New CrowdStrike Report Finds an Increase in Cyber Adversaries Turning to Business Disruption as Main Attack Objective
CrowdStrike Services Cyber Front Lines Report offers observations gained from the front lines of incident response and proactive services and insights for 2020
The CrowdStrike Services Report offers all-encompassing investigative analysis into IR investigations in multiple countries, regions and industry sectors, and references the MITRE ATT&CK™ framework, offering best practices for organizations looking to improve cyber defenses. It reveals that over the course of 2019, 36% of the incidents that Services investigated were most often caused by ransomware, destructive malware or denial of service attacks, revealing that business disruption was often the main attack objective of cyber criminals. Another notable finding in the report shows a large increase in dwell time to an average of 95 days in 2019 — up from 85 days in 2018 — meaning that adversaries were able to hide their activities from defenders for longer, and that organizations still lack the technology necessary to harden network defenses, prevent exploitation and mitigate cyber risk.
Other notable findings include:
- Third-party compromises serve as a force multiplier for attacks. Threat actors are increasingly targeting third-party service providers to compromise their customers and scale attacks.
- Attackers are targeting cloud infrastructure as a service (IaaS). Threat activity around application programming interface (API) keys for public cloud-based infrastructure has become more targeted as attackers increase their ability to rapidly and systematically harvest information assets.
- Macs are now clearly in the crosshairs of the cyber fight. Threat actors are increasingly targeting macOS environments, “living off the land” with native applications and capitalizing on less widely used security tools compared to Windows systems in the same organization, which have more security tools in place.
- Patching remains a problem. Basic hygiene still matters, and even though organizations have gotten better at patching, the factors that make patching a challenge have become more complex.
- How prevention is configured impacts its effectiveness. The report finds that many organizations fail to leverage the capabilities of the tools they already have. The failure to enable critical settings not only leaves organizations vulnerable but also gives them a false sense of security.
The report found that organizations that meet the
“The CrowdStrike Services Cyber Front Lines Report offers organizations valuable takeaways to increase proactive security measures aimed at creating a more cyber-resilient environment. As adversaries are stealthier than ever, with new attack vectors on the rise, we must remain agile, proactive and committed to defeat them. They still seek the path of least resistance — as we harden one area, they focus on accessing and exploiting another,” said
To download a copy of the CrowdStrike Services Cyber Front Lines Report, please visit the
Please visit the
About
With
There’s only one thing to remember about
Qualifying organizations can gain full access to Falcon Prevent™ by starting a free trial.
Learn more: https://www.crowdstrike.com/
© 2020
View source version on businesswire.com: https://www.businesswire.com/news/home/20200114005195/en/
Source:
CrowdStrike, Inc.
Ilina Cashiola, 202-340-0517
Ilina.cashiola@crowdstrike.com