Attackers dwelling in compromised networks for months


By Dylan Bushell-Embling
Wednesday, 22 April, 2020

Attackers dwelling in compromised networks for months

Security teams are still struggling to cut down the time attackers spend infiltrating enterprise networks, with hackers routinely dwelling inside compromised networks for 100 days or more.

A survey conducted by Attivo Networks found that 64% of respondents felt that 100 days of dwell time — the timespan between an attacker entering a network and the organisation detecting them — seemed accurate or was too low.

In addition, 22% of respondents stated that they are not tracking dwell time statistics at all, up 7% from last year.

The survey also found that user networks and endpoints are the top concerns for 65% of respondents. Securing the cloud is also a high priority concern among 63% of respondents.

The top attacks concerning defenders remain malware and ransomware. This trend was significantly pronounced among industries most sensitive to data loss or interruptions to normal operations, such as health care, education, energy and utilities, and legal and professional services.

But enterprises are also increasingly adopting security technologies. Respondents believe attackers are most vexed by technologies including traffic analysis (44%), deception technology (40%) and next-generation firewalls (40%).

Meanwhile, three in four respondents have adopted some form of standardised security framework, with the most popular choices being the NIST cybersecurity framework (45%) and the ISO 27000 family of standards (37%).

“Much of this year’s research indicates a continued demand for in-network detection that works reliably across existing and emerging attack surfaces and is effective against all attack vectors,” Attivo Networks Chief Deception Officer Carolyn Crandall said.

“Reducing dwell time has also become an increased focus, as well as adopting technologies that detect attackers inside the network early and accurately. A multilayered strategy of complementary security controls that include new solutions like deception technology is proving to create the most effective control.”

Image credit: ©stock.adobe.com/au/Leo Lintang

Related News

Commvault arranges to buy Appranix

Cyber resilience provider Commvault plans to leverage its acquisition of Appranix to help...

Fujitsu establishes security consulting division

Fujitsu's new digital security consulting division will help organisations prepare for and...

Unstoppable Domains joins GlobalBlock initiative

Web3 domain name service provider Unstoppable Domains has joined the GlobalBlock initiative to...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd