Saturday, March 29, 2025
HomeCyber AttackCyber Attack Defenders Up For Battle: Huge Uptick In Timely Detections

Cyber Attack Defenders Up For Battle: Huge Uptick In Timely Detections

Published on

SIEM as a Service

Follow Us on Google News

Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised systems. This is achieved by targeting unmonitored devices, leveraging legitimate tools, and exploiting zero-day vulnerabilities

While defenders are improving detection speed (dwell time decreased from 16 to 10 days), this is partly due to faster ransomware identification and adversary-in-the-middle and social engineering tactics to bypass multi-factor authentication

Cloud infrastructure is under attack, with attackers even leveraging cloud resources. Both red and purple teams are exploring AI for better security outcomes as they analyze these trends and offer mitigation strategies to the security community.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

In 2023, more than half of compromised organizations learned of the incident from an external source, most commonly through a ransom demand from the attacker (70% for ransomware-related intrusions). 

Ransomware External Notification Source, 2023

It suggests improved internal detection capabilities, as the percentage of externally notified intrusions decreased compared to 2022 (54% vs. 63%).

Ransomware events are most often discovered externally (70%), with attacker ransom notes being the dominant notification method (75% of externally discovered ransomware intrusions). 

Investigations into ransomware attacks are on the rise again, reaching 23% of all investigations in 2023, surpassing the 2022 numbers and matching the 2021 levels.

Organizations are also becoming faster at detecting ransomware than other intrusions, with a median detection time of just 5 days in 2023. 

Global Median Dwell Time by Detection Source

The improvement is seen across the board, with internal detection dropping to 6 days and external notification leading to a 5-day detection window.

Overall, dwell time (time attackers remain undetected) continues to decrease, highlighting the urgency of rapid response to security incidents. 

Mandiant’s 2023 incident response investigations showed financial, business, and professional services, high tech, retail and hospitality, and healthcare as the most targeted industries. 

Global Industries Targeted, 2023

These sectors hold sensitive data like PII, PHI, and financial information, and the most typical initial infection vector was an exploit (38%), followed by phishing (17%) and prior compromises (15%). This suggests that attackers are increasingly using exploits and leveraging existing network breaches to gain access.

There was a rise in financially motivated cyberattacks in 2023, with ransomware being the most common culprit. Data theft also remained prevalent, though slightly less frequent than in 2022. 

In some cases, stolen data was directly sold for extortion, while other attackers used a combination of data theft, ransomware deployment, and extortion threats.

Data breaches involving intellectual property and targeted theft by espionage groups were also identified. 

Observed Threat Groups by Goal, 2023

They tracked a vast number of threat actors, encountering over 300 unique groups during incident response in 2023. A significant portion (719) were newly identified, with over half exhibiting financial motivations. 

It aligns with the rise in ransomware observed in 2023, as espionage and other objectives saw a modest decline, while a substantial number (36%) remains challenging to categorize definitively due to limited evidence. 

In 2023, a consistent distribution of malware categories was observed, with backdoors (33%), downloaders (16%), droppers (15%), credential stealers (7%), and ransomware (5%) being the top five. 

Credential stealers re-entered the top five in 2023, while ransomware families decreased from 7% in 2022 to 5% in 2023. This suggests a rise in preexisting ransomware strains like LOCKBIT, ALPHV, BASTA, and ROYALLOCKER.

Combat Email Threats with Easy-to-Launch Phishing Simulations: Email Security Awareness Training -> Try Free Demo 

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Gamaredon Hackers Weaponize LNK Files to Deliver Remcos Backdoor

Cisco Talos has uncovered an ongoing cyber campaign by the Gamaredon threat actor group,...

“Crocodilus” A New Malware Targeting Android Devices for Full Takeover

Researchers have uncovered a dangerous new mobile banking Trojan dubbed Crocodilus actively targeting financial...

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

From WannaCry to the MGM Resorts Hack, ransomware remains one of the most damaging...

Hackers Exploit DNS MX Records to Create Fake Logins Imitating 100+ Brands

Cybersecurity researchers have discovered a sophisticated phishing-as-a-service (PhaaS) platform, dubbed "Morphing Meerkat," that leverages...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

DeBackdoor: A Framework for Detecting Backdoor Attacks in Deep Learning Models

Deep learning models, increasingly integral to safety-critical systems like self-driving cars and medical devices,...

Kuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M Ransom

Kuala Lumpur International Airport (KLIA), one of Southeast Asia's busiest airports, was hit by...

Blacklock Ransomware Infrastructure Breached, Revealing Planned Attacks

Resecurity, a prominent cybersecurity firm, has successfully exploited a vulnerability in the Data Leak...