Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:15 AM

Firms Improve Threat Detection but Face Increasingly Disruptive Attacks

In addition, more third parties are discovering the attacks rather than the companies themselves.

Organizations are more quickly detecting attackers in their networks and systems, but the majority of attacks are still being found by third parties and not by internal security groups.

In 2019, companies needed 56 days, on average, to detect an attacker in their networks, down from 78 days in 2018, FireEye Mandiant stated in its "M-Trends 2020" report, out today. While the improvement is partially due to companies spending more effort and resources on detecting threats and responding to incidents, much of the impetus to improve is due to a second trend identified in the report: Attackers are more quickly taking action once inside a victim's network, and often the action is destructive, says Charles Carmakal, vice president of consulting and chief technology officer at FireEye Mandiant.

"Unfortunately, we are seeing a lot more disruptive threats," he says. "We are seeing a lot more ransomware out there, and ransomware operators are deploying in days to weeks, executing in a much shorter time frame than espionage-type threats."

Overall, 43% of attacks have a destructive element, the company found.

The findings indicate that, while organizations are getting better at detecting threats, attackers have become more agile as well. 

The groups behind the attacks, for example, are expanding beyond just attacking Windows systems. In 2019, 274 of the 1,268 malware families tracked by FireEye — 22% of the total — targeted either the Linux operating system or the Mac OS. Seven in 10 malware samples encountered belonged to the top five malware families, which are based on open source tools and under active development, the company stated in the report. About 41% of the malware families encountered by FireEye were previously unknown.

"Attackers continue to grow more adept at working across a range of operating systems and device types, as well as in both on-premises and cloud architectures," the report stated. "Traditional barriers to attacker success continue to lessen over time. Put simply, more attackers can do more things in more diverse environments."

While the overall time between the compromise of a network and the detection of the attack showed improvement, the percentage of attacks discovered by company employees, as opposed to external third parties, declined to 47% in 2019, demonstrating that businesses need to focus more on their own security. In 2017, internal detection of threats peaked at 62%.

Organizations based in the Americas had the best success, with 52% detecting threats internally rather than relying on third parties, while the Asia-Pacific region relied far more on third parties, with almost three-quarters of attacks discovered by external sources.

Data on threat detection varies widely. Cybersecurity firm CrowdStrike, for example, sees companies detecting attacks more quickly; it found the average organization takes five days to detect an attack and a little less than seven days to contain a breach. Meanwhile, a Trustwave report found that companies detected attacks within 14 days in 2018, down from 26 days in the prior year.

The differences in estimates of the so-called "dwell time" could be due to the focus of the company collecting the data. FireEye Mandiant focuses on incident response, helping companies that have already been breached, while Trustwave and CrowdStrike aim to proactively prevent breaches and detect attacks. 

The company tracked 1,268 malware families in 2019, 41% of which were new. While the vast majority of malicious software targeted Windows systems, 208 targeted or could impact Linux systems and 66 targeted or could impact Mac systems. 

The attackers' focus on ransomware and other disruptive attacks raises the stakes for organizations. While many companies are prepared to recover from such attacks — regularly backing up data being a priority — many still pay ransoms to expedite recovery, Carmakal says. 

"The assumption is that when victims pay, they are doing it because they have not made good backups, but that's not the case," he says. "There are plenty of organizations that have terrific backups. But if you have so many systems taken offline in a matter of minutes or hours, and you have to recover so many servers in your environment, the amount of downtime can be excessive."

Carmakal declined to say how many, or what fraction, of ransomware incidents resulted in the victim paying a ransom.

Related Content

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "8 Things Users Do That Make Security Pros Miserable."


Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Author
2/21/2020 | 3:47:53 PM
Closing the Breach Detection Gap
Great story Robert. The fact that so many companies don't know their network has been compromised, whether it's for days or months (or in the case of Citrix, years) has to be among the most alarming metrics for security leaders. But it's hardly surprising given that SOC analysts have to sift through so much noise before they can confirm that they have indeed been compromised. Until we can isolate confirmed instances of compromise with confidence, attacker dwell time will continue to be one of the most pressing issues we as security leaders must deal with...
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-16
The unofficial vscode-rpm-spec extension before 0.3.2 for Visual Studio Code allows remote code execution via a crafted workspace configuration.
PUBLISHED: 2021-04-16
Broken Authentication in Atlassian Connect Express (ACE) from version 3.0.2 before version 6.6.0: Atlassian Connect Express is a Node.js package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Express app occurs with a server-to-server JWT or ...
PUBLISHED: 2021-04-16
Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a se...
PUBLISHED: 2021-04-16
A cross-site scripting (XSS) vulnerability has been reported to affect earlier versions of File Station. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions: QTS build 20210202 (and later) QT...
PUBLISHED: 2021-04-16
Command Injection in Tenda G0 routers with firmware versions v15.11.0.6(9039)_CN and v15.11.0.5(5876)_CN , and Tenda G1 and G3 routers with firmware versions v15.11.0.17(9502)_CN or v15.11.0.16(9024)_CN allows remote attackers to execute arbitrary OS commands via a crafted action/setDebugCfg request...