CrowdStrike’s Annual Threat Hunting Report Reveals One Potential Intrusion Is Identified Every Seven Minutes
The latest CrowdStrike Falcon OverWatch threat hunting report reveals a 50% year-over-year rise in hands-on intrusion attempts, with over 77,000 potential intrusions identified. The report indicates a significant decrease in breakout time for eCrime adversaries, now one hour and 24 minutes. The data shows that 43% of interactive intrusions are eCrime-related, with 71% of all detections being malware-free. The report highlights technology as the top targeted industry, and healthcare facing a surge in ransomware attempts.
- 50% YoY increase in hands-on intrusion attempts.
- 77,000 potential intrusions detected.
- Reduced average breakout time for eCrime adversaries to 1 hour and 24 minutes.
- Technology industry is the most targeted, signifying high demand for security solutions.
- eCrime accounted for 43% of interactive intrusions, indicating a high threat level.
- Healthcare experienced a doubling in interactive intrusions, raising concerns about sector vulnerability.
Findings from Falcon Overwatch threat hunters showed faster breakout times by eCrime adversaries and one million malicious events were prevented by the CrowdStrike Falcon platform
Falcon OverWatch calculated that the breakout time (i.e. the time, on average, it takes an adversary to move laterally from initial compromise to other hosts within the victim environment) for eCrime adversaries has fallen to one hour and 24 minutes – compared to one hour and 38 minutes as reported by Falcon OverWatch in the 2022 CrowdStrike Global Threat Report. Moreover, Falcon OverWatch found that in approximately one-third (
“Over the past 12 months, the world has faced new challenges spurred by economic pressures and geopolitical tensions, backdropping a threat landscape that is as complicated as ever,” said
Other key findings from the report include:
-
eCrime is the top threat type for interactive intrusion campaigns. eCrime accounted for
43% of interactive intrusions, while state-nexus actors accounted for18% of activity. Hacktivists accounted for just1% of interactive intrusion campaigns, with the remaining intrusions unattributed. -
Adversaries continue shifting away from malware. Malware-free threat activity accounted for
71% of all detections indexed by the CrowdStrike Threat Graph. The predominance of malware-free activity is related, in part, to adversaries’ prolific abuse of valid credentials to facilitate access and persistence in victim environments. Another factor is the rate at which new vulnerabilities are being disclosed and the speed with which adversaries are able to operationalize exploits. -
Technology is the top industry targeted for interactive intrusions. The top five industries targeted overall were technology (
19% ), telecommunications (10% ), manufacturing (7% ), academic (7% ) and healthcare (7% ). Of note, technology was targeted90% more frequently by interactive intrusions than the second-most targeted industry. -
Telecommunications is the top industry for targeted intrusions by nation-state actors. The top five industries targeted overall were telecommunications (
37% ), technology (14% ), government (9% ), academic (5% ) and media (4.5% ). The telecommunications industry continues to be preyed on for fulfillment of state-sponsored surveillance, intelligence and counterintelligence collection priorities. Of note, telecommunications faced163% more targeted intrusions by state-nexus actors than the second-most targeted industry. - Healthcare finds itself in the crosshairs of Ransomware-as-a-Service (RaaS). The volume of attempted interactive intrusions against the healthcare industry has doubled year-over-year. A significant majority of these intrusions have been attributed to eCrime.
The report includes insights from Falcon OverWatch’s global threat hunting operations from
Additional Resources
-
Download your copy of the full report Nowhere to Hide: 2022 Falcon OverWatch Threat Hunting Report on the
CrowdStrike website. -
Tune in on Twitter Spaces on
September 19 at11:30 a.m. PT to hear from experts live from Fal.Con as they highlight key takeaways from the 2022 Falcon OverWatch Threat Hunting Report. https://twitter.com/i/spaces/1YpJkgOPADrJj -
Join the CrowdStrike Falcon OverWatch threat hunting team for a live CrowdCast on
October 6 as they share new attack trends and tradecrafts from the 2022 Falcon OverWatch Threat Hunting Report. Register here: https://www.crowdstrike.com/resources/crowdcasts/nowhere-to-hide-2022-falcon-overwatch-threat-hunting-report/
About
Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
Learn more: https://www.crowdstrike.com/
Follow us: Blog | Twitter | LinkedIn | Facebook | Instagram
Start a free trial today: https://www.crowdstrike.com/free-trial-guide/
© 2022
View source version on businesswire.com: https://www.businesswire.com/news/home/20220913005643/en/
press@crowdstrike.com
Source:
FAQ
What does the latest CrowdStrike Falcon OverWatch report reveal about intrusion attempts?
How has the breakout time for eCrime adversaries changed according to the report?
What percentage of interactive intrusions are attributed to eCrime?
Which industry is the most targeted according to the CrowdStrike report?