CrowdStrike sees lines blur

The lines between nation-state sponsored attack groups and criminals is blurring, with both groups utilising similar tactics such as fileless malware and “living off the land” techniques involving processes native to the Windows operating system, including PowerShell and WMI (Windows Management Instrumentation).

The trend has been revealed in CrowdStrike’s Annual Cyber Intrusion Services Casebook, covering its information on attacks.

The report also has noted that the number of days between the first evidence of a compromise and its initial detection (the dwell time) is now 86 days and that malware is often self-propogating, using variants to spread once a system is infected.

However, it also reports that companies are getting better at self-detection, with 68 per cent of the reviewed cases able to internally identify the breach. This represents an 11 perc ent increase over prior years.

    Share Story:

Recent Stories


The future-ready CFO: Driving strategic growth and innovation
This National Technology News webinar sponsored by Sage will explore how CFOs can leverage their unique blend of financial acumen, technological savvy, and strategic mindset to foster cross-functional collaboration and shape overall company direction. Attendees will gain insights into breaking down operational silos, aligning goals across departments like IT, operations, HR, and marketing, and utilising technology to enable real-time data sharing and visibility.

The corporate roadmap to payment excellence: Keeping pace with emerging trends to maximise growth opportunities
In today's rapidly evolving finance and accounting landscape, one of the biggest challenges organisations face is attracting and retaining top talent. As automation and AI revolutionise the profession, finance teams require new skillsets centred on analysis, collaboration, and strategic thinking to drive sustainable competitive advantage.