CrowdStrike sees lines blur

Written by Mark Evans
07/12/2017

The lines between nation-state sponsored attack groups and criminals is blurring, with both groups utilising similar tactics such as fileless malware and “living off the land” techniques involving processes native to the Windows operating system, including PowerShell and WMI (Windows Management Instrumentation).

The trend has been revealed in CrowdStrike’s Annual Cyber Intrusion Services Casebook, covering its information on attacks.

The report also has noted that the number of days between the first evidence of a compromise and its initial detection (the dwell time) is now 86 days and that malware is often self-propogating, using variants to spread once a system is infected.

However, it also reports that companies are getting better at self-detection, with 68 per cent of the reviewed cases able to internally identify the breach. This represents an 11 perc ent increase over prior years.

Related Articles

Welcome to National Technology News
National Technology News Editor Anthony Strzalek discusses the role of technology, its impact and what we could expect over the next 12 months
Most read stories...
World Markets (15 minute+ time delay)
FTSE
7,490.57
+42.45
S&P 500
2,675.81
+23.80
Nikkei 225
22,553.22
-141.23