Staying one step ahead of the cyber-security hydra

Image Credit: Shutterstock (Image credit: Shutterstock)

Earlier this year, CrowdStrike released its 2019 Global Threat Report “Adversary Tradecraft and the Importance of Speed,” which detailed some of the key trends within the cybersecurity landscape in 2018 and some key predictions for the year ahead. 

TechRadar Pro caught up with John Titmus, Director EMEA at CrowdStrike to discuss some of the key findings from this and find out what is to come for cybersecurity in 2019.

What major trends are you seeing in the cyber-landscape at the moment?

At this moment in time, we are in an “arms race” for cyber superiority. However, there are some important differences between an arms race in the cybersphere versus the physical world: In cyberspace, any player can potentially become a superpower. The capital costs are alarmingly low, compared to funding a physical war machine. Even some of the world’s most impoverished regions proved their ability to make a global impact through cyber campaigns in 2018 — and this is one genie that is not going back in the bottle.

With regard to nation-state actors, speed has become an even more critical aspect when it comes to countering cyberattacks. The Global Threat Report data demonstrated that adversaries are moving even faster when it comes to “breakout time”, Russian adversaries for instance only take an average of 18 minutes to accomplish lateral movement within the victim environment - from where they first entered to moving through the environment.

Furthermore, there has been a notable increase in “scripting” techniques in attacks, as well as the increased use of techniques intended to hide or obscure attacker behaviours. As endpoint protection solutions are becoming increasingly adept at finding and stopping malicious behaviours, attackers are forced to incorporate stealthier measures into their tradecraft.

Cell tower

Image Credit: Pexels (Image credit: Image Credit: Pexels)

What industries are experiencing the highest level of threat activity?

One of the most vulnerable sectors at the moment is telecommunications. As in 2018, it was noted that organisations in the telecoms sector had been directly targeted, along with regular instances of compromised telecoms equipment and the use of “lures” referencing telecoms services. This trend likely supports state-sponsored espionage actors as they seek to gain access to a broad customer base that relies on telecom services in their target countries.

The targeting of the telecom sector is historically within the scope of several Chinese adversaries; however, the number of operations affecting this sector, or using lures referencing telecom services, suggests an increase in China-based cyber espionage operations on a larger scale, and supports previous assessments that these adversaries regularly engage in upstream targeting. Furthermore, both Iranian and Russian adversaries have been identified as targeting those in the telecom sector. 

How can organisations stay ahead of these all-new advanced adversaries?

The basics of user awareness, asset and vulnerability management, and secure configurations continue to serve as the foundation for a strong cybersecurity programme. CrowdStrike recommends that organisations regularly review and improve their standard security controls, including the following: user awareness, asset management, vulnerability and multifactor authentication. 

With breakout time measured in hours, something that is worth remembering when countering threats is the “1-10-60 rule”. This rule is divided as such; detect intrusions in under one minute, perform a full investigation in under 10 minutes and eradicate the adversary from the environment in under 60 minutes. 

Those organisations that meet this 1-10-60 benchmark are much more likely to eradicate the adversary before the attack spreads out from its initial entry point, minimising impact and further escalation. Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action

  • Protect yourself and your business from the latest cyber threats with the best antivirus
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
Monster Hunter Wilds
Monster Hunter Wilds Title Update 1 launches in early April, adding new monsters and some of the best-looking armor sets I need to add to my collection
Zotac Gaming RTX 5090 Graphics Card
Nvidia Blackwell stock woes are compounded by price hikes as more RTX 5090 GPUs soar in pricing, and I’m sick and tired of it all at this point
A collage of Elizabeth Olsen's Scarlet Witch and Tatiana Maslany's She-Hulk
Marvel fans are already tired of Doomsday and Secret Wars cast gossip as two more superheroes get linked with roles in the next two Avengers movies
Four operators survey Verdansk. One holds a sniper rifle, one binoculars, another holds is landing with their parachute, while the last wears a skull mask
New Call of Duty: Warzone trailer shows a beautiful rebuilt Verdansk, but some fans want more: 'it won't be the same unfortunately'
An Apple Music pink/pixellated poster advertising DJ with Apple Music
DJ with Apple Music lands, allowing subscribers to build and mix DJ sets directly from its +100 million-song catalog