Most cyber intrusions lead to follow-up attacks


By Dylan Bushell-Embling
Friday, 11 December, 2020

Most cyber intrusions lead to follow-up attacks

More than two-thirds of organisations that fell victim to an intrusion in 2020 experienced an additional intrusion attempt, according to the latest annual CrowdStrike Services Cyber Front Lines Report.

Based on an analysis of CrowdStrike’s global incident response and proactive services teams in 2020, the report found that intrusions are no longer a one-time event.

Among customers who had experienced an intrusion before leveraging CrowdStrike to manage their endpoint protection efforts, 68% experienced another intrusion attempt, which was prevented.

Meanwhile, the report found that misconfigured security software leaves organisations exposed. In at least 30% of incident response engagements, CrowdStrike found that the target organisation’s antivirus solutions were either incorrectly configured with weak prevention settings or not fully deployed across the environment.

Antivirus protection also failed to prevent an intrusion in 40% of incidents, in which either malware was undetected or a portion of the attack sequence was missed by antivirus tools.

The report also found a “staggering increase” in the volume and velocity of financially motivated attacks as many organisations were forced to rapidly adapt to remote work during COVID-19.

Of these, 81% involved the deployment of ransomware, while only 19% included e-crime attacks such as point-of-sale intrusions, e-commerce website attacks, business email compromise and cryptocurrency mining.

“Remote work has redefined the playing field between cyber attackers and defenders, and that’s clearly demonstrated in the CrowdStrike Services Cyber Front Lines Report. Corporate networks now span both office and home, providing a wealth of new attack surfaces and vectors that adversaries can exploit,” CrowdStrike Services CSO and President Shawn Henry said.

“Holistic coordination and continued vigilance are key in detecting and stopping sophisticated intrusions. Because of this, we’re seeing a necessary shift from one-off emergency engagements to continuous monitoring and response.”

Image credit: ©stock.adobe.com/au/ArtemSam

Related News

Tenable launches autonomous patch management tool

The new Tenable Patch Management add-on allows teams to prioritise and even automate the...

Veeam launches updated Veeam Data Platform

The newest release of the Veeam Data Platform introduces capabilities such as a recon scanner for...

CrowdStrike to buy Adaptive Shield

CrowdStrike is augmenting its SaaS security capabilities through the acquisition of Israeli-based...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd