Hackers Can Hide In Systems For 11 Days

Share post:

A report by the market research firm Sophos revealed that cyberattackers have 11 days after breaching a target network before they are discovered, and most often the detection happens due to the use of ransomware.

This number of days is more than enough for hackers to get a complete overview of a corrupted network, its weaknesses, and how to damage it.

Sophos explains the short dwell time in its incident response data, where 81% of the incidents it helped customers with involved ransomware attacks, which is a loud attack that immediately triggers an alarm for tech departments.

Other attacks include data theft, cryptominers, banking trojans, data wipers, and the use of penetration testing tools such as Cobalt Strike.

Another issue is the widespread attacks of the Remote Desktop Protocol, whereby 30% of attacks on RDP and 69% are carried out with RDP. Attacks on RDP are primarily used to initiate ransomware operations.

Also, phishing became the gateway for 12% of attacks, while 10% involved exploiting an unpatched system.

Sophos also came up with a list of the most widespread ransomware groups.

According to Sophos, REvil (aka Sodinokibi), was the most active ransomware threat in 2020 along with Ryuk, who has made an estimated $150 million through ransomware.

Other large ransomware groups include Dharma, Maze, Ragnarok, and Netwalker.

For more information, read the original story in ZDNet.

SUBSCRIBE NOW

Related articles

Cloudflare Launches Open Source Tool for Secure, Keyless SSH Authentication

Cloudflare has released an open-source tool called OPKSSH (OpenPubkey SSH), which allows developers and IT teams to use...

US Defence Contractor Fined 4.6 Million For Failing To Meet Cyber Security Requirements.

A U.S. defence contractor, MORSE Corp, has agreed to pay $4.6 million to settle allegations of failing to...

Tech Aide on U.S. Government Efficiency Team Linked to Cybercrime Group

A 19-year-old staffer working on the U.S. Department of Government Efficiency (DOGE) initiative has been linked to a...

Top U.S. Security Officials Have Even More Data Exposed Through Public Apps, Chats, and Data Leaks

A new investigation has revealed that personal information belonging to senior U.S. security officials — including active phone...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways