Hacking victims are uncovering attacks faster: FireEye

The global median dwell time, defined as the duration between the start of a cyber intrusion and it being identified, was 56 days, according to FireEye Mandiant M-Trends 2020 report.

The figure is 28 percent lower than the 78-day median observed in the previous year. FireEye Mandiant consultants attribute this trend to organisations improving their detection programmes, as well as changes in attacker behaviors such as the continued rise in disruptive attacks (e.g. ransomware and cryptocurrency miners) which often have shorter dwell times than other attack types.

Oman is making government employee training against cyber threats a higher priority, hacking victims fireeye

According to the report, the global internal and external detection times have also reduced. It noted that the median dwell time for organisations that learned of their incident by an external party stands at 141 days, a 23 percent decrease since the previous M-Trends report (184 days).

Meanwhile, the median dwell time for organisations that self-detected their incident stands at 30 days, a 40 percent decrease year over year (50.5 days). While internal dwell time saw the greatest level of improvement, still 12 percent of investigations continue to have dwell times of greater than 700 days.

Although the dwell time for intrusions identified internally by organisations has gone down, the overall percentage of self-detected security incidents versus external sources has also reduced. There has been a 12-percentage point decrease in the proportion of compromises detected internally, year-over-year. This comes after a steady increase of internal detections since 2011.

2019 is the first time in four years in which external notifications, when an outside entity informs an organisation that it has been compromised, exceeded internal detections.

This shift is potentially due to a variety of factors, such as increases in law enforcement and cybersecurity vendor notifications, changes in public disclosure norms, and compliance changes. FireEye Mandiant feels it is unlikely that organisations’ ability to detect intrusions deteriorated, as other metrics show continued improvements in organisational detections and response.

The new report details how of all the malware families Mandiant observed in 2019, 41 percent had never been seen before. Furthermore, 70 percent of the samples identified belonged to one of the five most frequently seen families, which are based on open source tools with active development. These points demonstrate that not only are malware authors innovating, cybercriminals are also outsourcing tasks to monetise operations faster.

Also of note, the majority of new malware families impacted either Windows or multiple platforms. While FireEye Mandiant saw new malware families solely impacting Linux or Mac, this activity remains in the minority.

Of the attacks that FireEye Mandiant professionals responded to, the greatest majority (29 percent) were likely motivated by direct financial gain. This includes extortion, ransom, card theft, and illicit transfers. The second most common (22 percent) was data theft likely in support of intellectual property or espionage end goals.

The successful monetisation of ransomware attacks and the availability of ransomware as a service have contributed to an increase in overall ransomware cases. Established cybercrime groups that historically targeted personal and credit card information have also been increasingly turning to ransomware as a secondary means of generating revenue. Given the ease with which ransomware attacks can be carried out and their continued financial success for attackers, FireEye expects that ransomware will continue to be used as a secondary means for monetising access to victim environments.

“FireEye Mandiant has seen organisations largely improving their level of cybersecurity sophistication, but combatting the latest threats is still a huge challenge for them,” said Jurgen Kutscher, Executive Vice President of Service Delivery at FireEye. “There are more active groups now than ever before and we’ve seen an aggressive expansion of their goals. Consequently, it’s crucial for organisations to continue building and testing their defenses.”

A full copy of the FireEye Mandiant M-Trends 2020 report is available for download at:

Previous ArticleNext Article


The free newsletter covering the top industry headlines