DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

In 56% Of Sophos IR And MDR Cases, Adversaries Logged In, Instead of Breaking In: Sophos

DigitalCIO Bureau by DigitalCIO Bureau
April 4, 2025
in Tech News
0
In 56% Of Sophos IR And MDR Cases, Adversaries Logged In, Instead of Breaking In: Sophos
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Sophos has released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external remote services, which includes edge devices such as firewalls and VPNs, by leveraging valid accounts.

The combination of external remote services and valid accounts aligns with the top root causes of attacks. For the second year in row, compromised credentials were the number one root cause of attacks (41% of cases). This was followed by exploited vulnerabilities (21.79%) and brute force attacks (21.07%).

Understanding The Speed of Attacks

When analyzing MDR and IR investigations, the Sophos X-Ops team looked specifically at ransomware, data exfiltration, and data extortion cases to identify how fast attackers progressed through the stages of an attack within an organization. In those three types of cases, the median time between the start of an attack and exfiltration was only 72.98 hours (3.04 days). Furthermore, there was only a median of 2.7 hours from exfiltration to attack detection.

“Passive security is no longer enough. While prevention is essential, rapid response is critical. Organizations must actively monitor networks and act swiftly against observed telemetry. Coordinated attacks by motivated adversaries require a coordinated defense. For many organizations, that means combining business-specific knowledge with expert-led detection and response. Our report confirms that organizations with proactive monitoring detect attacks faster and experience better outcomes,” said John Shier, field CISO.

Other Key Findings from the 2025 Sophos Active Adversary Report:

  • Attackers Can Take Control of a System in Just 11 Hours: The median time between attackers’ initial action and their first (often successful) attempt to breach Active Directory (AD) – arguably one of the most important assets in any Windows network – was just 11 hours. If successful, attackers can more easily take control of the organization.
  • Top Ransomware Groups in Sophos Cases: Akira was the most frequently encountered ransomware group in 2024, followed by Fog and LockBit (despite a multi-government takedown of LockBit earlier in the year).
  • Dwell Time is Down to Just 2 Days: Overall, dwell time – the time from the start of an attack to when it is detected – decreased from 4 days to just 2 in 2024, largely due to the addition of MDR cases to the dataset.
  • Dwell Time in IR Cases: Dwell time remained stable at 4 days for ransomware attacks and 11.5 days for non-ransomware cases.
  • Dwell Time in MDR Cases: In MDR investigations, dwell time was only 3 days for ransomware cases and just 1 day for non-ransomware cases, suggesting MDR teams are able to more quickly detect and respond to attacks.
  • Ransomware Groups Work Overnight: In 2024, 83% of ransomware binaries were dropped outside of the targets’ local business hours.
  • Remote Desktop Protocol Continues to Dominate: RDP was involved in 84% of MDR/IR cases, making it the most frequently abused Microsoft tool.

To shore up their defenses, Sophos recommends that companies do the following:

  • Close exposed RDP ports
  • Use phishing-resistant multifactor authentication (MFA) wherever possible
  • Patch vulnerable systems in a timely manner, with a particular focus on internet-facing devices and services
  • Deploy EDR or MDR and ensure it is proactively monitored 24/7
  • Establish a comprehensive incident response plan and test it regularly through simulations or tabletop exercises
Tags: Sophos
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Kyndryl launches agentic AI framework and services for the mainframe

by DigitalCIO Bureau
November 28, 2025
0
Kyndryl launches agentic AI framework and services for the mainframe

Kyndryl has announced new AI-powered services that combine the company’s deep mainframe expertise with agentic AI and hybrid IT computing capabilities to accelerate application and solutions development, increase operational...

Read moreDetails

AI Skillsets Critical to Address Cybersecurity Skills Gap Solution in India

by DigitalCIO Bureau
November 26, 2025
0
AI Adoption In Cybersecurity Surges Across India

Fortinet has released its 2025 Global Cybersecurity Skills Gap Report, shedding light on the new and persistent challenges Indian organizations face due to the cybersecurity skills gap. The...

Read moreDetails

 Cloudera Announces Updates to its Platform

by DigitalCIO Bureau
November 25, 2025
0
 Cloudera Announces Updates to its Platform

Cloudera has announced a major platform update that integrates Trino, Cloudera Shared Data Experience (SDX), and Cloudera Octopai Data Lineage to deliver unified data access, control, smarter governance,...

Read moreDetails

Salesforce Blocks Gainsight Apps After Detecting Suspicious Activity

by DigitalCIO Bureau
November 24, 2025
0
Salesforce Acquires AI Customer Service Startup Airkit.ai

CRM giant Salesforce has immediately blocked access to applications from software vendor Gainsight after detecting "unusual activity." The incident may have led to unauthorized access to customer data...

Read moreDetails

Employees in India Lack Clear Guidance on Using AI at Work

by DigitalCIO Bureau
November 21, 2025
0
Employees in India Lack Clear Guidance on Using AI at Work

Udemy has released a research report, ‌“Ready or Not: The Emerging Gap Between Awareness and Action in ‌AI Transformation.” Drawing on a new survey conducted by YouGov, the...

Read moreDetails
Next Post
Exabeam Launches AI Agent Nova For Enhanced Security Operations

Exabeam Launches AI Agent Nova For Enhanced Security Operations

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

SoftwareOne Unveils New Cloud Competency Centre In Malaysia

Leveraging IT Cost Optimization For Innovation Drives Higher Profitability

February 22, 2025

How Unsecured Server Exposed 419 Million Phone Number Records Linked to Facebook

September 6, 2019
Proofpoint And Wiz Integrate Security Solutions

Proofpoint And Wiz Integrate Security Solutions

June 18, 2025

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope New Relic NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?