24 hours: that’s how long it takes to steal your data

24 hours: that’s how long it takes to steal your data

A group of scammers masquerading as Microsoft technicians are using the WannaCry ransomware threat to scam users in the UK.

Nine out of ten hackers can break through cyber security defences and into the systems they target within 12 hours. And for almost all of them, identifying and stealing the data they are after is the work of just another 12 hours.

Hackers are quick. Their victims however are not and it's frequently hundreds of days before the theft is discovered. The Nuix Black Report contains the rather scary results of a survey of 70 professional hackers and penetration testers at DEFCON, the world’s largest hacking and security conference. The  findings will overturn much accepted thinking about cyber security.

The difference about the Black Report is that it focusses on the hackers, rather than on the victims. “There is no shortage of cybersecurity industry reports so we’ve avoided going down the familiar path of compiling data about incidents that have already taken place.” said Chris Pogue, Nuix’s Chief Information Security Officer ,“Instead, we have focused on the source of the threat landscape: the attackers themselves.”

And what the hackers have to say is of considerable interest.

  • Traditional countermeasures such as firewalls and antivirus almost never slow them down
  • Endpoint security technologies are often effective at stopping attacks, as are Intrusion Prevention Systems
  • 80% of hackers rated employee education as an important or extremely important countermeasure
  • Only 9% say they are in it for the money (but, well, they would say that, wouldn't they!)
  • Hackers change their methods with each attack and with every target, limiting the effectiveness of defense based on previous experience
  • Social engineering tactics is almost always used as part of an attack (84% of the time)
  • Two thirds of attackers are almost never caught red handed

As well as describing what works and what doesn't in the way of defence, the report provides insights into hackers’ motivations, their education levels, how long they spend bypassing security systems, the tools and methods they use, and their greatest challenges and frustrations. Essential reading for any proactive CISO!

Photo: ©  leolintang under licence from Thinkstock Photos

Copyright Lyonsdown Limited 2021

Top Articles

Overcoming the security challenge in remote working environments

The pandemic has changed the way we work. Remote working is no longer a nice-to-have for organisations, but a necessity especially if they want to attract the best talent.

President Biden pens Executive Order to boost US cybersecurity

US President Joe Biden signed an Executive Order this week to boost the cyber security of federal government systems and data.

DarkSide ransomware gang shuts shop following 'law enforcement request'

The DarkSide ransomware group has announced it is shutting shop as its servers and cryptocurrency accounts were allegedly seized "at the request of law enforcement agencies."

Related Articles