Cyber attack: top five industries at risk


Tuesday, 27 September, 2022

Cyber attack: top five industries at risk

CrowdStrike has released the fourth Nowhere to Hide: 2022 Falcon OverWatch Threat Hunting Report. The global report reveals a record 50% year-over-year (YoY) increase in hands-on intrusion attempts, and distinct changes in attack trends and adversary tradecraft.

Most notably, Falcon OverWatch threat hunters identified more than 77,000 potential intrusions, or approximately one potential intrusion every seven minutes. These are instances where proactive, human-led threat hunting uncovered adversaries actively carrying out malicious techniques at various stages of the attack chain, despite attackers’ best efforts to covertly evade autonomous detection methods.

Falcon OverWatch calculated that the breakout time (the average time it takes an adversary to move laterally from initial compromise to other hosts within the victim environment) for eCrime adversaries has fallen to one hour and 24 minutes (from one hour and 38 minutes). The report has also found that in approximately one-third (30%) of those eCrime intrusions, the adversary was able to move laterally in under 30 minutes. These findings underline the speed and scale at which threat actors evolve their tactics, techniques and procedures (TTPs), and are capable of bypassing even the most sophisticated technology-based defence systems to successfully achieve their goals.

“Over the past 12 months, the world has faced new challenges spurred by economic pressures and geopolitical tensions, backdropping a threat landscape that is as complicated as ever,” said Param Singh, Vice President, Falcon OverWatch at CrowdStrike.

“To thwart brazen threat actors, security teams must implement solutions that proactively search for hidden and advanced attacks every hour of every day. The combination of the CrowdStrike Falcon platform with the telemetry, tooling, threat intelligence and human ingenuity of Falcon OverWatch managed threat hunting protects organisations globally against the most sophisticated and stealthy threats.”

Other key findings from the report include:

  • eCrime is the top threat type for interactive intrusion campaigns. eCrime accounted for 43% of interactive intrusions, while state-nexus actors accounted for 18% of activity. Hacktivists accounted for just 1% of interactive intrusion campaigns, with the remaining intrusions unattributed.
  • Adversaries continue shifting away from malware. Malware-free threat activity accounted for 71% of all detections. The predominance of malware-free activity is related, in part, to adversaries’ prolific abuse of valid credentials to facilitate access and persistence in victim environments. Another factor is the rate at which new vulnerabilities are being disclosed and the speed with which adversaries are able to operationalise exploits.
  • Technology is the top industry targeted for interactive intrusions. The top five industries targeted overall were technology (19%), telecommunications (10%), manufacturing (7%), academic (7%) and health care (7%). Of note, technology was targeted 90% more frequently by interactive intrusions than the second-most targeted industry.
  • Telecommunications is the top industry for targeted intrusions by nation-state actors. The top five industries targeted overall were telecommunications (37%), technology (14%), government (9%), academic (5%) and media (4.5%). The telecommunications industry continues to be preyed on for fulfillment of state-sponsored surveillance, intelligence and counterintelligence collection priorities. Of note, telecommunications faced 163% more targeted intrusions by state-nexus actors than the second-most targeted industry.
  • Health care finds itself in the crosshairs of ransomware as a service (RaaS). The volume of attempted interactive intrusions against the healthcare industry has doubled year over year. A significant majority of these intrusions have been attributed to eCrime.
     

Image credit: iStock.com/BlackJack3D

Related News

Cobalt Iron earns patent on analytics-based dynamic authorisation control

Cobalt Iron says its patent introduces approaches that provide more dynamic control of...

Macquarie Government selected for Australian Defence procurement panel

Macquarie was added to the ICTPA panel following a long history of supporting Australian...

Fujitsu establishes security consulting division

Fujitsu's new digital security consulting division will help organisations prepare for and...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd