CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region
Posted: Tuesday, Aug 08

i 3 Table of Contents

CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region
From KBI

Austin, Texas and Sydney, Australia โ€“ August 8, 2023ย โ€“ CrowdStrike (Nasdaq: CRWD), today announced the release of theย CrowdStrike 2023 Threat Hunting Report. The companyโ€™s sixth annual edition of the report, which covers attack trends and adversary tradecraft observed by CrowdStrikeโ€™s elite threat hunters and intelligence analysts, revealed a massive increase in identity-based intrusions, growing expertise by adversaries targeting the cloud, a 3x spike in adversary use of legitimate remote monitoring and management (RMM) tools, and a record low in adversary breakout time.
Covering adversary activity between July 2022 and June 2023, the report is the first to be published by CrowdStrikeโ€™s newly unveiled Counter Adversary Operations team, which was officially announced this week at Black Hat USA 2023.
Key findings from the report include:

  • Within the APJ region, technology companies were the most targeted, attracting 26% of all attacks, with telco (12%), retail (11%), financial services (8%) and manufacturing (7%) making up the rest of the top five.
  • Chinese adversariesย showed a strong interest in regional APJ targets, targeting 14 different industry types, compared to only 6 in the Americas and 2 in EMEA. Globally, North
  • Adversary breakoutย time hits an all-time low of 79 minutes: The average time it takes an adversary to move laterally from initial compromise to other hosts in the victim environment fell from the previous all-time low of 84 minutes in 2022 to a record 79 minutes in 2023. Additionally, the fastest breakout time of the year was recorded at just seven minutes.
  • The financial industryย saw a stunning 80% YoY increase in interactive intrusions: Defined as intrusions that use hands-on keyboard activity, interactive intrusions were up 40% overall.
  • Access Broker advertisementsย increase by 147% on criminal or underground communities: Ready access to valid accounts for sale lowers the barrier to entry for eCrime actors looking to conduct criminal operations and allow established adversaries to hone their post-exploitation tradecraft to achieve their objectives with more efficiency.

โ€œIn our tracking of over 215 adversaries in the past year, we have seen a threat landscape that has grown in complexity and depth as threat actors pivot to new tactics and platforms, such as abusing valid credentials to target vulnerabilities in the cloud and in software,โ€ย saidย Adam Meyers, head of Counter Adversary Operations at CrowdStrike.
โ€œWhen we talk about stopping breaches, we cannot ignore the undeniable fact that adversaries are getting faster and they are employing tactics intentionally designed to evade traditional detection methods. Security leaders need to ask their teams if they have the solutions required to stop lateral movement from an adversary in just seven minutes.โ€
Additional Resources

  • Download your copy of the fullย 2023 CrowdStrike Threat Hunting Reportย on the CrowdStrike website.
  • Listen to theย CrowdStrike Adversary Universe podcastย to know and stop the Adversary.
  • Read theย blogย summarising the report findings here.
  • Registerย hereย to join the CrowdStrike Counter Adversary Operations team for a live CrowdCast on August 23 in North America or August 24 in EMEA and APJ.

About CrowdStrike
CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with one of the worldโ€™s most advanced cloud-native platforms for protecting critical areas of enterprise risk โ€“ endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falconยฎ platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.
Learn more:ย https://www.crowdstrike.com/

Follow us:ย Blog | Twitter | LinkedIn | Facebook | Instagram
Start a free trial today:ย https://www.crowdstrike.com/free-trial-guide/
ยฉ 2023 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat Graph are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to identify their products and services.

The Production Team
The KBI Production Team is a staff of specialist technology professionals with a detailed understanding across much of cybersecurity and emerging technology. With many decades of collective industry experience, as well as expertise in marketing & communications, we bring news and analysis of the cybersecurity industry.
Share This