DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

2024 CrowdStrike Threat Hunting Report nation-states exploit legitimate credentials to pose as insiders

DigitalCIO Bureau by DigitalCIO Bureau
August 21, 2024
in Tech News
0
Huntress Reveals Threats Facing SMBs
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

CrowdStrike released the 2024 Threat Hunting Report, highlighting the latest adversary trends, campaigns and tactics based on the frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts. The report reveals a rise in nation-state and eCrime adversaries exploiting legitimate credentials and identities to evade detection and bypass legacy security controls, as well as a rise in hands-on-keyboard intrusions, cross-domain attacks, and cloud control plane exploits.

Key findings include:

  •         North Korea-Nexus Adversaries Pose as Legitimate U.S. Employees: FAMOUS CHOLLIMA infiltrated over 100 primarily U.S. technology companies. Leveraging falsified or stolen identity documents, malicious insiders gained employment as remote IT personnel to exfiltrate data and carry out malicious activity.
  •         Hands-on-Keyboard Intrusions Increase by 55%: More threat actors are engaging in hands-on-keyboard activities to blend in as legitimate users and bypass legacy security controls. 86% of all hands-on intrusions are executed by eCrime adversaries seeking financial gains. These attacks increased by 75% in healthcare and 60% in technology, which remains the most targeted sector for seven years in a row.
  •         RMM Tool Abuse Grows by 70%: Adversaries including CHEF SPIDER (eCrime) and STATIC KITTEN (Iran-nexus) are using legitimate Remote Monitoring and Management (RMM) tools like ConnectWise ScreenConnect for endpoint exploitation. RMM tool exploitation accounted for 27% of all hands-on-keyboard intrusions.
  •         Cross-Domain Attacks Persist: Threat actors are increasingly exploiting valid credentials in order to breach cloud environments and eventually using that access to access endpoints. These attacks leave minimal footprints in each of those domains, like separate puzzle pieces, making them harder to detect.
  •         Cloud Adversaries Target the Control Plane: Cloud-conscious adversaries like SCATTERED SPIDER (eCrime) are leveraging social engineering, policy changes and password manager access to infiltrate cloud environments. They exploit connections between the cloud control plane and endpoints to move laterally, maintain persistence and exfiltrate data.

“For over a decade, we’ve vigilantly tracked the most prolific hacktivist, eCrime, and nation-state adversaries,” said Adam Meyers, Head of Counter Adversary Operations at CrowdStrike. “In tracking nearly 250 adversaries this past year, a central theme emerged-threat actors are increasingly engaging in interactive intrusions and employing cross-domain techniques to evade detection and achieve their objectives. Our comprehensive, human-led threat hunting directly informs the algorithms that power the AI-native Falcon platform, ensuring that we stay ahead of these evolving threats and continue to deliver the industry’s most effective cybersecurity solutions.”

 

Tags: CrowdStrike
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

IBM Introduces its Most Advanced AI-Driven Security Portfolio to Clients, further Strengthened by Ongoing Project Glasswing Work

by DigitalCIO Bureau
May 22, 2026
0
IBM Introduces its Most Advanced AI-Driven Security Portfolio to Clients, further Strengthened by Ongoing Project Glasswing Work

As attackers increasingly weaponize AI to target critical systems, IBM is equipping clients with advanced defenses to counter these threats IBM announced an expansion of its enterprise security...

Read moreDetails

L&T Technology Services Unveils Europe’s First EI Center; Ushers in New Era of Engineering Intelligence for Products, Platforms & Manufacturing

by DigitalCIO Bureau
May 22, 2026
0
L&T Technology Services Unveils Europe’s First EI Center; Ushers in New Era of Engineering Intelligence for Products, Platforms & Manufacturing

New EI CoE in Munich to serve LTTS’ clients in Mobility, Sustainability & Tech segments, accelerating applied AI adoption and Engineering Intelligence innovation L&T Technology Services announced the...

Read moreDetails

80% of Energy, Oil/Gas & Utilities Firms Hit by Identity Breaches — Sophos 2026 Research Reveals Critical Infrastructure Identity Crisis

by DigitalCIO Bureau
May 21, 2026
0
80% of Energy, Oil/Gas & Utilities Firms Hit by Identity Breaches — Sophos 2026 Research Reveals Critical Infrastructure Identity Crisis

State of Identity Security 2026 report finds human error and poor non-human identity management are the root causes of most attacks, as agentic AI accelerates the risk Sophos...

Read moreDetails

KPMG and Anthropic form a global alliance, unveiling the Claude-powered Digital Gateway

by DigitalCIO Bureau
May 20, 2026
0
KPMG and Anthropic form a global alliance, unveiling the Claude-powered Digital Gateway

KPMG and Anthropic have announced the launch of KPMG Digital Gateway powered by Claude, integrating Anthropic’s frontier AI directly into KPMG’s client delivery platform. This initiative is part...

Read moreDetails

Veeam Introduces Intelligent ResOps for the Agentic AI Era

by DigitalCIO Bureau
May 20, 2026
0
Veeam Introduces Intelligent ResOps for the Agentic AI Era

Veeam Launches Intelligent ResOps for the Agentic AI Era, Turning Data Context into Faster, More Precise Recovery Veeam Software has introduced Veeam Intelligent ResOps, a new solution unveiled...

Read moreDetails
Next Post
Tenable Research Discovers Critical Vulnerability in Microsoft Copilot Studio

Tenable Research Discovers Critical Vulnerability in Microsoft Copilot Studio

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Nasscom seeks slew of relief measures for IT sector

April 8, 2020
Attackers Misusing Email Inbox Rules

Attackers Misusing Email Inbox Rules

September 22, 2023
Barracuda Appoints Geoff Waters As Chief Revenue Officer

Barracuda Appoints Geoff Waters As Chief Revenue Officer

June 21, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Accenture Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation E-books Fortinet Gartner Generative AI Google Cloud HCLTech IBM India Infographics Infosys Internet of Things (IoT) Kaspersky NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tata Consultancy Services TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?