Staying one step ahead of the cyber-security hydra

Image Credit: Shutterstock (Image credit: Shutterstock)

Earlier this year, CrowdStrike released its 2019 Global Threat Report “Adversary Tradecraft and the Importance of Speed,” which detailed some of the key trends within the cybersecurity landscape in 2018 and some key predictions for the year ahead. 

TechRadar Pro caught up with John Titmus, Director EMEA at CrowdStrike to discuss some of the key findings from this and find out what is to come for cybersecurity in 2019.

What major trends are you seeing in the cyber-landscape at the moment?

At this moment in time, we are in an “arms race” for cyber superiority. However, there are some important differences between an arms race in the cybersphere versus the physical world: In cyberspace, any player can potentially become a superpower. The capital costs are alarmingly low, compared to funding a physical war machine. Even some of the world’s most impoverished regions proved their ability to make a global impact through cyber campaigns in 2018 — and this is one genie that is not going back in the bottle.

With regard to nation-state actors, speed has become an even more critical aspect when it comes to countering cyberattacks. The Global Threat Report data demonstrated that adversaries are moving even faster when it comes to “breakout time”, Russian adversaries for instance only take an average of 18 minutes to accomplish lateral movement within the victim environment - from where they first entered to moving through the environment.

Furthermore, there has been a notable increase in “scripting” techniques in attacks, as well as the increased use of techniques intended to hide or obscure attacker behaviours. As endpoint protection solutions are becoming increasingly adept at finding and stopping malicious behaviours, attackers are forced to incorporate stealthier measures into their tradecraft.

Cell tower

Image Credit: Pexels (Image credit: Image Credit: Pexels)

What industries are experiencing the highest level of threat activity?

One of the most vulnerable sectors at the moment is telecommunications. As in 2018, it was noted that organisations in the telecoms sector had been directly targeted, along with regular instances of compromised telecoms equipment and the use of “lures” referencing telecoms services. This trend likely supports state-sponsored espionage actors as they seek to gain access to a broad customer base that relies on telecom services in their target countries.

The targeting of the telecom sector is historically within the scope of several Chinese adversaries; however, the number of operations affecting this sector, or using lures referencing telecom services, suggests an increase in China-based cyber espionage operations on a larger scale, and supports previous assessments that these adversaries regularly engage in upstream targeting. Furthermore, both Iranian and Russian adversaries have been identified as targeting those in the telecom sector. 

How can organisations stay ahead of these all-new advanced adversaries?

The basics of user awareness, asset and vulnerability management, and secure configurations continue to serve as the foundation for a strong cybersecurity programme. CrowdStrike recommends that organisations regularly review and improve their standard security controls, including the following: user awareness, asset management, vulnerability and multifactor authentication. 

With breakout time measured in hours, something that is worth remembering when countering threats is the “1-10-60 rule”. This rule is divided as such; detect intrusions in under one minute, perform a full investigation in under 10 minutes and eradicate the adversary from the environment in under 60 minutes. 

Those organisations that meet this 1-10-60 benchmark are much more likely to eradicate the adversary before the attack spreads out from its initial entry point, minimising impact and further escalation. Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action

  • Protect yourself and your business from the latest cyber threats with the best antivirus
Latest in Security
Webex by Cisco banner on a Chromebook
Cisco warns some Webex users of worrying security flaw, so patch now
Red padlock open on electric circuits network dark red background
AI-powered cyber threats are becoming the biggest worry for businesses everywhere
Woman using iMessage on iPhone
Apple to take legal action against British Government over backdoor request
Red padlock open on electric circuits network dark red background
Aviaton firms hit by devious new polyglot malware
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
Major ransomware attack sees Tata Technologies hit - 1.4TB dataset with over 730,000 files allegedly stolen
Image of laptop infected with malware
Ransomware criminals are now sending their demands...by snail mail?
Latest in News
AMD Ryzen 9950X
Ryzen CPUs are the cheapest Zen 5 cores you can buy, but I was surprised to see this AMD 192-core CPUs on the value leaderboard
A hand holding a phone showing the Android Find My Device network
Android's Find My Device can now let you track your friends – and I can't decide if that's cool or creepy
Insta360 X4 360 degree camera without lens protector
Leaked DJI Osmo 360 image suggests GoPro and Insta360 should be worried – here's why
A YouTube Premium promo on a laptop screen
A cheaper YouTube Premium Lite plan just rolled out in the US – but you’ll miss out on these 4 features
Viaim RecDot AI true wireless earbuds
These AI-powered earbuds can also act as a dictaphone with transcription when left in their case
The socket interface of the Intel Core Ultra processor
Intel unveils its most powerful AI PCs yet - new Intel Core Ultra Series 2 processors pack in vPro for lightweight laptops and high-performance workstations alike