You are here

Visualized: How Cyberattackers Gain Access

Published

6 minutes ago

on

February 17, 2026

| 2,468 views

-->

By

Ryan Bellefontaine

Graphics & Design

  • Abha Patil
  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • Pinterest
  • Email

The following content is sponsored by Palo Alto

How Cyberattackers Gain Access

Key Takeaways

  • Identity weaknesses show up in 90% of Unit 42 investigations, so identity is a top control point.
  • Identity-driven techniques drive 65% of initial access, led by social engineering and credential misuse.
  • Excess permissions and token abuse help attackers move faster, so least privilege and session hardening matter.

Most breaches don’t start with a rare software exploit. Instead, attackers often gain access by taking over identity and using it like a master key.

This graphic, in partnership with Unit 42 by Palo Alto Networks, shows how cyberattackers gain access by exploiting identity paths, based on data from Unit 42 incident-response investigations.

Identity Is the Practical Perimeter

Here is a table that summarizes the main identity-driven routes attackers use to gain access.

Initial Access 1 Initial Access 2 Initial Access 3 Percentage
Other Other Other 35%
Identity-based techniques Identity-based social engineering Identify-based phishing 22%
Identity-based techniques Identity-based social engineering Other social engineering 11%
Identity-based techniques Credential misuse and brute force Credential misuse 13%
Identity-based techniques Credential misuse and brute force Brute force 8%
Identity-based techniques Identity policy and insider risk Insider threats 8%
Identity-based techniques Identity policy and insider risk IAM misconfigurations 3%

In the past year, Unit 42 found identity weaknesses played a material role in 90% of investigations. As SaaS and cloud use grow, identity now acts as the perimeter.

Here, “identity-driven” specifically means abusing credentials, sessions, multi-factor workarounds, or permissions to look legitimate. Because that activity blends in, defenders often lose precious time.

The Way In: Identity-Driven Initial Access

Identity-based techniques drive 65% of initial access in Unit 42’s casework. However, many organizations still focus more on patching than authentication, and many still repeat common cybersecurity mistakes that attackers exploit.Social engineering leads at 33%, including phishing designed to bypass MFA and hijack sessions. Meanwhile, credential misuse and brute-force attacks account for 21%, and policy or insider abuse accounts for 11%.

The Way Through: Identity Turns Access Into Impact

Once attackers log in, they can escalate privileges and move laterally with fewer alarms. In turn, Unit 42 found 99% of 680,000 cloud identities held excessive permissions.

Token theft and risky OAuth grants also let adversaries persist without repeated logins. Consequently, one over-privileged human or machine identity can expand the blast radius quickly.

Countermeasures That Disrupt Identity Attacks

Start with phishing-resistant MFA such as passkeys or FIDO2 keys for high-value roles. Next, rotate machine credentials, shorten sessions, and shift admins to just-in-time elevation.

You can also connect identity telemetry across cloud and SaaS to spot unusual access chains sooner.

See why cyberattacks are getting 4x faster

Related Topics: #social engineering #cyber intrusions #phishing #cyberattacks #technology

Click for Comments

var disqus_shortname = "visualcapitalist.disqus.com";
var disqus_title = "Visualized: How Cyberattackers Gain Access";
var disqus_url = "https://www.visualcapitalist.com/sp/pal01-how-cyberattackers-gain-access/";
var disqus_identifier = "visualcapitalist.disqus.com-195539";

You may also like

  • Technology8 months ago

    Ranked: The World’s Most Common Passwords

    Explore the most common passwords globally, and see why predictable choices make accounts vulnerable to hacking.

  • Cities3 years ago

    Ranked: The World’s Most Surveilled Cities

    The world’s most surveilled cities contain hundreds of thousands of cameras. View this infographic to see the data in perspective.

  • Privacy5 years ago

    Mapped: The Top Surveillance Cities Worldwide

    Which cities have the most CCTV cameras? This map reveals the top surveillance cities worldwide in terms of the prevalence of CCTV cameras.

  • Maps6 years ago

    Mapped: The State of Facial Recognition Around the World

    Mass surveillance is becoming the status quo. This map dives into the countries where facial recognition technology is in place, and how it’s used.

  • Technology6 years ago

    Why Biometric Security is the Future

    Buoyed by innovation and user-friendly experiences, biometric security measures will soon be a mainstream method of keeping your online accounts safe.

  • Privacy7 years ago

    Visualizing Internet Suppression Around the World

    Freedom of speech on the internet has been on decline for eight consecutive years. We visualize the death spiral to show who limits speech the most.

Subscribe

Please enable JavaScript in your browser to complete this form.Join 375,000+ email subscribers: *Sign Up