Main Media English

Get Latest News, India News, World News at Main Media English

Support Us

Cybercriminals wiped out logs in 82% of attacks with missing telemetry: Report

IANS logo Reported By IANS |
Published On :

New Delhi, Nov 16 (IANS) Cybercriminals disabled or wiped out logs in 82 per cent of attacks with missing telemetry between January 1, 2022, to June 30, 2023, a new report said on Thursday.

Telemetry automatically gathers, transmits and measures data from remote sources, using sensors and other devices to collect data.

Also Read Story

Empty chairs, forced attendance allegations cast shadow on INDIA bloc’s Delhi rally

Nagaland’s sole LS seat to witness triangular contest in 2024 polls

Odisha Crime Branch busts racket involved in Rs 1.04 cr fraud

IPL 2024: Under-pressure Mumbai Indians hope to shine in home comfort (Preview)

IPL 2024: Sai Sudharsan, David Miller star as clinical Gujarat beat Hyderabad by seven wickets

Viksit Bharat Ambassador meet-up: India is world’s 3rd largest start-up ecosystem today, says I&B Minister Anurag Thakur

Amit Shah chairs meeting of Lok Sabha core committees in Jaipur, holds roadshow in Sikar

IPL 2024: Ishant Sharma back as Delhi Capitals win toss, elect to bat against CSK

Viksit Bharat Ambassador Jaipur meet-up: Participants heap praise on the initiative

As explained by the cybersecurity firm Sophos, gaps in telemetry decrease much-needed visibility into an organisation’s networks and systems, especially since attacker dwell time (the time from initial access to detection) continues to decline, shortening the time defenders have to effectively respond to an incident.


In the report, the researchers classified ransomware attacks with a dwell time of less than or equal to five days as “fast attacks,” which accounted for 38 per cent of the cases studied.

“Slow” ransomware attacks are those with a dwell time greater than five days, which accounted for 62 per cent of the cases.

“Missing telemetry only adds time to remediations that most organisations can’t afford. This is why complete and accurate logging is essential, but we’re seeing that, all too frequently, organisations don’t have the data they need,” said John Shier, field CTO, Sophos.

According to the researchers, when examining these “fast” and “slow” ransomware attacks at a granular level, there was not much variation in the tools, techniques, and living-off-the-land binaries (LOLBins) that attackers deployed, suggesting defenders don’t need to reinvent their defensive strategies as dwell time shrinks.

“Cybercriminals only innovate when they must, and only to the extent that it gets them to their target. Attackers aren’t going to change what’s working, even if they’re moving faster from access to detection,” said Shier.

The report is based on 232 Sophos Incident Response (IR) cases across 25 sectors. Targeted organisations were located in 34 different countries across six continents.

About 83 per cent of cases came from organisations with fewer than 1,000 employees.

–IANS

shs/rad

(This report is auto-generated from IANS news service. 'Main Media' holds no responsibility for its content.)

Get involved in bringing the ground realities of Seemanchal. Click the "Support Us" button to join our membership.

Support Us

Related News

Pawar vs Pawar: A fight for supremacy in Baramati

Rebel Wilson opens up on weight loss journey, says she’s an emotional eater

Shraddha Kapoor asks fans how they wasted 1st quarter of 2024

PM Modi virtually interacts with party workers in Varanasi

AIADMK will ally again with BJP after LS elections, says Chidambaram

PE-VC investments fall by 8 per cent to $6.2 billion in Q1

Cut! Mark Ronson’s role in Amy Winehouse biopic gets axed

Leave a Reply

Your email address will not be published. Required fields are marked *