DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Tech News

In 56% Of Sophos IR And MDR Cases, Adversaries Logged In, Instead of Breaking In: Sophos

DigitalCIO Bureau by DigitalCIO Bureau
April 4, 2025
in Tech News
0
In 56% Of Sophos IR And MDR Cases, Adversaries Logged In, Instead of Breaking In: Sophos
75
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Sophos has released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external remote services, which includes edge devices such as firewalls and VPNs, by leveraging valid accounts.

The combination of external remote services and valid accounts aligns with the top root causes of attacks. For the second year in row, compromised credentials were the number one root cause of attacks (41% of cases). This was followed by exploited vulnerabilities (21.79%) and brute force attacks (21.07%).

Understanding The Speed of Attacks

When analyzing MDR and IR investigations, the Sophos X-Ops team looked specifically at ransomware, data exfiltration, and data extortion cases to identify how fast attackers progressed through the stages of an attack within an organization. In those three types of cases, the median time between the start of an attack and exfiltration was only 72.98 hours (3.04 days). Furthermore, there was only a median of 2.7 hours from exfiltration to attack detection.

“Passive security is no longer enough. While prevention is essential, rapid response is critical. Organizations must actively monitor networks and act swiftly against observed telemetry. Coordinated attacks by motivated adversaries require a coordinated defense. For many organizations, that means combining business-specific knowledge with expert-led detection and response. Our report confirms that organizations with proactive monitoring detect attacks faster and experience better outcomes,” said John Shier, field CISO.

Other Key Findings from the 2025 Sophos Active Adversary Report:

  • Attackers Can Take Control of a System in Just 11 Hours: The median time between attackers’ initial action and their first (often successful) attempt to breach Active Directory (AD) – arguably one of the most important assets in any Windows network – was just 11 hours. If successful, attackers can more easily take control of the organization.
  • Top Ransomware Groups in Sophos Cases: Akira was the most frequently encountered ransomware group in 2024, followed by Fog and LockBit (despite a multi-government takedown of LockBit earlier in the year).
  • Dwell Time is Down to Just 2 Days: Overall, dwell time – the time from the start of an attack to when it is detected – decreased from 4 days to just 2 in 2024, largely due to the addition of MDR cases to the dataset.
  • Dwell Time in IR Cases: Dwell time remained stable at 4 days for ransomware attacks and 11.5 days for non-ransomware cases.
  • Dwell Time in MDR Cases: In MDR investigations, dwell time was only 3 days for ransomware cases and just 1 day for non-ransomware cases, suggesting MDR teams are able to more quickly detect and respond to attacks.
  • Ransomware Groups Work Overnight: In 2024, 83% of ransomware binaries were dropped outside of the targets’ local business hours.
  • Remote Desktop Protocol Continues to Dominate: RDP was involved in 84% of MDR/IR cases, making it the most frequently abused Microsoft tool.

To shore up their defenses, Sophos recommends that companies do the following:

  • Close exposed RDP ports
  • Use phishing-resistant multifactor authentication (MFA) wherever possible
  • Patch vulnerable systems in a timely manner, with a particular focus on internet-facing devices and services
  • Deploy EDR or MDR and ensure it is proactively monitored 24/7
  • Establish a comprehensive incident response plan and test it regularly through simulations or tabletop exercises
Tags: Sophos
Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

NelsonHall Recognizes LTM as a Leader in GenAI & Process Automation for Banking

by DigitalCIO Bureau
March 6, 2026
0
NelsonHall Recognizes LTM as a Leader in GenAI & Process Automation for Banking

LTM, the Business Creativity partner to the world’s largest enterprises, has been recognized as a Leader in the ‘Overall’ market segment in the NelsonHall NEAT Evaluation for GenAI...

Read moreDetails

OptiValue Tek & SFJ Business Solutions Join Hands to Transform Fortune 500 Enterprises

by DigitalCIO Bureau
March 2, 2026
0
OptiValue Tek & SFJ Business Solutions Join Hands to Transform Fortune 500 Enterprises

Partnership aims to build intelligent, resilient, and future-ready enterprise ecosystems worldwide New Delhi – March 2, 2026 — OptiValue Tek has announced a strategic alliance with SFJ Business Solutions, to deliver large-scale enterprise...

Read moreDetails

TCS Expands Strategic Partnership with Zscaler to Redefine Enterprise Workspace Innovation with New AI-powered Solution

by DigitalCIO Bureau
March 2, 2026
0
TCS Expands Strategic Partnership with Zscaler to Redefine Enterprise Workspace Innovation with New AI-powered Solution

TCS Workspace Experience Studio engineered with ZDX (Zscaler Digital Experience) will herald a new era in enterprise digital workspace innovation by integrating zero-trust security, observability, and AI-powered experience...

Read moreDetails

21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

by DigitalCIO Bureau
February 27, 2026
0
21-year-old from China wins TCS CodeVita 2026 as TCS sets new Guinness World Records for the world’s largest coding competition

TCS sets a new milestone with 146,922 participants, surpassing its 2021 Guinness World Records title to remain the world’s largest coding championship Tata Consultancy Services (TCS) announced the winners...

Read moreDetails

Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

by DigitalCIO Bureau
February 27, 2026
0
Qualcomm and Tata Electronics Partner to Manufacture Qualcomm Automotive Modules in India

Collaboration supports the nation’s “Make in India” initiative and global priority for supply chain diversification Companies’ manufacturing partnership aimed at supporting Indian and global automakers, strengthening supply-chain flexibility...

Read moreDetails
Next Post
Exabeam Launches AI Agent Nova For Enhanced Security Operations

Exabeam Launches AI Agent Nova For Enhanced Security Operations

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

IBM Opens New Labs for Cracking ATMs, IoT Devices

August 7, 2018
VTEX Partners with Vinculum to Elevate Customer Experience in India

Qualcomm and MapmyIndia to accelerate ‘Make in India’ solutions for automotive

January 17, 2025
L&T Tech Services Accelerates Transition to Smart Vehicles with Generative AI on AWS

German public still unversed in AI: Olaf Scholz

January 27, 2024

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud IBM Infographics Internet of Things (IoT) Kaspersky Microsoft NTT DATA NVIDIA Palo Alto Networks Panel Discussion Qlik Salesforce ServiceNow Sophos TCS Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?