;/p&gt;

&lt;p&gt;Organizations that don’t patch their edge devices, don’t rotate secrets, and don’t train employees will end up in next year’s statistics.&lt;br&gt;
The attackers are adapting, so defenders have to move just as fast.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>ai</category>
      <category>algorithms</category>
      <category>computerscience</category>
    </item>
  </channel>
</rss>
