Business Disruption Becoming Main Attack Objective For More Adversaries According to a report by US-based cybersecurity firm CrowdStrike, 36 per cent of all incidents it investigated in 2019 had business disruption as their main objective. These attacks were largely caused by ransomware, destructive malware or DoS attacks.
Opinions expressed by Entrepreneur contributors are their own.
You're reading Entrepreneur India, an international franchise of Entrepreneur Media.
Over the last few decades, as more and more of the world has gone digital, there has been an obvious increase in the amount of cyber security threats as well. As is the case with most things connected to the internet, the chances of a system breach has kept getting higher as adversaries have found newer, better ways to carry out their nefarious tasks.
According to a report by US-based cybersecurity firm CrowdStrike, 36 per cent of all incidents it investigated in 2019 had business disruption as their main objective. These attacks were largely caused by ransomware, destructive malware or Denial of Service (DoS) attacks.
In 51 per cent of all intrusions, the report found that malware-free techniques were used. In 22 per cent of cases investigated, both malware-free and malware-based ones were used in concert.
Self-Identification and Dwell Time
An important finding of the report was that dwell time, which represents the period from when a compromise happens to the time it is detected, increased significantly in 2019. Last year, the average dwell time turned out to be 95 days, up from 85 a year earlier. This number had, in fact, come down slightly in 2018, from 86 days in 2017.
CrowdStrike also observed that several breaches were by those that gained initial access more than a year before discovery, and in a number of cases, more than three years.
"This demonstrates the need for better visibility and for implementing proactive threat hunting to uncover attacks early," the report stated.
It found that state-sponsored threat actors were applying countermeasures, allowing them to remain undetected for a long period of time, especially in environments protected by legacy security tech.
However, despite the dwell time increase, the report found that there has been a steady increase in the number of organizations that are now self-detecting a breach. From 68 per cent in 2017, the number had grown to 79 per cent last year.
What Organizations Must Be Careful About
The report found that attacks on third party service providers were on the rise as these could result in compromising their clients' data and scale the attack size. Attackers were also targeting cloud infrastructure providers to help them get access to more information rapidly, it stated.
Many organizations, despite having tools to safeguard themselves, have failed to leverage those. CrowdStrike observed that this failure not only leaves organizations vulnerable, it also gives them a false sense of security.
While business disruption came right on top when it comes to attack impacts, data theft followed right behind. It was observed in 25 per cent of all breaches the company investigated. Data theft includes the theft of intellectual property (IP), personally identifiable information (PII) and personal health information (PHI).
The report said: "IP theft has been linked to numerous nation-state adversaries that specialize in targeted intrusion attacks. PII and PHI data theft can enable both espionage and criminally motivated operations. Typically, this type of data may be used by a cyber espionage actor to build a dossier on a high-profile target, or a cybercriminal may sell or ransom the information."
Monetary loss occupied 10 per cent of the chart in terms of attack impacts. Attacks in this category this year include include crimeware, formjacking, cryptojacking among others.