Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?



Russian State-Sponsored Hackers Are Fastest: CrowdStrike

It takes Russian state-sponsored hackers less than 20 minutes to start moving laterally within a targeted organization’s network after the initial breach, according to CrowdStrike’s 2019 Global Threat Report.

It takes Russian state-sponsored hackers less than 20 minutes to start moving laterally within a targeted organization’s network after the initial breach, according to CrowdStrike’s 2019 Global Threat Report.

The security firm last year introduced a concept it named “breakout time,” which is the time it takes a threat actor to start moving laterally within a network after the first endpoint device has been compromised.

For this year’s report, which is based on data from over 30,000 intrusion attempts, the company has measured the average speed of nation state actors believed to be operating on behalf of Russia, China, North Korea and Iran. The breakout time of profit-driven cybercriminals has also been analyzed for comparison.

CrowdStrike has found that Russian state-sponsored hackers are the fastest as it only takes them roughly 18 minutes to start moving laterally after the initial breach. North Korean threat groups are the second fastest with an average breakout time of 2 hours and 20 seconds.

Chinese threat actors come in third with roughly 4 hours, followed by Iranian groups, which have an average breakout time of just over 5 hours.

Cybercriminals are the slowest with a breakout time of nearly 10 hours. However, it’s worth mentioning that this is based on data from all the groups tracked by CrowdStrike, but the company has pointed out that some individual crime groups can move much faster and they rival even the quickest nation-state actors.

Breakout time of threat actors

“State-sponsored adversaries out of Russia (BEARS) ranked first — almost eight times faster, on average, than their nearest competitor. While we certainly expected them to come out on top, given how effective their tradecraft usually is in comparison with other threat actors, even we were surprised by the data and how fast they can move inside a network once they get a foothold,” explained Dmitri Alperovitch, CrowdStrike co-founder and CTO.

Advertisement. Scroll to continue reading.

“Another big revelation was who took the second-place ranking. North Korean-based threat actors were on average almost twice as fast as Chinese state-sponsored adversaries,” Alperovitch added. “This is likely due in part to North Korean actors having almost 20 years of experience in pursuing a very aggressive cyber offensive program. In fact, I consider them to be the most innovative threat actors in terms of their use of cyber offensive operations.”

The Chinese government has continued to target the United States, particularly with operations whose goal is to steal intellectual property, despite the pact signed by the two countries back in 2015. CrowdStrike says it has observed an “increasing operational tempo from China-based adversaries” and the company believes this tempo will accelerate during the ongoing US-China trade war.

Another interesting observation made by CrowdStrike is that threat actors believed to be operating on behalf of China, Russia and Iran have been launching campaigns aimed at the telecommunications sector.

“This trend likely supports state-sponsored espionage actors as they seek to gain access to a broad customer base that relies on telecom services,” CrowdStrike said in its report.

CrowdStrike’s investigations from 2018 also revealed that cybercrime groups have increasingly relied on tactics typically seen in targeted attacks to deliver ransomware to large organizations. The company’s researchers also noticed an increase in collaboration between sophisticated e-crime actors.

The complete 2019 CrowdStrike Global Threat Report is available in PDF format.

Related: Organizations Still Slow to Detect Breaches

Related: Software Supply Chain Increasingly Targeted in Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.