• Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
SUBSCRIBE
Smart Solutions World
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions
No Result
View All Result
No Result
View All Result
Home Solutions News world

Sophos Report: In 56% of Sophos IR and MDR Cases, Adversaries Logged In, Instead of Breaking In

SmartSolutionUser1 by SmartSolutionUser1
April 4, 2025
in Solutions News world
0
Sophos Report: In 56% of Sophos IR and MDR Cases, Adversaries Logged In, Instead of Breaking In
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Sophos has released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external remote services, which includes edge devices such as firewalls and VPNs, by leveraging valid accounts.

You might also like

Kyndryl report: Why most businesses are not yet winning with AI

HPE Unveils New Switches and Network Upgrades for AI and HPC Demands

New Relic Unveils Integration with the GitHub Copilot Coding Agent to Accelerate Innovation and Automate Reliability

The combination of external remote services and valid accounts aligns with the top root causes of attacks. For the second year in row, compromised credentials were the number one root cause of attacks (41% of cases). This was followed by exploited vulnerabilities (21.79%) and brute force attacks (21.07%).

Understanding The Speed of Attacks

When analyzing MDR and IR investigations, the Sophos X-Ops team looked specifically at ransomware, data exfiltration, and data extortion cases to identify how fast attackers progressed through the stages of an attack within an organization. In those three types of cases, the median time between the start of an attack and exfiltration was only 72.98 hours (3.04 days). Furthermore, there was only a median of 2.7 hours from exfiltration to attack detection.

“Passive security is no longer enough. While prevention is essential, rapid response is critical. Organizations must actively monitor networks and act swiftly against observed telemetry. Coordinated attacks by motivated adversaries require a coordinated defense. For many organizations, that means combining business-specific knowledge with expert-led detection and response. Our report confirms that organizations with proactive monitoring detect attacks faster and experience better outcomes,” said John Shier, field CISO.

Other Key Findings from the 2025 Sophos Active Adversary Report:

  • Attackers Can Take Control of a System in Just 11 Hours: The median time between attackers’ initial action and their first (often successful) attempt to breach Active Directory (AD) – arguably one of the most important assets in any Windows network – was just 11 hours. If successful, attackers can more easily take control of the organization.
  • Top Ransomware Groups in Sophos Cases: Akira was the most frequently encountered ransomware group in 2024, followed by Fog and LockBit (despite a multi-government takedown of LockBit earlier in the year).
  • Dwell Time is Down to Just 2 Days: Overall, dwell time – the time from the start of an attack to when it is detected – decreased from 4 days to just 2 in 2024, largely due to the addition of MDR cases to the dataset.
  • Dwell Time in IR Cases: Dwell time remained stable at 4 days for ransomware attacks and 11.5 days for non-ransomware cases.
  • Dwell Time in MDR Cases: In MDR investigations, dwell time was only 3 days for ransomware cases and just 1 day for non-ransomware cases, suggesting MDR teams are able to more quickly detect and respond to attacks.
  • Ransomware Groups Work Overnight: In 2024, 83% of ransomware binaries were dropped outside of the targets’ local business hours.
  • Remote Desktop Protocol Continues to Dominate: RDP was involved in 84% of MDR/IR cases, making it the most frequently abused Microsoft tool.

To shore up their defenses, Sophos recommends that companies do the following:

  • Close exposed RDP ports
  • Use phishing-resistant multifactor authentication (MFA) wherever possible
  • Patch vulnerable systems in a timely manner, with a particular focus on internet-facing devices and services
  • Deploy EDR or MDR and ensure it is proactively monitored 24/7
  • Establish a comprehensive incident response plan and test it regularly through simulations or tabletop exercises
Share30Tweet19
SmartSolutionUser1

SmartSolutionUser1

Recommended For You

Kyndryl report: Why most businesses are not yet winning with AI

by SmartSolutionUser1
May 30, 2025
0
Kyndryl report: Why most businesses are not yet winning with AI

A new global study released by Kyndryl found that only a small number of organisations have taken steps to align their workforce strategies with the growth of AI...

Read moreDetails

HPE Unveils New Switches and Network Upgrades for AI and HPC Demands

by SmartSolutionUser1
May 30, 2025
0
HPE VM Essentials Now Available Globally Through Channel Partners

 Hewlett Packard Enterprise has announced expansions of its HPE Aruba Networking wired and wireless portfolio, along with new HPE Aruba Networking CX 10K distributed services switches, which feature built-in programmable data processing...

Read moreDetails

New Relic Unveils Integration with the GitHub Copilot Coding Agent to Accelerate Innovation and Automate Reliability

by SmartSolutionUser1
May 30, 2025
0
New Relic eAPM Provides Complete Visibility Into Kubernetes Workloads

New Relic has announced an integration of its AI-strengthened technology with the latest agentic capability of GitHub Copilot called coding agent. The powerful integration transforms the traditional, manual...

Read moreDetails

Seqrite Identifies 650+ Cyber Incidents Linked to Geopolitical Tensions Surrounding ‘Operation Sindoor’

by SmartSolutionUser1
May 26, 2025
0
Seqrite Identifies 650+ Cyber Incidents Linked to Geopolitical Tensions Surrounding ‘Operation Sindoor’

Quick Heal Technologies Limited a global cybersecurity solutions provider, through its Seqrite Labs, India’s largest malware analysis facility, has revealed some critical details about coordinated cyberattacks exploiting geopolitical tensions during ‘Operation...

Read moreDetails

Keyur Desai appointed as Chief Data and Analytics Officer at Cetera Financial Group

by SmartSolutionUser1
May 26, 2025
0
Keyur Desai appointed as Chief Data and Analytics Officer at Cetera Financial Group

Keyur Desai has joined Cetera Financial Group as Chief Data and Analytics Officer, a newly created role that underscores Cetera’s commitment to data-driven innovation. Reporting to Christian Mitchell,...

Read moreDetails
Next Post
Keysight Unveils AI Data Center Builder For Network Architecture, Host Design

Keysight Unveils AI Data Center Builder For Network Architecture, Host Design

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

UiPath Announces AI Partnership With Google Cloud

UiPath Announces AI Partnership With Google Cloud

April 12, 2025
SMART Technologies Introduces Comprehensive Education Solutions and Strategic Growth Plans for India’s Expanding EdTech Market

SMART Technologies Introduces Comprehensive Education Solutions and Strategic Growth Plans for India’s Expanding EdTech Market

January 16, 2025

Genesys Named as a Leader in Cloud Contact Centre Report by Leading Analyst Firm

April 14, 2025

Browse by Category

  • Article
  • AV Solutions
  • Case Study
  • Cover Story
  • EDU Solutions
  • Featured Article
  • Interview
  • Interview
  • Politics
  • Solutions
  • Solutions Launch world
  • Solutions News world
  • Technology
  • Uncategorized
Smart Solutions World

We bring you the best Premium news, magazine, personal blog, etc. Check our landing page for details.

CATEGORIES

  • Article
  • AV Solutions
  • Case Study
  • Cover Story
  • EDU Solutions
  • Featured Article
  • Interview
  • Interview
  • Politics
  • Solutions
  • Solutions Launch world
  • Solutions News world
  • Technology
  • Uncategorized

BROWSE BY TAG

Accenture Acquisition Acronis Adobe Agentic AI AI AMD Atlassian AWS Barracuda Networks Canalys Cisco Cloud Cloudflare CrowdStrike CyberArk Databricks Gartner GenAI Google Cloud HID HPE IBM InfoComm India 2024 Infosys Kaspersky KnowBe4 Kramer Lenovo NETGEAR New Relic NTT DATA Nutanix Nvidia Oracle Palo Alto Networks Proofpoint Qlik Salesforce ServiceNow Sify Sophos Tenable Verizon Zoom

© 2024 NCN - Premium news & magazine by NCN.

No Result
View All Result
  • Solutions Launch
  • Solutions News
  • Cover Story
  • Featured Article
  • Interview
  • Products Plus
  • Case stady
  • AV Solutions
    • Article
    • Interview
    • Products
    • Case Study
  • EDU Solutions
  • Solutions

© 2024 NCN - Premium news & magazine by NCN.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?